An Efficient Link Bundling Transport Layer Protocol for Achieving Higher Data Rate and Availability

Size: px
Start display at page:

Download "An Efficient Link Bundling Transport Layer Protocol for Achieving Higher Data Rate and Availability"

Transcription

1 An Efficient Link Bundling Transport Layer Protocol for Achieving Higher Data Rate and Availability Journal: IET Communications Manuscript ID: COM Manuscript Type: Research Paper Date Submitted by the Author: 10-May-2011 Complete List of Authors: Hashmi, Muhammad; University, Computing & Technology Rehman, Raza; Iqra, Computing & Technology Shafi, Imran; Iqra, Computing & Technology Shah, Ismail; Iqra, Computing & Technology Ahmad, Jamil; Iqra, Computing & Technology Keyword: NETWORK MANAGEMENT, NETWORK PROTOCOLS, NETWORK SERVERS, NETWORK TRAFFIC

2 Page 1 of 16 IET Communications An Efficient Link Bundling Transport Layer Protocol for Achieving Higher Data Rate and Availability Muhammad Adnan Hashmi, Raza-ur-Rehman, Imran Shafi, Syed Ismail Shah, Jamil Ahmad Department of Computing and Technology Iqra University, Islamabad Campus, Pakistan hashmi_adnan@yahoo.com, [raza, imranshafi, ismail, jamil]@iqraisb.edu.pk Abstract: By using aggregation of more than one physical interface enables aggregated links to work at the same time for enhancementof bandwidth and data speed beyond capability of single link with additional feature of resilience. However, inappropriate schemes may cause undesirable network behavior and thus requires high efficiency and reliability in its implementation. A new link bundling transport layer protocol is presented which ensures efficient and reliable trunking of multiple wired or wireless network interfaces resulting in escalation of data rate. The proposed scheme is found efficient, reliable and independent of available paths [8] by implementing the Luby transform (LT) codes. The LT codes do not require any interface characteristics management prior to transfer of data which helps in aggregation of interfaces having different characteristics in less time. Also, the data flows seamlessly even if one of the link experiences fluctuation or complete shutdown. The proposed protocol requires less processing requirement, minimum connection establishment time and no interface management as compare to any TCP based protocol. Experimental results demonstrate the effectiveness of the approach. 1. Introduction Transport layer protocol use only one interface or connection between sender and receiver for data transfer. If more than one paths need to be established using multiple interfaces between sender and receiver then there is a requirement of efficient management of links and their aggregation for creation of single logical link. Aggregation of links demands the reliability and

3 Page 2 of 16 efficiency i.e. data must be transferred without loss with minimum time and less overhead. Efficiency is an important factor especially in case of erasure channels e.g. wireless. We find few approaches in the literature to address these issues partially. One of the popular approaches is the parallel TCP (ptcp) [1]. It is the extension of TCP which utilizes the concept of virtual TCP (TCP-v) and Strip Manager (SM) and increases the bandwidth by aggregating the multiple paths. TCP-v deals with the per path functionality within single logical link and SM manage all TCP-v for successful transfer of data. On the other hand transaction TCP (T/TCP) [2] skips 3-way handshake process by introducing connection count state which ultimately helps in reducing time factor required for connection establishment. Skipping 3-way handshake is also known as TCP Accelerated Open (TAO). This helps in saving overall time required for transmission of data but has some security threats which are addressed in enhance transaction TCP (ET/TCP) [2]. Another approach is link aggregation control protocol [5] which increases the bandwidth by aggregating wired interfaces. It has different modes for traffic distribution over multiple interfaces. IEEE 802.3ad standard is related to link aggregation whereas IEEE 802.1AX-2008 represents the redundancy and reliability. The approaches like T/ TCP, ET/TCP and ptcp are transport layer implementations whereas link aggregation is implemented at the data link layer. The objective of escalation ofdata rate can be achieved withsome special features at transport layer like efficient memory management both at sender and receiver side, paths selection and interface management especially in case of short term fluctuation and shutdown at transport layer of custom protocol. Better data rate is the requirement of almost every application connected to server for services either with video streaming server, proxy server, webserver etc. Server with high processing power can t play an important role if the via is not able to support the

4 Page 3 of 16 IET Communications application s data flow. Currently network devices like switches etc. don t have any built in facility installed by vendors for the aggregation of interfaces in attainment of escalation in data rate. Aggregation of network interfaces depends on the characteristics of interfaces i.e. bandwidth, delay and loss especially in case where wired and wireless links are involved. Other than major characteristics, short term fluctuation or even complete shutdown on any of the interface can affect the overall transfer of data. Path independence problem is achieved by implementing the LT codes. The LT codes are rate-less erasure code and are first practical implementation of the Fountain codes [4] [7]. These codes are well suitable especially in case where network has higher latencies and higher loss rates provided multiple interfaces are available. The proposed solution in this paper introduces a custom transport layer protocol developed using C/C++ on Ubuntu platform. It utilizes UDP packets stream and for reliability of connection, three way handshake process is implemented before the establishment of actual data stream. The data packets are passed through LT encoder at sender side whereas LT decoder decodes the same till the retrieval of required data. The paper is divided in five sections. Section 2 discusses the proposed link bundling transport layer protocol. Section 3 presents the implementation details and discussion on experimental results is given in section 4. Finally section 5 concludes the paper. 2. The Proposed Link Bundling Transport Layer Protocol The main issue for achieving aggregate bandwidth is the management of network interfaces. Each network interface has different characteristics like bandwidth, delay and loss. The links aggregation of different characteristics require efficient algorithm for traffic distribution on

5 Page 4 of 16 multiple interfaces. Short term fluctuation can be experienced by any of the link during data transfer. In addition to fluctuation, link can also experience complete shutdown. For successful transfer of data aggregated links are managed in such a way that if fluctuation or shutdown experience by any one of the link, other links remain up without any problem, this situation definitely increase the overall time require for complete transfer of data but provide enhanced reliability and redundancy [9]. Wireless Links Wired Links Sender LT Codes Encoder Links Aggregation LT Codes Decoder Receiver Fig 2.1 Proposed Infrastructure Model Fig 2.1 provides overview of the proposed model. Sender and receiver having multiple wired and wireless interfaces are combined using link aggregation to a single logical link where data is transferring over multiple paths with the implementation of LT codes.

