An Efficient Link Bundling Transport Layer Protocol for Achieving Higher Data Rate and Availability
|
|
- Peter West
- 6 years ago
- Views:
Transcription
1 An Efficient Link Bundling Transport Layer Protocol for Achieving Higher Data Rate and Availability Journal: IET Communications Manuscript ID: COM Manuscript Type: Research Paper Date Submitted by the Author: 10-May-2011 Complete List of Authors: Hashmi, Muhammad; University, Computing & Technology Rehman, Raza; Iqra, Computing & Technology Shafi, Imran; Iqra, Computing & Technology Shah, Ismail; Iqra, Computing & Technology Ahmad, Jamil; Iqra, Computing & Technology Keyword: NETWORK MANAGEMENT, NETWORK PROTOCOLS, NETWORK SERVERS, NETWORK TRAFFIC
2 Page 1 of 16 IET Communications An Efficient Link Bundling Transport Layer Protocol for Achieving Higher Data Rate and Availability Muhammad Adnan Hashmi, Raza-ur-Rehman, Imran Shafi, Syed Ismail Shah, Jamil Ahmad Department of Computing and Technology Iqra University, Islamabad Campus, Pakistan hashmi_adnan@yahoo.com, [raza, imranshafi, ismail, jamil]@iqraisb.edu.pk Abstract: By using aggregation of more than one physical interface enables aggregated links to work at the same time for enhancementof bandwidth and data speed beyond capability of single link with additional feature of resilience. However, inappropriate schemes may cause undesirable network behavior and thus requires high efficiency and reliability in its implementation. A new link bundling transport layer protocol is presented which ensures efficient and reliable trunking of multiple wired or wireless network interfaces resulting in escalation of data rate. The proposed scheme is found efficient, reliable and independent of available paths [8] by implementing the Luby transform (LT) codes. The LT codes do not require any interface characteristics management prior to transfer of data which helps in aggregation of interfaces having different characteristics in less time. Also, the data flows seamlessly even if one of the link experiences fluctuation or complete shutdown. The proposed protocol requires less processing requirement, minimum connection establishment time and no interface management as compare to any TCP based protocol. Experimental results demonstrate the effectiveness of the approach. 1. Introduction Transport layer protocol use only one interface or connection between sender and receiver for data transfer. If more than one paths need to be established using multiple interfaces between sender and receiver then there is a requirement of efficient management of links and their aggregation for creation of single logical link. Aggregation of links demands the reliability and
3 Page 2 of 16 efficiency i.e. data must be transferred without loss with minimum time and less overhead. Efficiency is an important factor especially in case of erasure channels e.g. wireless. We find few approaches in the literature to address these issues partially. One of the popular approaches is the parallel TCP (ptcp) [1]. It is the extension of TCP which utilizes the concept of virtual TCP (TCP-v) and Strip Manager (SM) and increases the bandwidth by aggregating the multiple paths. TCP-v deals with the per path functionality within single logical link and SM manage all TCP-v for successful transfer of data. On the other hand transaction TCP (T/TCP) [2] skips 3-way handshake process by introducing connection count state which ultimately helps in reducing time factor required for connection establishment. Skipping 3-way handshake is also known as TCP Accelerated Open (TAO). This helps in saving overall time required for transmission of data but has some security threats which are addressed in enhance transaction TCP (ET/TCP) [2]. Another approach is link aggregation control protocol [5] which increases the bandwidth by aggregating wired interfaces. It has different modes for traffic distribution over multiple interfaces. IEEE 802.3ad standard is related to link aggregation whereas IEEE 802.1AX-2008 represents the redundancy and reliability. The approaches like T/ TCP, ET/TCP and ptcp are transport layer implementations whereas link aggregation is implemented at the data link layer. The objective of escalation ofdata rate can be achieved withsome special features at transport layer like efficient memory management both at sender and receiver side, paths selection and interface management especially in case of short term fluctuation and shutdown at transport layer of custom protocol. Better data rate is the requirement of almost every application connected to server for services either with video streaming server, proxy server, webserver etc. Server with high processing power can t play an important role if the via is not able to support the
4 Page 3 of 16 IET Communications application s data flow. Currently network devices like switches etc. don t have any built in facility installed by vendors for the aggregation of interfaces in attainment of escalation in data rate. Aggregation of network interfaces depends on the characteristics of interfaces i.e. bandwidth, delay and loss especially in case where wired and wireless links are involved. Other than major characteristics, short term fluctuation or even complete shutdown on any of the interface can affect the overall transfer of data. Path independence problem is achieved by implementing the LT codes. The LT codes are rate-less erasure code and are first practical implementation of the Fountain codes [4] [7]. These codes are well suitable especially in case where network has higher latencies and higher loss rates provided multiple interfaces are available. The proposed solution in this paper introduces a custom transport layer protocol developed using C/C++ on Ubuntu platform. It utilizes UDP packets stream and for reliability of connection, three way handshake process is implemented before the establishment of actual data stream. The data packets are passed through LT encoder at sender side whereas LT decoder decodes the same till the retrieval of required data. The paper is divided in five sections. Section 2 discusses the proposed link bundling transport layer protocol. Section 3 presents the implementation details and discussion on experimental results is given in section 4. Finally section 5 concludes the paper. 2. The Proposed Link Bundling Transport Layer Protocol The main issue for achieving aggregate bandwidth is the management of network interfaces. Each network interface has different characteristics like bandwidth, delay and loss. The links aggregation of different characteristics require efficient algorithm for traffic distribution on
5 Page 4 of 16 multiple interfaces. Short term fluctuation can be experienced by any of the link during data transfer. In addition to fluctuation, link can also experience complete shutdown. For successful transfer of data aggregated links are managed in such a way that if fluctuation or shutdown experience by any one of the link, other links remain up without any problem, this situation definitely increase the overall time require for complete transfer of data but provide enhanced reliability and redundancy [9]. Wireless Links Wired Links Sender LT Codes Encoder Links Aggregation LT Codes Decoder Receiver Fig 2.1 Proposed Infrastructure Model Fig 2.1 provides overview of the proposed model. Sender and receiver having multiple wired and wireless interfaces are combined using link aggregation to a single logical link where data is transferring over multiple paths with the implementation of LT codes.