6 Page 5 of 16 IET Communications Figure 2.2 Server Flow Chart

7 Page 6 of 16 Figure 2.3 Client Flow Chart Fountain codes [7] are chosen for the successful transfer of data. These codes are independent from path. It works on the principle that enough should be received to recover exact copy of

8 Page 7 of 16 IET Communications sender data regardless of loss of encoded symbols. Fountain codes require efficient memory management especially on receiver side. LT codes have been selected for successful transfer of data reliably and efficiently. They can generate limitless output symbols from the fixed number of message symbols. LT codes recovery and delivery doesn t depend on network reliability; they have linear and minimum encoding complexity with iterative encoding decoding algorithm. For reliable connection establishment three way handshakes process is established between sender and receiver. Packets used for connection establishment and data transfer are distinguished with the help of its type field. After successful handshake process, information about the transfer data is synchronized between sender and receiver. The next phase is LT encoding process, packets first converted into encoded symbols and then transferred over multiple interfaces. Receiver applies the LT codes decoder operation on the encoded symbol till the exact copy of sender s data is retrieved on its side. Successful transfer of data leads to the termination of connection. 2.1 Implementation The proposed link bundling transport layer protocol was developed using C/C++ and for the implementation purpose Ubuntu platform is chosen. LT codes are implemented using linked list for memory management at both sender and receiver side. C/C++ is the higher level language which utilizes the memory efficiently. Most of the application servers are developed using C/C++. Its performance over UNIX is far better than any of other operating systems. GNU compiler includes the libraries for the C/C++, it is free ware and used in the UNIX distributions. UNIX is one of the best operating system having lots of flavor, Ubuntu is one of them.

9 Page 8 of 16 3-way Handshake (using Control Packet) Exchange Information about Required Data (using Control Packet) Apply LT Encoder (Encode Data Packets) Data Packets Streaming (Data Packet + Control Header) Apply LT Decoder (Decode Data Packets) Terminate Connection (using Control Packet) Fig Protocol Flow Diagram The implementation can be categorized in two major areas, one part is related to the connection establishment that simulates the same handshake behavior used by the TCP whereas second part deals with the actual transfer of data packets on multiple interfaces, it also ensure the data integrity, reliability and efficiency with the use of LT codes.

10 Page 9 of 16 IET Communications 1. Bind Sockets on multiple available interfaces 2. Bind Sockets on multiple available interfaces (Handshake Started) 3. Send Connection Request 4. Receive Connection Request 5. Send Response 6. Receive 7. Send Ack 8. Receive Ack SERVE (Handshake End) 10. Receive File Request 11. Send File Info (Name, Size) 9. Send File Request CLIENT 12. Receive File Info 13. Reading File/Data from storage 14. Apply Luby Code Encoding 15. Sending Data Packets on Multiple Interfaces 16. Receiving Data Packets on Multiple Interfaces 17. Apply Luby Code Decoding 18. Writing File/Data on storage 19. On Completion of Data Close the Connection Figure Detail Data Flow Diagram between Sender/Server and Receiver/Client

11 Page 10 of 16 For successful transfer of data, one will act as server and other as client. Server binds the sockets with all the available interfaces, it will enable clients to initiate connection request. Sockets are basically the file descriptor in Unix/Linux which helps in communication between the two programs. Client sends the request to server for establishment of connection. The unsigned integer is used to distinguish packets i.e. either its request, response or acknowledgment packet. Packet type filed is also reserved which is used for representing control packet or actual data packet. Server receives request from the client andinitiate the handshake process by sending response back to the client. Handshaking is the process by which two devices initiate the communication. This response of the server is again acknowledged by the client by sending the acknowledgment packet and successfully completes the handshake process. Server Client Handshake Started 1. Connection request 2. Response ofrequest 3. Acknowledgment Handshake Completed Figure way Handshake Process After successful handshake, client sends the request for the data e.g. name of the file etc. The request packet contains the type of packet and name of file.in response of the client request server will send complete information of data e.g. file name and size of fileused for the

12 Page 11 of 16 IET Communications calculation of total number of chunks. The data packet size is already decided between the client and server. Requisite data or file first divided into equal size of chunks and applied to the LT codes encoder, the resultant packets will start flowing towards client on multiple available paths. The length of the symbols is chosen as 512 bytes plus the header bytes. After selection of randomly chosen degree d which defines the number of packets going to be XORed for the composition of encoded symbol, header is also attached with the encoded symbol having information of distinct chosen neighbor indices selected with the help of random generator and chosen degree d. Client who receives these encoding symbols start applying the LT codes decoding process. The receiver or client with the help of header get degree d and number of distinct indices and start the decoding process. Encoded symbol with degree one is the actual copy of sender data. Any Encoded symbol XORed with already decoded symbol reduces the degree d of encoded symbol by one. Same process repeats until exact copy of sender s data is decoded at the client side. After successful retrieval of decoded symbols at the client side, connection isterminated by both ends. 3. Results and Discussion In this section we present the results showing the performance of an efficient link bundling transport layer protocol using two hosts connected with two separate links aggregated in form of single logical link. 1 Gbps Host 1 Gbps Host Figure 3.1 Aggregated links between hosts