6 Page 5 of 16 IET Communications Figure 2.2 Server Flow Chart
7 Page 6 of 16 Figure 2.3 Client Flow Chart Fountain codes [7] are chosen for the successful transfer of data. These codes are independent from path. It works on the principle that enough should be received to recover exact copy of
8 Page 7 of 16 IET Communications sender data regardless of loss of encoded symbols. Fountain codes require efficient memory management especially on receiver side. LT codes have been selected for successful transfer of data reliably and efficiently. They can generate limitless output symbols from the fixed number of message symbols. LT codes recovery and delivery doesn t depend on network reliability; they have linear and minimum encoding complexity with iterative encoding decoding algorithm. For reliable connection establishment three way handshakes process is established between sender and receiver. Packets used for connection establishment and data transfer are distinguished with the help of its type field. After successful handshake process, information about the transfer data is synchronized between sender and receiver. The next phase is LT encoding process, packets first converted into encoded symbols and then transferred over multiple interfaces. Receiver applies the LT codes decoder operation on the encoded symbol till the exact copy of sender s data is retrieved on its side. Successful transfer of data leads to the termination of connection. 2.1 Implementation The proposed link bundling transport layer protocol was developed using C/C++ and for the implementation purpose Ubuntu platform is chosen. LT codes are implemented using linked list for memory management at both sender and receiver side. C/C++ is the higher level language which utilizes the memory efficiently. Most of the application servers are developed using C/C++. Its performance over UNIX is far better than any of other operating systems. GNU compiler includes the libraries for the C/C++, it is free ware and used in the UNIX distributions. UNIX is one of the best operating system having lots of flavor, Ubuntu is one of them.
9 Page 8 of 16 3-way Handshake (using Control Packet) Exchange Information about Required Data (using Control Packet) Apply LT Encoder (Encode Data Packets) Data Packets Streaming (Data Packet + Control Header) Apply LT Decoder (Decode Data Packets) Terminate Connection (using Control Packet) Fig Protocol Flow Diagram The implementation can be categorized in two major areas, one part is related to the connection establishment that simulates the same handshake behavior used by the TCP whereas second part deals with the actual transfer of data packets on multiple interfaces, it also ensure the data integrity, reliability and efficiency with the use of LT codes.