13 Page 12 of 16 We use two hosts directly connected with each other as shown in figure 3.1, they use two wired interfaces both having speed of 1Gbps.Hosts utilizes both the interfaces at the same time for successful transfer of data using the protocol implemented at each side. Figure 3.2 Escalation of Bandwidth Figure 3.2 shows that same amount of data take less time in case of two interfaces as compare to single interface. The result enforces our argument that using efficient aggregation of multiple interfaces can achieve escalation in bandwidth.

14 Page 13 of 16 IET Communications Esclation of Data Rate Time (in mliseconds) Interfaces - 01 Interfaces Number of Packets Figure 3.3 Comparison of Data Rate againsttime Figure 3.3 shows the variable increase in bandwidth when size of data grows for the same aggregated link as compare to data with lesser packets, that means better performance for large files. Figure3.4 Overhead Packets

15 Page 14 of 16 Figure 3.4 shows that while transferring of data there is always acceptable overhead of encoded symbol. Data consisting of more packets have more overhead as compare to data having lesser packets. Overhead Received Overhead Encoded Packets at Receiver Encoded Packets Overhead Figure 3.5 Overhead Received against Encoded Packets Figure 3.5 shows the overhead packets received against the total number of actual data packets. This approach can play an effective role especially in case of video streamed application where bandwidth or data rate does matter as come to overhead. Faster the frames received at the receiver side better will be the quality and experience of user. It is clear from the simulation results that increase in data rate produces better results in terms of time it will take for transfer of data using two interfaces but it is also showing that overhead is growing exponential that can be reduced with the implementation of online codes [6].

16 Page 15 of 16 IET Communications 4. Conclusion We have presented a new link bundling transport layer protocol which ensures increase in bandwidth along with higher availability with efficiency and reliability. This approach can also be used to increase uplink traffic between any two switches where more than one interfaces are available. It helps in increasing the bandwidth without upgrading the equipment. Experimental results demonstrate the effectiveness of approach. In future, the LT codes may be embedded in Linux kernel as it is expected to exhibit optimized and better results. Also, the cost of overhead may be reduced by introducing the online codes instead of the LT codes. References [1] H.Y. Hsieh and R. Sivakumar, ptcp: An End-to-End Transport layer Protocol for Striped Connection, in Proc.10 th IEEE International Conference Network Protocols, 2002, pp [2] R. Bin and Z. Xialoan, Enhanced Transaction TCP Design and Implementation, Internet: [Apr 22, 2011] [3] David D. Clark, The Design Philosophy of the DARPA Internet Protocols, SIGCOMM Computer Communication Review, vol. 18, no. 4, pp , Aug 1988 [4] Michael Luby, LT Codes, in Proc. 43 rd Annual IEEE Symposium on Foundation of Computer Science, 2002, pp [5] Syskonet, Link Aggregation according to IEEE 802.3ad., Internet: [May. 3, 2011]

17 Page 16 of 16 [6] P. Maymounkov, Online codes", NYU Technical Report TR , Nov 2002 [7] D.J.C. MacKay, Fountain codes, in Proc. IEEE Proceedings in Communication, vol. 152, no. 6, 2005, pp [8] J.W. Byers, M. Luby, M. Mitzenmacher, A. Rege, A Digital Fountain Approach to Reliable Distribution of Bulk Data, in Proc. ACM SIGCOMM, 1998, pp [9] Linux Foundation, bonding., Internet: [Feb 25, 2011]

Fountain Codes Based on Zigzag Decodable Coding

Fountain Codes Based on Zigzag Decodable Coding Fountain Codes Based on Zigzag Decodable Coding Takayuki Nozaki Kanagawa University, JAPAN Email: nozaki@kanagawa-u.ac.jp Abstract Fountain codes based on non-binary low-density parity-check (LDPC) codes

More information

Multi-path Forward Error Correction Control Scheme with Path Interleaving

Multi-path Forward Error Correction Control Scheme with Path Interleaving Multi-path Forward Error Correction Control Scheme with Path Interleaving Ming-Fong Tsai, Chun-Yi Kuo, Chun-Nan Kuo and Ce-Kuen Shieh Department of Electrical Engineering, National Cheng Kung University,

More information

An Efficient Transmission Scheme for Media Content Distribution Platform

An Efficient Transmission Scheme for Media Content Distribution Platform International Conference on Electronic Science and Automation Control (ESAC 2015) An Efficient Transmission Scheme for Media Content Distribution Platform Feifei Wang Digital Engineering Center Communication

More information

Efficient Content Delivery and Low Complexity Codes. Amin Shokrollahi

Efficient Content Delivery and Low Complexity Codes. Amin Shokrollahi Efficient Content Delivery and Low Complexity Codes Amin Shokrollahi Content Goals and Problems TCP/IP, Unicast, and Multicast Solutions based on codes Applications Goal Want to transport data from a transmitter

More information

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 30, 2018

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 30, 2018 CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala October 30, 2018 Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet

More information

1 Reception efficiency

1 Reception efficiency Bipartite Graph Bipartite Graph n/4 Standard Loss resilient Code n/ n Figure 1: Encoding structure of tornado code CS 493: Algorithms for Massive Data Sets Tornado Codes and Error-Correcting Codes 3/7/0