10 Page 9 of 16 IET Communications 1. Bind Sockets on multiple available interfaces 2. Bind Sockets on multiple available interfaces (Handshake Started) 3. Send Connection Request 4. Receive Connection Request 5. Send Response 6. Receive 7. Send Ack 8. Receive Ack SERVE (Handshake End) 10. Receive File Request 11. Send File Info (Name, Size) 9. Send File Request CLIENT 12. Receive File Info 13. Reading File/Data from storage 14. Apply Luby Code Encoding 15. Sending Data Packets on Multiple Interfaces 16. Receiving Data Packets on Multiple Interfaces 17. Apply Luby Code Decoding 18. Writing File/Data on storage 19. On Completion of Data Close the Connection Figure Detail Data Flow Diagram between Sender/Server and Receiver/Client
11 Page 10 of 16 For successful transfer of data, one will act as server and other as client. Server binds the sockets with all the available interfaces, it will enable clients to initiate connection request. Sockets are basically the file descriptor in Unix/Linux which helps in communication between the two programs. Client sends the request to server for establishment of connection. The unsigned integer is used to distinguish packets i.e. either its request, response or acknowledgment packet. Packet type filed is also reserved which is used for representing control packet or actual data packet. Server receives request from the client andinitiate the handshake process by sending response back to the client. Handshaking is the process by which two devices initiate the communication. This response of the server is again acknowledged by the client by sending the acknowledgment packet and successfully completes the handshake process. Server Client Handshake Started 1. Connection request 2. Response ofrequest 3. Acknowledgment Handshake Completed Figure way Handshake Process After successful handshake, client sends the request for the data e.g. name of the file etc. The request packet contains the type of packet and name of file.in response of the client request server will send complete information of data e.g. file name and size of fileused for the
12 Page 11 of 16 IET Communications calculation of total number of chunks. The data packet size is already decided between the client and server. Requisite data or file first divided into equal size of chunks and applied to the LT codes encoder, the resultant packets will start flowing towards client on multiple available paths. The length of the symbols is chosen as 512 bytes plus the header bytes. After selection of randomly chosen degree d which defines the number of packets going to be XORed for the composition of encoded symbol, header is also attached with the encoded symbol having information of distinct chosen neighbor indices selected with the help of random generator and chosen degree d. Client who receives these encoding symbols start applying the LT codes decoding process. The receiver or client with the help of header get degree d and number of distinct indices and start the decoding process. Encoded symbol with degree one is the actual copy of sender data. Any Encoded symbol XORed with already decoded symbol reduces the degree d of encoded symbol by one. Same process repeats until exact copy of sender s data is decoded at the client side. After successful retrieval of decoded symbols at the client side, connection isterminated by both ends. 3. Results and Discussion In this section we present the results showing the performance of an efficient link bundling transport layer protocol using two hosts connected with two separate links aggregated in form of single logical link. 1 Gbps Host 1 Gbps Host Figure 3.1 Aggregated links between hosts
13 Page 12 of 16 We use two hosts directly connected with each other as shown in figure 3.1, they use two wired interfaces both having speed of 1Gbps.Hosts utilizes both the interfaces at the same time for successful transfer of data using the protocol implemented at each side. Figure 3.2 Escalation of Bandwidth Figure 3.2 shows that same amount of data take less time in case of two interfaces as compare to single interface. The result enforces our argument that using efficient aggregation of multiple interfaces can achieve escalation in bandwidth.
14 Page 13 of 16 IET Communications Esclation of Data Rate Time (in mliseconds) Interfaces - 01 Interfaces Number of Packets Figure 3.3 Comparison of Data Rate againsttime Figure 3.3 shows the variable increase in bandwidth when size of data grows for the same aggregated link as compare to data with lesser packets, that means better performance for large files. Figure3.4 Overhead Packets
15 Page 14 of 16 Figure 3.4 shows that while transferring of data there is always acceptable overhead of encoded symbol. Data consisting of more packets have more overhead as compare to data having lesser packets. Overhead Received Overhead Encoded Packets at Receiver Encoded Packets Overhead Figure 3.5 Overhead Received against Encoded Packets Figure 3.5 shows the overhead packets received against the total number of actual data packets. This approach can play an effective role especially in case of video streamed application where bandwidth or data rate does matter as come to overhead. Faster the frames received at the receiver side better will be the quality and experience of user. It is clear from the simulation results that increase in data rate produces better results in terms of time it will take for transfer of data using two interfaces but it is also showing that overhead is growing exponential that can be reduced with the implementation of online codes [6].