More information

Achieving Efficient Parallelism in Transport Layer using P-TCP

Achieving Efficient Parallelism in Transport Layer using P-TCP International Journal of Computer Applications in Engineering Sciences [VOL II, ISSUE I, MARCH 2012] [ISSN: 2231-4946] Achieving Efficient Parallelism in Transport Layer using P-TCP Kamalakshi N 1, H Naganna

More information

TCP and UDP Fairness in Vehicular Ad hoc Networks

TCP and UDP Fairness in Vehicular Ad hoc Networks TCP and UDP Fairness in Vehicular Ad hoc Networks Forouzan Pirmohammadi 1, Mahmood Fathy 2, Hossein Ghaffarian 3 1 Islamic Azad University, Science and Research Branch, Tehran, Iran 2,3 School of Computer

More information

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

CCNA 1 Chapter 7 v5.0 Exam Answers 2013 CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the

More information

Designing a Resource Pooling Transport Protocol

Designing a Resource Pooling Transport Protocol Designing a Resource Pooling Transport Protocol Michio Honda, Keio University Elena Balandina, Nokia Research Center Pasi Sarolahti, Nokia Research Center Lars Eggert, Nokia Research Center Global Internet

More information

Data Transport over IP Networks

Data Transport over IP Networks Data Transport over IP Networks Derek Konigsberg octo@logicprobe.org AITP University of Central Florida Data Transport over IP Networks p.1/24 Introduction The TCP/IP protocol suite was created by DARPA

More information

Network Working Group. Obsoletes: 3452, 3695 March 2009 Category: Standards Track

Network Working Group. Obsoletes: 3452, 3695 March 2009 Category: Standards Track Network Working Group M. Watson Request for Comments: 5445 Digital Fountain Obsoletes: 3452, 3695 March 2009 Category: Standards Track Status of This Memo Basic Forward Error Correction (FEC) Schemes This

More information

Network Model: Each layer has a specific function.

Network Model: Each layer has a specific function. OBJECTIVES: To discuss the OSI model and its layer architecture and to show the interface between the layers. To briefly discuss the functions of each layer in the OSI model. To introduce the TCP/IP protocol.

More information

Optimizing IP Networks for Acquisition. Presented by Henry Quintana, Director of Solutions TVU Networks

Optimizing IP Networks for Acquisition. Presented by Henry Quintana, Director of Solutions TVU Networks Optimizing IP Networks for Acquisition Presented by Henry Quintana, Director of Solutions TVU Networks More Content, Less Cost IP-based Infrastructure Limitations All transmission mediums have compromises

More information

Tree-Based Minimization of TCAM Entries for Packet Classification

Tree-Based Minimization of TCAM Entries for Packet Classification Tree-Based Minimization of TCAM Entries for Packet Classification YanSunandMinSikKim School of Electrical Engineering and Computer Science Washington State University Pullman, Washington 99164-2752, U.S.A.

More information

Page 1. Review: Internet Protocol Stack. Transport Layer Services. Design Issue EEC173B/ECS152C. Review: TCP

Page 1. Review: Internet Protocol Stack. Transport Layer Services. Design Issue EEC173B/ECS152C. Review: TCP EEC7B/ECS5C Review: Internet Protocol Stack Review: TCP Application Telnet FTP HTTP Transport Network Link Physical bits on wire TCP LAN IP UDP Packet radio Transport Layer Services Design Issue Underlying

More information

Transport Layer. Gursharan Singh Tatla. Upendra Sharma. 1

Transport Layer. Gursharan Singh Tatla.   Upendra Sharma. 1 Transport Layer Gursharan Singh Tatla mailme@gursharansingh.in Upendra Sharma 1 Introduction The transport layer is the fourth layer from the bottom in the OSI reference model. It is responsible for message

More information

Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions

Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions 2007 IEEE Communication Theory Workshop Christian R. Berger 1, Shengli Zhou 1, Yonggang Wen 2, Peter Willett 1 and

More information

CSCI-1680 Link Layer I Rodrigo Fonseca

CSCI-1680 Link Layer I Rodrigo Fonseca CSCI-1680 Link Layer I Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Last time Physical layer: encoding, modulation Today Link layer framing Getting frames

More information

CCNA R&S: Introduction to Networks. Chapter 7: The Transport Layer

CCNA R&S: Introduction to Networks. Chapter 7: The Transport Layer CCNA R&S: Introduction to Networks Chapter 7: The Transport Layer Frank Schneemann 7.0.1.1 Introduction 7.0.1.2 Class Activity - We Need to Talk Game 7.1.1.1 Role of the Transport Layer The primary responsibilities

More information

A look at the ROUTE forward ROUTE ~ Real-time Object-delivery over Unidirectional Transport

A look at the ROUTE forward ROUTE ~ Real-time Object-delivery over Unidirectional Transport A look at the ROUTE forward ROUTE ~ Real-time Object-delivery over Unidirectional Transport Michael Luby Qualcomm Technologies, Inc. Mile High Video 2018 August 1, 2018 ROUTE (Real-time Object-delivery

More information

CSCD 433/533 Advanced Networks Fall Lecture 14 RTSP and Transport Protocols/ RTP

CSCD 433/533 Advanced Networks Fall Lecture 14 RTSP and Transport Protocols/ RTP CSCD 433/533 Advanced Networks Fall 2012 Lecture 14 RTSP and Transport Protocols/ RTP 1 Topics Multimedia Player RTSP Review RTP Real Time Protocol Requirements for RTP RTP Details Applications that use

More information

Washington State University CptS 455 Sample Final Exam (corrected 12/11/2011 to say open notes) A B C

Washington State University CptS 455 Sample Final Exam (corrected 12/11/2011 to say open notes) A B C Washington State University CptS 455 Sample Final Exam (corrected 12/11/2011 to say open notes) Your name: This exam consists 13 numbered problems on 6 pages printed front and back on 3 sheets. Please

More information

Transport Protocols for Networked Games

Transport Protocols for Networked Games Transport Protocols for Networked Games 1 TCP or UDP? 2 Why use TCP? TCP provides reliable, in-order delivery TCP goes through most firewalls, UDP does not TCP manages connection for us 3 Why not to use

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Coding theory for scalable media delivery

Coding theory for scalable media delivery 1 Coding theory for scalable media delivery Michael Luby RaptorQ is a product of Qualcomm Technologies, Inc. Application layer erasure coding complements traditional error coding Forward Error Correction

More information

Simulation of TCP Layer

Simulation of TCP Layer 39 Simulation of TCP Layer Preeti Grover, M.Tech, Computer Science, Uttrakhand Technical University, Dehradun ABSTRACT The Transmission Control Protocol (TCP) represents the most deployed transport protocol

More information

Lec 19 - Error and Loss Control

Lec 19 - Error and Loss Control ECE 5578 Multimedia Communication Lec 19 - Error and Loss Control Zhu Li Dept of CSEE, UMKC Office: FH560E, Email: lizhu@umkc.edu, Ph: x 2346. http://l.web.umkc.edu/lizhu slides created with WPS Office

More information

Transport Layer. Chapter 3: Transport Layer

Transport Layer. Chapter 3: Transport Layer Transport Layer EECS 3214 Slides courtesy of J.F Kurose and K.W. Ross, All Rights Reserved 29-Jan-18 1-1 Chapter 3: Transport Layer our goals: understand principles behind layer services: multiplexing,

More information

Page 1. Review: Internet Protocol Stack. Transport Layer Services EEC173B/ECS152C. Review: TCP. Transport Layer: Connectionless Service

Page 1. Review: Internet Protocol Stack. Transport Layer Services EEC173B/ECS152C. Review: TCP. Transport Layer: Connectionless Service EEC7B/ECS5C Review: Internet Protocol Stack Review: TCP Application Telnet FTP HTTP Transport Network Link Physical bits on wire TCP LAN IP UDP Packet radio Do you remember the various mechanisms we have

More information

ECE 435 Network Engineering Lecture 10

ECE 435 Network Engineering Lecture 10 ECE 435 Network Engineering Lecture 10 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 28 September 2017 Announcements HW#4 was due HW#5 will be posted. midterm/fall break You

More information

Energy Savings for Video Streaming Using Fountain Coding

Energy Savings for Video Streaming Using Fountain Coding Energy Savings for Video Streaming Using Fountain Coding Anders Nilsson Plymoth TelHoc AB Stockholm, Sweden Email: anders@telhoc.se Zhi Zhang Department Of Electrical and Information Technology Lund University,

More information

Communication in Distributed Systems

Communication in Distributed Systems Communication in Distributed Systems Sape J. Mullender Huygens Systems Research Laboratory Universiteit Twente Enschede 1 Introduction Functions of Communication Transport data between processes, machines,

More information

UNIT IV TRANSPORT LAYER

UNIT IV TRANSPORT LAYER Transport Layer UNIT IV TRANSPORT LAYER Congestion Control and Quality of Service Ref: Data Communication & Networking, 4 th edition, Forouzan IV-1 DATA TRAFFIC The main focus of congestion control and

More information

CSCI-GA Operating Systems. Networking. Hubertus Franke

CSCI-GA Operating Systems. Networking. Hubertus Franke CSCI-GA.2250-001 Operating Systems Networking Hubertus Franke frankeh@cs.nyu.edu Source: Ganesh Sittampalam NYU TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute

More information

UDP, TCP, IP multicast

UDP, TCP, IP multicast UDP, TCP, IP multicast Dan Williams In this lecture UDP (user datagram protocol) Unreliable, packet-based TCP (transmission control protocol) Reliable, connection oriented, stream-based IP multicast Process-to-Process

More information

Summary of Raptor Codes

Summary of Raptor Codes Summary of Raptor Codes Tracey Ho October 29, 2003 1 Introduction This summary gives an overview of Raptor Codes, the latest class of codes proposed for reliable multicast in the Digital Fountain model.

More information

Internet Content Distribution

Internet Content Distribution Internet Content Distribution Chapter 1: Introduction Jussi Kangasharju Chapter Outline Introduction into content distribution Basic concepts TCP DNS HTTP Outline of the rest of the course Kangasharju:

More information

Transport Layer Review

Transport Layer Review Transport Layer Review Mahalingam Mississippi State University, MS October 1, 2014 Transport Layer Functions Distinguish between different application instances through port numbers Make it easy for applications

More information

Configuring your VLAN. Presented by Gregory Laffoon

Configuring your VLAN. Presented by Gregory Laffoon Configuring your VLAN Presented by Gregory Laffoon 1 Overview of Networking Terms Networking Terms Overview OSI Model Defines a networking framework for implementing protocols in seven layers Control is

More information

CSC310 Information Theory. Lecture 21: Erasure (Deletion) Channels & Digital Fountain Codes. November 22, 2006 see