16 Page 15 of 16 IET Communications 4. Conclusion We have presented a new link bundling transport layer protocol which ensures increase in bandwidth along with higher availability with efficiency and reliability. This approach can also be used to increase uplink traffic between any two switches where more than one interfaces are available. It helps in increasing the bandwidth without upgrading the equipment. Experimental results demonstrate the effectiveness of approach. In future, the LT codes may be embedded in Linux kernel as it is expected to exhibit optimized and better results. Also, the cost of overhead may be reduced by introducing the online codes instead of the LT codes. References [1] H.Y. Hsieh and R. Sivakumar, ptcp: An End-to-End Transport layer Protocol for Striped Connection, in Proc.10 th IEEE International Conference Network Protocols, 2002, pp [2] R. Bin and Z. Xialoan, Enhanced Transaction TCP Design and Implementation, Internet: [Apr 22, 2011] [3] David D. Clark, The Design Philosophy of the DARPA Internet Protocols, SIGCOMM Computer Communication Review, vol. 18, no. 4, pp , Aug 1988 [4] Michael Luby, LT Codes, in Proc. 43 rd Annual IEEE Symposium on Foundation of Computer Science, 2002, pp [5] Syskonet, Link Aggregation according to IEEE 802.3ad., Internet: [May. 3, 2011]
17 Page 16 of 16 [6] P. Maymounkov, Online codes", NYU Technical Report TR , Nov 2002 [7] D.J.C. MacKay, Fountain codes, in Proc. IEEE Proceedings in Communication, vol. 152, no. 6, 2005, pp [8] J.W. Byers, M. Luby, M. Mitzenmacher, A. Rege, A Digital Fountain Approach to Reliable Distribution of Bulk Data, in Proc. ACM SIGCOMM, 1998, pp [9] Linux Foundation, bonding., Internet: [Feb 25, 2011]
Fountain Codes Based on Zigzag Decodable Coding
Fountain Codes Based on Zigzag Decodable Coding Takayuki Nozaki Kanagawa University, JAPAN Email: nozaki@kanagawa-u.ac.jp Abstract Fountain codes based on non-binary low-density parity-check (LDPC) codes
More informationMulti-path Forward Error Correction Control Scheme with Path Interleaving
Multi-path Forward Error Correction Control Scheme with Path Interleaving Ming-Fong Tsai, Chun-Yi Kuo, Chun-Nan Kuo and Ce-Kuen Shieh Department of Electrical Engineering, National Cheng Kung University,
More informationAn Efficient Transmission Scheme for Media Content Distribution Platform
International Conference on Electronic Science and Automation Control (ESAC 2015) An Efficient Transmission Scheme for Media Content Distribution Platform Feifei Wang Digital Engineering Center Communication
More informationEfficient Content Delivery and Low Complexity Codes. Amin Shokrollahi
Efficient Content Delivery and Low Complexity Codes Amin Shokrollahi Content Goals and Problems TCP/IP, Unicast, and Multicast Solutions based on codes Applications Goal Want to transport data from a transmitter
More informationCMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 30, 2018
CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala October 30, 2018 Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet
More information1 Reception efficiency
Bipartite Graph Bipartite Graph n/4 Standard Loss resilient Code n/ n Figure 1: Encoding structure of tornado code CS 493: Algorithms for Massive Data Sets Tornado Codes and Error-Correcting Codes 3/7/0
More informationAchieving Efficient Parallelism in Transport Layer using P-TCP
International Journal of Computer Applications in Engineering Sciences [VOL II, ISSUE I, MARCH 2012] [ISSN: 2231-4946] Achieving Efficient Parallelism in Transport Layer using P-TCP Kamalakshi N 1, H Naganna
More informationTCP and UDP Fairness in Vehicular Ad hoc Networks
TCP and UDP Fairness in Vehicular Ad hoc Networks Forouzan Pirmohammadi 1, Mahmood Fathy 2, Hossein Ghaffarian 3 1 Islamic Azad University, Science and Research Branch, Tehran, Iran 2,3 School of Computer
More informationCCNA 1 Chapter 7 v5.0 Exam Answers 2013
CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the
More informationDesigning a Resource Pooling Transport Protocol
Designing a Resource Pooling Transport Protocol Michio Honda, Keio University Elena Balandina, Nokia Research Center Pasi Sarolahti, Nokia Research Center Lars Eggert, Nokia Research Center Global Internet
More informationData Transport over IP Networks
Data Transport over IP Networks Derek Konigsberg octo@logicprobe.org AITP University of Central Florida Data Transport over IP Networks p.1/24 Introduction The TCP/IP protocol suite was created by DARPA
More informationNetwork Working Group. Obsoletes: 3452, 3695 March 2009 Category: Standards Track
Network Working Group M. Watson Request for Comments: 5445 Digital Fountain Obsoletes: 3452, 3695 March 2009 Category: Standards Track Status of This Memo Basic Forward Error Correction (FEC) Schemes This
More informationNetwork Model: Each layer has a specific function.
OBJECTIVES: To discuss the OSI model and its layer architecture and to show the interface between the layers. To briefly discuss the functions of each layer in the OSI model. To introduce the TCP/IP protocol.
More informationOptimizing IP Networks for Acquisition. Presented by Henry Quintana, Director of Solutions TVU Networks
Optimizing IP Networks for Acquisition Presented by Henry Quintana, Director of Solutions TVU Networks More Content, Less Cost IP-based Infrastructure Limitations All transmission mediums have compromises
More informationTree-Based Minimization of TCAM Entries for Packet Classification
Tree-Based Minimization of TCAM Entries for Packet Classification YanSunandMinSikKim School of Electrical Engineering and Computer Science Washington State University Pullman, Washington 99164-2752, U.S.A.