CSC310 Information Theory. Lecture 21: Erasure (Deletion) Channels & Digital Fountain Codes. November 22, 2006 see CSC310 Information Theory Lecture 21: Erasure (Deletion) Channels & Digital Fountain Codes Sam Roweis Recovering From Erasures 2 How can we recover from erasures? For the BEC, we saw that low-density parity

More information

CSCI-1680 Link Layer Reliability Rodrigo Fonseca

CSCI-1680 Link Layer Reliability Rodrigo Fonseca CSCI-1680 Link Layer Reliability Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Last time Physical layer: encoding, modulation Link layer framing Today Getting

More information

Transport Layer. The transport layer is responsible for the delivery of a message from one process to another. RSManiaol

Transport Layer. The transport layer is responsible for the delivery of a message from one process to another. RSManiaol Transport Layer Transport Layer The transport layer is responsible for the delivery of a message from one process to another Types of Data Deliveries Client/Server Paradigm An application program on the

More information

Raptor Codes for P2P Streaming

Raptor Codes for P2P Streaming Raptor Codes for P2P Streaming Philipp Eittenberger 1, Todor Mladenov 2, Udo Krieger 1 1 Faculty of Information Systems and Applied Computer Science Otto-Friedrich University Bamberg, Germany 2 Department

More information

New Approach towards Covert Communication using TCP-SQN Reference Model

New Approach towards Covert Communication using TCP-SQN Reference Model ISSN 2278 0211 (Online) New Approach towards Covert Communication using TCP-SQN Reference Model Dhananjay M. Dakhane Department of Computer science & Engineering Sipna College of Engineering & Technology,

More information

Connectionless and Connection-Oriented Protocols OSI Layer 4 Common feature: Multiplexing Using. The Transmission Control Protocol (TCP)

Connectionless and Connection-Oriented Protocols OSI Layer 4 Common feature: Multiplexing Using. The Transmission Control Protocol (TCP) Lecture (07) OSI layer 4 protocols TCP/UDP protocols By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU Fall2014, Computer Networks II Introduction Most data-link protocols notice errors then discard frames

More information

Linux Networking: tcp. TCP context and interfaces

Linux Networking: tcp. TCP context and interfaces Linux Networking: tcp David Morgan TCP context and interfaces Computer A Computer B application process application process data data data data TCP process TCP process a network 1 TCP purposes and features

More information

CS164 Final Exam Winter 2013

CS164 Final Exam Winter 2013 CS164 Final Exam Winter 2013 Name: Last 4 digits of Student ID: Problem 1. State whether each of the following statements is true or false. (Two points for each correct answer, 1 point for each incorrect

More information

CSC310 Information Theory. Lecture 22: Erasure (Deletion) Channels & Digital Fountain Codes. November 30, 2005 see

CSC310 Information Theory. Lecture 22: Erasure (Deletion) Channels & Digital Fountain Codes. November 30, 2005 see CSC310 Information Theory Lecture 22: Erasure (Deletion) Channels & Digital Fountain Codes Sam Roweis Recovering From Erasures 2 How can we recover from erasures? For the BEC, we saw that low-density parity

More information

Week 2 / Paper 1. The Design Philosophy of the DARPA Internet Protocols

Week 2 / Paper 1. The Design Philosophy of the DARPA Internet Protocols Week 2 / Paper 1 The Design Philosophy of the DARPA Internet Protocols David D. Clark ACM CCR, Vol. 18, No. 4, August 1988 Main point Many papers describe how the Internet Protocols work But why do they

More information

TCP Flavors Simulation Evaluations over Noisy Environment

TCP Flavors Simulation Evaluations over Noisy Environment International Journal of Information Engineering and Applications 2018; 1(1): 11-17 http://www.aascit.org/journal/information TCP Flavors Simulation Evaluations over Noisy Environment Elsadig Gamaleldeen

More information

PROACTIVE RELIABLE BULK DATA DISSEMINATION IN SENSOR NETWORKS 1

PROACTIVE RELIABLE BULK DATA DISSEMINATION IN SENSOR NETWORKS 1 PROACTIVE RELIABLE BULK DATA DISSEMINATION IN SENSOR NETWORKS 1 Limin Wang Sandeep S. Kulkarni Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan

More information

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 23-1 PROCESS-TO-PROCESS DELIVERY The transport

More information

Stream Control Transmission Protocol (SCTP)

Stream Control Transmission Protocol (SCTP) Stream Control Transmission Protocol (SCTP) Definition Stream control transmission protocol (SCTP) is an end-to-end, connectionoriented protocol that transports data in independent sequenced streams. SCTP

More information

COMP750. Distributed Systems. Network Overview

COMP750. Distributed Systems. Network Overview COMP750 Distributed Systems Network Overview Network Standards The purpose of a network is to allow two computers to communicate. Ex: The electrical power network in North America follows a standard to

More information

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs Jin Liu 1, Hongmin Ren 1, Jun Wang 2, Jin Wang 2 1 College of Information Engineering, Shanghai Maritime University,

More information

Lecture (11) OSI layer 4 protocols TCP/UDP protocols

Lecture (11) OSI layer 4 protocols TCP/UDP protocols Lecture (11) OSI layer 4 protocols TCP/UDP protocols Dr. Ahmed M. ElShafee ١ Agenda Introduction Typical Features of OSI Layer 4 Connectionless and Connection Oriented Protocols OSI Layer 4 Common feature:

More information

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016 Internet Technology 06. Exam 1 Review Paul Krzyzanowski Rutgers University Spring 2016 March 2, 2016 2016 Paul Krzyzanowski 1 Question 1 Defend or contradict this statement: for maximum efficiency, at