More informationPage 1. Review: Internet Protocol Stack. Transport Layer Services. Design Issue EEC173B/ECS152C. Review: TCP
EEC7B/ECS5C Review: Internet Protocol Stack Review: TCP Application Telnet FTP HTTP Transport Network Link Physical bits on wire TCP LAN IP UDP Packet radio Transport Layer Services Design Issue Underlying
More informationTransport Layer. Gursharan Singh Tatla. Upendra Sharma. 1
Transport Layer Gursharan Singh Tatla mailme@gursharansingh.in Upendra Sharma 1 Introduction The transport layer is the fourth layer from the bottom in the OSI reference model. It is responsible for message
More informationOptimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions
Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions 2007 IEEE Communication Theory Workshop Christian R. Berger 1, Shengli Zhou 1, Yonggang Wen 2, Peter Willett 1 and
More informationCSCI-1680 Link Layer I Rodrigo Fonseca
CSCI-1680 Link Layer I Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Last time Physical layer: encoding, modulation Today Link layer framing Getting frames
More informationCCNA R&S: Introduction to Networks. Chapter 7: The Transport Layer
CCNA R&S: Introduction to Networks Chapter 7: The Transport Layer Frank Schneemann 7.0.1.1 Introduction 7.0.1.2 Class Activity - We Need to Talk Game 7.1.1.1 Role of the Transport Layer The primary responsibilities
More informationA look at the ROUTE forward ROUTE ~ Real-time Object-delivery over Unidirectional Transport
A look at the ROUTE forward ROUTE ~ Real-time Object-delivery over Unidirectional Transport Michael Luby Qualcomm Technologies, Inc. Mile High Video 2018 August 1, 2018 ROUTE (Real-time Object-delivery
More informationCSCD 433/533 Advanced Networks Fall Lecture 14 RTSP and Transport Protocols/ RTP
CSCD 433/533 Advanced Networks Fall 2012 Lecture 14 RTSP and Transport Protocols/ RTP 1 Topics Multimedia Player RTSP Review RTP Real Time Protocol Requirements for RTP RTP Details Applications that use
More informationWashington State University CptS 455 Sample Final Exam (corrected 12/11/2011 to say open notes) A B C
Washington State University CptS 455 Sample Final Exam (corrected 12/11/2011 to say open notes) Your name: This exam consists 13 numbered problems on 6 pages printed front and back on 3 sheets. Please
More informationTransport Protocols for Networked Games
Transport Protocols for Networked Games 1 TCP or UDP? 2 Why use TCP? TCP provides reliable, in-order delivery TCP goes through most firewalls, UDP does not TCP manages connection for us 3 Why not to use
More informationUNIT IV -- TRANSPORT LAYER
UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission
More informationCoding theory for scalable media delivery
1 Coding theory for scalable media delivery Michael Luby RaptorQ is a product of Qualcomm Technologies, Inc. Application layer erasure coding complements traditional error coding Forward Error Correction
More informationSimulation of TCP Layer
39 Simulation of TCP Layer Preeti Grover, M.Tech, Computer Science, Uttrakhand Technical University, Dehradun ABSTRACT The Transmission Control Protocol (TCP) represents the most deployed transport protocol
More informationLec 19 - Error and Loss Control
ECE 5578 Multimedia Communication Lec 19 - Error and Loss Control Zhu Li Dept of CSEE, UMKC Office: FH560E, Email: lizhu@umkc.edu, Ph: x 2346. http://l.web.umkc.edu/lizhu slides created with WPS Office
More informationTransport Layer. Chapter 3: Transport Layer
Transport Layer EECS 3214 Slides courtesy of J.F Kurose and K.W. Ross, All Rights Reserved 29-Jan-18 1-1 Chapter 3: Transport Layer our goals: understand principles behind layer services: multiplexing,
More informationPage 1. Review: Internet Protocol Stack. Transport Layer Services EEC173B/ECS152C. Review: TCP. Transport Layer: Connectionless Service
EEC7B/ECS5C Review: Internet Protocol Stack Review: TCP Application Telnet FTP HTTP Transport Network Link Physical bits on wire TCP LAN IP UDP Packet radio Do you remember the various mechanisms we have
More informationECE 435 Network Engineering Lecture 10
ECE 435 Network Engineering Lecture 10 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 28 September 2017 Announcements HW#4 was due HW#5 will be posted. midterm/fall break You
More informationEnergy Savings for Video Streaming Using Fountain Coding
Energy Savings for Video Streaming Using Fountain Coding Anders Nilsson Plymoth TelHoc AB Stockholm, Sweden Email: anders@telhoc.se Zhi Zhang Department Of Electrical and Information Technology Lund University,
More informationCommunication in Distributed Systems
Communication in Distributed Systems Sape J. Mullender Huygens Systems Research Laboratory Universiteit Twente Enschede 1 Introduction Functions of Communication Transport data between processes, machines,
More informationUNIT IV TRANSPORT LAYER
Transport Layer UNIT IV TRANSPORT LAYER Congestion Control and Quality of Service Ref: Data Communication & Networking, 4 th edition, Forouzan IV-1 DATA TRAFFIC The main focus of congestion control and
More informationCSCI-GA Operating Systems. Networking. Hubertus Franke
CSCI-GA.2250-001 Operating Systems Networking Hubertus Franke frankeh@cs.nyu.edu Source: Ganesh Sittampalam NYU TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute
More informationUDP, TCP, IP multicast
UDP, TCP, IP multicast Dan Williams In this lecture UDP (user datagram protocol) Unreliable, packet-based TCP (transmission control protocol) Reliable, connection oriented, stream-based IP multicast Process-to-Process
More informationSummary of Raptor Codes
Summary of Raptor Codes Tracey Ho October 29, 2003 1 Introduction This summary gives an overview of Raptor Codes, the latest class of codes proposed for reliable multicast in the Digital Fountain model.