More information

HTTP/2: What You Need to Know. Robert

HTTP/2: What You Need to Know. Robert HTTP/2: What You Need to Know Robert Boedigheimer @boedie About Me Web developer since 1995 Pluralsight Author 3 rd Degree Black Belt, Tae Kwon Do ASP.NET MVP boedie@outlook.com @boedie weblogs.asp.net/boedie

More information

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University

More information

Lecture 8: February 19

Lecture 8: February 19 CMPSCI 677 Operating Systems Spring 2013 Lecture 8: February 19 Lecturer: Prashant Shenoy Scribe: Siddharth Gupta 8.1 Server Architecture Design of the server architecture is important for efficient and

More information

User Datagram Protocol (UDP):

User Datagram Protocol (UDP): SFWR 4C03: Computer Networks and Computer Security Feb 2-5 2004 Lecturer: Kartik Krishnan Lectures 13-15 User Datagram Protocol (UDP): UDP is a connectionless transport layer protocol: each output operation

More information

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted

More information

! " Lecture 5: Networking for Games (cont d) Packet headers. Packet footers. IP address. Edge router (cable modem, DSL modem)

!  Lecture 5: Networking for Games (cont d) Packet headers. Packet footers. IP address. Edge router (cable modem, DSL modem) Lecture 5: Networking for Games (cont d) Special Send case: to NAT 123.12.2.10 network 192.168.1.101 17.4.9.33 192.168.1.100 123.12.2.[0-128] IP address 23.11.3.10 Edge router (cable modem, DSL modem)

More information

TCP/IP Protocol Suite 1

TCP/IP Protocol Suite 1 TCP/IP Protocol Suite 1 Stream Control Transmission Protocol (SCTP) TCP/IP Protocol Suite 2 OBJECTIVES: To introduce SCTP as a new transport-layer protocol. To discuss SCTP services and compare them with

More information

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Transport Layer Network Fundamentals Chapter 4 Version 4.0 1 Transport Layer Role and Services Transport layer is responsible for overall end-to-end transfer of application data 2 Transport Layer Role

More information

TCP Multi-homing Support in Heterogeneous Networks

TCP Multi-homing Support in Heterogeneous Networks , March 13-15, 2013, Hong Kong TCP Multi-homing Support in Heterogeneous Networks Dang Duc Nguyen, Yang Xia, Chai Kiat Yeo, Bu Sung Lee Abstract Mobile technology provides users with ubiquitous connectivity

More information

Intro to LAN/WAN. Transport Layer

Intro to LAN/WAN. Transport Layer Intro to LAN/WAN Transport Layer Transport Layer Topics Introduction (6.1) Elements of Transport Protocols (6.2) Internet Transport Protocols: TDP (6.5) Internet Transport Protocols: UDP (6.4) socket interface

More information

CS 43: Computer Networks. 15: Transport Layer & UDP October 5, 2018

CS 43: Computer Networks. 15: Transport Layer & UDP October 5, 2018 CS 43: Computer Networks 15: Layer & UDP October 5, 2018 Reading Quiz Lecture 15 - Slide 2 Layer Moving down a layer. Current perspective: lication is the boss Usually executing within the OS kernel. The

More information

LT Erasure Codes. 1 Introduction. Interview: Tuesday, Jan 24th, TBD

LT Erasure Codes. 1 Introduction. Interview: Tuesday, Jan 24th, TBD Programming Comps - January 17-24, 2012 LT Erasure Codes Out: Tuesday, Jan 17th, 2012 9AM Due: Saturday, Jan 21st, 2012, 11:59AM Interview: Tuesday, Jan 24th, TBD 1 Introduction Erasure codes are a type

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

TCP based Receiver Assistant Congestion Control

TCP based Receiver Assistant Congestion Control International Conference on Multidisciplinary Research & Practice P a g e 219 TCP based Receiver Assistant Congestion Control Hardik K. Molia Master of Computer Engineering, Department of Computer Engineering

More information

Congestion Control in Datacenters. Ahmed Saeed

Congestion Control in Datacenters. Ahmed Saeed Congestion Control in Datacenters Ahmed Saeed What is a Datacenter? Tens of thousands of machines in the same building (or adjacent buildings) Hundreds of switches connecting all machines What is a Datacenter?

More information

Campus Networking Workshop. Layer 2 engineering Spanning Tree and VLANs

Campus Networking Workshop. Layer 2 engineering Spanning Tree and VLANs Campus Networking Workshop Layer 2 engineering Spanning Tree and VLANs Switching Loop When there is more than one path between two switches What are the potential problems? Switching Loop If there is more

More information

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

More information

Digital Asset Management 5. Streaming multimedia

Digital Asset Management 5. Streaming multimedia Digital Asset Management 5. Streaming multimedia 2015-10-29 Keys of Streaming Media Algorithms (**) Standards (*****) Complete End-to-End systems (***) Research Frontiers(*) Streaming... Progressive streaming

More information

Is Physical Layer Error Correction sufficient for Video Multicast over IEEE g Networks?