More informationInternet Content Distribution
Internet Content Distribution Chapter 1: Introduction Jussi Kangasharju Chapter Outline Introduction into content distribution Basic concepts TCP DNS HTTP Outline of the rest of the course Kangasharju:
More informationTransport Layer Review
Transport Layer Review Mahalingam Mississippi State University, MS October 1, 2014 Transport Layer Functions Distinguish between different application instances through port numbers Make it easy for applications
More informationConfiguring your VLAN. Presented by Gregory Laffoon
Configuring your VLAN Presented by Gregory Laffoon 1 Overview of Networking Terms Networking Terms Overview OSI Model Defines a networking framework for implementing protocols in seven layers Control is
More informationCSC310 Information Theory. Lecture 21: Erasure (Deletion) Channels & Digital Fountain Codes. November 22, 2006 see
CSC310 Information Theory Lecture 21: Erasure (Deletion) Channels & Digital Fountain Codes Sam Roweis Recovering From Erasures 2 How can we recover from erasures? For the BEC, we saw that low-density parity
More informationCSCI-1680 Link Layer Reliability Rodrigo Fonseca
CSCI-1680 Link Layer Reliability Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Last time Physical layer: encoding, modulation Link layer framing Today Getting
More informationTransport Layer. The transport layer is responsible for the delivery of a message from one process to another. RSManiaol
Transport Layer Transport Layer The transport layer is responsible for the delivery of a message from one process to another Types of Data Deliveries Client/Server Paradigm An application program on the
More informationRaptor Codes for P2P Streaming
Raptor Codes for P2P Streaming Philipp Eittenberger 1, Todor Mladenov 2, Udo Krieger 1 1 Faculty of Information Systems and Applied Computer Science Otto-Friedrich University Bamberg, Germany 2 Department
More informationNew Approach towards Covert Communication using TCP-SQN Reference Model
ISSN 2278 0211 (Online) New Approach towards Covert Communication using TCP-SQN Reference Model Dhananjay M. Dakhane Department of Computer science & Engineering Sipna College of Engineering & Technology,
More informationConnectionless and Connection-Oriented Protocols OSI Layer 4 Common feature: Multiplexing Using. The Transmission Control Protocol (TCP)
Lecture (07) OSI layer 4 protocols TCP/UDP protocols By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU Fall2014, Computer Networks II Introduction Most data-link protocols notice errors then discard frames
More informationLinux Networking: tcp. TCP context and interfaces
Linux Networking: tcp David Morgan TCP context and interfaces Computer A Computer B application process application process data data data data TCP process TCP process a network 1 TCP purposes and features
More informationCS164 Final Exam Winter 2013
CS164 Final Exam Winter 2013 Name: Last 4 digits of Student ID: Problem 1. State whether each of the following statements is true or false. (Two points for each correct answer, 1 point for each incorrect
More informationCSC310 Information Theory. Lecture 22: Erasure (Deletion) Channels & Digital Fountain Codes. November 30, 2005 see
CSC310 Information Theory Lecture 22: Erasure (Deletion) Channels & Digital Fountain Codes Sam Roweis Recovering From Erasures 2 How can we recover from erasures? For the BEC, we saw that low-density parity
More informationWeek 2 / Paper 1. The Design Philosophy of the DARPA Internet Protocols
Week 2 / Paper 1 The Design Philosophy of the DARPA Internet Protocols David D. Clark ACM CCR, Vol. 18, No. 4, August 1988 Main point Many papers describe how the Internet Protocols work But why do they
More informationTCP Flavors Simulation Evaluations over Noisy Environment
International Journal of Information Engineering and Applications 2018; 1(1): 11-17 http://www.aascit.org/journal/information TCP Flavors Simulation Evaluations over Noisy Environment Elsadig Gamaleldeen
More informationPROACTIVE RELIABLE BULK DATA DISSEMINATION IN SENSOR NETWORKS 1
PROACTIVE RELIABLE BULK DATA DISSEMINATION IN SENSOR NETWORKS 1 Limin Wang Sandeep S. Kulkarni Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan
More informationChapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP
Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 23-1 PROCESS-TO-PROCESS DELIVERY The transport
More informationStream Control Transmission Protocol (SCTP)
Stream Control Transmission Protocol (SCTP) Definition Stream control transmission protocol (SCTP) is an end-to-end, connectionoriented protocol that transports data in independent sequenced streams. SCTP
More informationCOMP750. Distributed Systems. Network Overview
COMP750 Distributed Systems Network Overview Network Standards The purpose of a network is to allow two computers to communicate. Ex: The electrical power network in North America follows a standard to
More informationAn Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs
An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs Jin Liu 1, Hongmin Ren 1, Jun Wang 2, Jin Wang 2 1 College of Information Engineering, Shanghai Maritime University,
More informationLecture (11) OSI layer 4 protocols TCP/UDP protocols
Lecture (11) OSI layer 4 protocols TCP/UDP protocols Dr. Ahmed M. ElShafee ١ Agenda Introduction Typical Features of OSI Layer 4 Connectionless and Connection Oriented Protocols OSI Layer 4 Common feature:
More informationInternet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016
Internet Technology 06. Exam 1 Review Paul Krzyzanowski Rutgers University Spring 2016 March 2, 2016 2016 Paul Krzyzanowski 1 Question 1 Defend or contradict this statement: for maximum efficiency, at
More informationHTTP/2: What You Need to Know. Robert
HTTP/2: What You Need to Know Robert Boedigheimer @boedie About Me Web developer since 1995 Pluralsight Author 3 rd Degree Black Belt, Tae Kwon Do ASP.NET MVP boedie@outlook.com @boedie weblogs.asp.net/boedie
More informationDynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks
Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University
More informationLecture 8: February 19
CMPSCI 677 Operating Systems Spring 2013 Lecture 8: February 19 Lecturer: Prashant Shenoy Scribe: Siddharth Gupta 8.1 Server Architecture Design of the server architecture is important for efficient and
More informationUser Datagram Protocol (UDP):
SFWR 4C03: Computer Networks and Computer Security Feb 2-5 2004 Lecturer: Kartik Krishnan Lectures 13-15 User Datagram Protocol (UDP): UDP is a connectionless transport layer protocol: each output operation
More informationCC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments
CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted
More information! " Lecture 5: Networking for Games (cont d) Packet headers. Packet footers. IP address. Edge router (cable modem, DSL modem)
Lecture 5: Networking for Games (cont d) Special Send case: to NAT 123.12.2.10 network 192.168.1.101 17.4.9.33 192.168.1.100 123.12.2.[0-128] IP address 23.11.3.10 Edge router (cable modem, DSL modem)
More informationTCP/IP Protocol Suite 1
TCP/IP Protocol Suite 1 Stream Control Transmission Protocol (SCTP) TCP/IP Protocol Suite 2 OBJECTIVES: To introduce SCTP as a new transport-layer protocol. To discuss SCTP services and compare them with
More informationOSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1
OSI Transport Layer Network Fundamentals Chapter 4 Version 4.0 1 Transport Layer Role and Services Transport layer is responsible for overall end-to-end transfer of application data 2 Transport Layer Role
More informationTCP Multi-homing Support in Heterogeneous Networks
, March 13-15, 2013, Hong Kong TCP Multi-homing Support in Heterogeneous Networks Dang Duc Nguyen, Yang Xia, Chai Kiat Yeo, Bu Sung Lee Abstract Mobile technology provides users with ubiquitous connectivity
More informationIntro to LAN/WAN. Transport Layer
Intro to LAN/WAN Transport Layer Transport Layer Topics Introduction (6.1) Elements of Transport Protocols (6.2) Internet Transport Protocols: TDP (6.5) Internet Transport Protocols: UDP (6.4) socket interface
More informationCS 43: Computer Networks. 15: Transport Layer & UDP October 5, 2018
CS 43: Computer Networks 15: Layer & UDP October 5, 2018 Reading Quiz Lecture 15 - Slide 2 Layer Moving down a layer. Current perspective: lication is the boss Usually executing within the OS kernel. The
More informationLT Erasure Codes. 1 Introduction. Interview: Tuesday, Jan 24th, TBD
Programming Comps - January 17-24, 2012 LT Erasure Codes Out: Tuesday, Jan 17th, 2012 9AM Due: Saturday, Jan 21st, 2012, 11:59AM Interview: Tuesday, Jan 24th, TBD 1 Introduction Erasure codes are a type
More informationImpact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11
More informationTCP based Receiver Assistant Congestion Control
International Conference on Multidisciplinary Research & Practice P a g e 219 TCP based Receiver Assistant Congestion Control Hardik K. Molia Master of Computer Engineering, Department of Computer Engineering
More informationCongestion Control in Datacenters. Ahmed Saeed
Congestion Control in Datacenters Ahmed Saeed What is a Datacenter? Tens of thousands of machines in the same building (or adjacent buildings) Hundreds of switches connecting all machines What is a Datacenter?
More informationCampus Networking Workshop. Layer 2 engineering Spanning Tree and VLANs
Campus Networking Workshop Layer 2 engineering Spanning Tree and VLANs Switching Loop When there is more than one path between two switches What are the potential problems? Switching Loop If there is more
More informationLinks Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame
Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared
More informationDigital Asset Management 5. Streaming multimedia
Digital Asset Management 5. Streaming multimedia 2015-10-29 Keys of Streaming Media Algorithms (**) Standards (*****) Complete End-to-End systems (***) Research Frontiers(*) Streaming... Progressive streaming
More informationIs Physical Layer Error Correction sufficient for Video Multicast over IEEE g Networks?