Is Physical Layer Error Correction sufficient for Video Multicast over IEEE g Networks? Is Physical Layer Error Correction sufficient for Video Multicast over IEEE 82.11g Networks? Özgü Alay, Thanasis Korakis, Yao Wang, and Shivendra Panwar Department of Electrical and Computer Engineering,

More information

CSCI-1680 Transport Layer III Congestion Control Strikes Back Rodrigo Fonseca

CSCI-1680 Transport Layer III Congestion Control Strikes Back Rodrigo Fonseca CSCI-1680 Transport Layer III Congestion Control Strikes Back Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti, Ion Stoica Last Time Flow Control Congestion Control

More information

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print, ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure

More information

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 25, 2018

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 25, 2018 CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet IP

More information

Internet Technology 3/2/2016

Internet Technology 3/2/2016 Question 1 Defend or contradict this statement: for maximum efficiency, at the expense of reliability, an application should bypass TCP or UDP and use IP directly for communication. Internet Technology

More information

Improving the quality of H.264 video transmission using the Intra-Frame FEC over IEEE e networks

Improving the quality of H.264 video transmission using the Intra-Frame FEC over IEEE e networks Improving the quality of H.264 video transmission using the Intra-Frame FEC over IEEE 802.11e networks Seung-Seok Kang 1,1, Yejin Sohn 1, and Eunji Moon 1 1Department of Computer Science, Seoul Women s

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/8/14 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

Performance Enhancement Of TCP For Wireless Network

Performance Enhancement Of TCP For Wireless Network P a g e 32 Vol. 10 Issue 12 (Ver. 1.0) October 2010 Global Journal of Computer Science and Technology Performance Enhancement Of TCP For Wireless Network 1 Pranab Kumar Dhar, 2 Mohammad Ibrahim Khan, 3

More information

Introduction to OSI model and Network Analyzer :- Introduction to Wireshark

Introduction to OSI model and Network Analyzer :- Introduction to Wireshark Sungkyunkwan University Introduction to OSI model and Network Analyzer :- Introduction to Wireshark Syed Muhammad Raza s.moh.raza@gmail.com Copyright 2000-2015 Networking Laboratory 1/56 An Overview of

More information

SharkFest'17 US. Understanding Throughput & TCP Windows. A Walk-Through of the Factors that can limit TCP Throughput Performance

SharkFest'17 US. Understanding Throughput & TCP Windows. A Walk-Through of the Factors that can limit TCP Throughput Performance SharkFest'17 US Understanding Throughput & TCP Windows A Walk-Through of the Factors that can limit TCP Throughput Performance Kary Rogers Director, Staff Engineering Riverbed Technology Agenda TCP ownership

More information

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking

More information

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16 Guide To TCP/IP, Second Edition Chapter 5 Transport Layer TCP/IP Protocols Objectives Understand the key features and functions of the User Datagram Protocol (UDP) Explain the mechanisms that drive segmentation,

More information

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1 Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 23-1 PROCESS-TO-PROCESS DELIVERY 23.2 The transport

More information

STEVEN R. BAGLEY PACKETS

STEVEN R. BAGLEY PACKETS STEVEN R. BAGLEY PACKETS INTRODUCTION Talked about how data is split into packets Allows it to be multiplexed onto the network with data from other machines But exactly how is it split into packets and

More information

A Fuzzy System for Adaptive Network Routing

A Fuzzy System for Adaptive Network Routing A Fuzzy System for Adaptive Network Routing A. Pasupuleti *, A.V. Mathew*, N. Shenoy** and S. A. Dianat* Rochester Institute of Technology Rochester, NY 14623, USA E-mail: axp1014@rit.edu Abstract In this

More information

n Understand EC-Council s scanning methodology n Describe scan types and the objectives of scanning

n Understand EC-Council s scanning methodology n Describe scan types and the objectives of scanning Outline n Understand EC-Council s scanning methodology n Describe scan types and the objectives of scanning n Understand the use of various scanning and enumeration tools Chapter #3: n Describe TCP communication

More information

CSE 461 MIDTERM REVIEW

CSE 461 MIDTERM REVIEW CSE 461 MIDTERM REVIEW NETWORK LAYERS & ENCAPSULATION Application Application Transport Transport Network Network Data Link/ Physical Data Link/ Physical APPLICATION LAYER Application Application Used

More information

Computer Network Programming

Computer Network Programming Computer Network Programming SCTP Overview Dr. Sam Hsu Computer Science & Engineering Florida Atlantic University SCTP Overview Introduction Motivations Architectural & Functional Views Packet & Chunk

More information

A UDP-Based Protocol for improving packets loss in unstable networks

A UDP-Based Protocol for improving packets loss in unstable networks International Conference on Internet Studies, July 18-19, 2015, Tokyo, Japan A UDP-Based Protocol for improving packets loss in unstable networks Wei-Chung Cheng, Wei-Tsong Lee, Hsin-Wen Wei Tamkang University,

More information

CS 268: Computer Networking. Taking Advantage of Broadcast

CS 268: Computer Networking. Taking Advantage of Broadcast CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic

More information

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols Volume 1, Issue 3, October 2013 ISSN: 2320-9984 (Online) International Journal of Modern Engineering & Management Research Website: www.ijmemr.org Effect of Variable Bit Rate Traffic Models on the Energy

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

Homework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca

Homework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca CSCI 1680 Computer Networks Fonseca Homework 1 Due: 27 September 2012, 4pm Question 1 - Layering a. Why are networked systems layered? What are the advantages of layering? Are there any disadvantages?

More information

THE NETWORK PERFORMANCE OVER TCP PROTOCOL USING NS2

THE NETWORK PERFORMANCE OVER TCP PROTOCOL USING NS2 THE NETWORK PERFORMANCE OVER TCP PROTOCOL USING NS2 Ammar Abdulateef Hadi, Raed A. Alsaqour and Syaimak Abdul Shukor School of Computer Science, Faculty of Information Science and Technology, University

More information