Is Physical Layer Error Correction sufficient for Video Multicast over IEEE 82.11g Networks? Özgü Alay, Thanasis Korakis, Yao Wang, and Shivendra Panwar Department of Electrical and Computer Engineering,
More informationCSCI-1680 Transport Layer III Congestion Control Strikes Back Rodrigo Fonseca
CSCI-1680 Transport Layer III Congestion Control Strikes Back Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti, Ion Stoica Last Time Flow Control Congestion Control
More informationOSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,
ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure
More informationCMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 25, 2018
CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet IP
More informationInternet Technology 3/2/2016
Question 1 Defend or contradict this statement: for maximum efficiency, at the expense of reliability, an application should bypass TCP or UDP and use IP directly for communication. Internet Technology
More informationImproving the quality of H.264 video transmission using the Intra-Frame FEC over IEEE e networks
Improving the quality of H.264 video transmission using the Intra-Frame FEC over IEEE 802.11e networks Seung-Seok Kang 1,1, Yejin Sohn 1, and Eunji Moon 1 1Department of Computer Science, Seoul Women s
More informationCPS221 Lecture: Layered Network Architecture
CPS221 Lecture: Layered Network Architecture Objectives last revised 9/8/14 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:
More informationPerformance Enhancement Of TCP For Wireless Network
P a g e 32 Vol. 10 Issue 12 (Ver. 1.0) October 2010 Global Journal of Computer Science and Technology Performance Enhancement Of TCP For Wireless Network 1 Pranab Kumar Dhar, 2 Mohammad Ibrahim Khan, 3
More informationIntroduction to OSI model and Network Analyzer :- Introduction to Wireshark
Sungkyunkwan University Introduction to OSI model and Network Analyzer :- Introduction to Wireshark Syed Muhammad Raza s.moh.raza@gmail.com Copyright 2000-2015 Networking Laboratory 1/56 An Overview of
More informationSharkFest'17 US. Understanding Throughput & TCP Windows. A Walk-Through of the Factors that can limit TCP Throughput Performance
SharkFest'17 US Understanding Throughput & TCP Windows A Walk-Through of the Factors that can limit TCP Throughput Performance Kary Rogers Director, Staff Engineering Riverbed Technology Agenda TCP ownership
More informationNetworking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ
Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking
More informationGuide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16
Guide To TCP/IP, Second Edition Chapter 5 Transport Layer TCP/IP Protocols Objectives Understand the key features and functions of the User Datagram Protocol (UDP) Explain the mechanisms that drive segmentation,
More informationChapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1
Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 23-1 PROCESS-TO-PROCESS DELIVERY 23.2 The transport
More informationSTEVEN R. BAGLEY PACKETS
STEVEN R. BAGLEY PACKETS INTRODUCTION Talked about how data is split into packets Allows it to be multiplexed onto the network with data from other machines But exactly how is it split into packets and
More informationA Fuzzy System for Adaptive Network Routing
A Fuzzy System for Adaptive Network Routing A. Pasupuleti *, A.V. Mathew*, N. Shenoy** and S. A. Dianat* Rochester Institute of Technology Rochester, NY 14623, USA E-mail: axp1014@rit.edu Abstract In this
More informationn Understand EC-Council s scanning methodology n Describe scan types and the objectives of scanning
Outline n Understand EC-Council s scanning methodology n Describe scan types and the objectives of scanning n Understand the use of various scanning and enumeration tools Chapter #3: n Describe TCP communication
More informationCSE 461 MIDTERM REVIEW
CSE 461 MIDTERM REVIEW NETWORK LAYERS & ENCAPSULATION Application Application Transport Transport Network Network Data Link/ Physical Data Link/ Physical APPLICATION LAYER Application Application Used
More informationComputer Network Programming
Computer Network Programming SCTP Overview Dr. Sam Hsu Computer Science & Engineering Florida Atlantic University SCTP Overview Introduction Motivations Architectural & Functional Views Packet & Chunk
More informationA UDP-Based Protocol for improving packets loss in unstable networks
International Conference on Internet Studies, July 18-19, 2015, Tokyo, Japan A UDP-Based Protocol for improving packets loss in unstable networks Wei-Chung Cheng, Wei-Tsong Lee, Hsin-Wen Wei Tamkang University,
More informationCS 268: Computer Networking. Taking Advantage of Broadcast
CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic
More informationEffect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols
Volume 1, Issue 3, October 2013 ISSN: 2320-9984 (Online) International Journal of Modern Engineering & Management Research Website: www.ijmemr.org Effect of Variable Bit Rate Traffic Models on the Energy
More informationPerformance of Multihop Communications Using Logical Topologies on Optical Torus Networks
Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,
More informationHomework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca
CSCI 1680 Computer Networks Fonseca Homework 1 Due: 27 September 2012, 4pm Question 1 - Layering a. Why are networked systems layered? What are the advantages of layering? Are there any disadvantages?
More informationTHE NETWORK PERFORMANCE OVER TCP PROTOCOL USING NS2
THE NETWORK PERFORMANCE OVER TCP PROTOCOL USING NS2 Ammar Abdulateef Hadi, Raed A. Alsaqour and Syaimak Abdul Shukor School of Computer Science, Faculty of Information Science and Technology, University
More information