Large-Scale Scanning of TCP s Initial Window
|
|
- Patrick Watts
- 6 years ago
- Views:
Transcription
1 Large-Scale Scanning of TCP s Initial Window Jan Rüth, Christian Bormann, Oliver Hohlfeld London / IMC, November 2017
2 Why look at Initial Windows? Higher initial window àpotential to transmit more data in fewer roundtrips 600 CWND Initial Window unacknowledged bytes in flight in first round typically as a multiple of the MSS RTT 3 Jan Rüth, Christian Bormann, Oliver Hohlfeld 4
3 Why look at Initial Windows? Amount of data bursted in an unprobed network 50 CWND At the start, we don t know the bottleneck capacity 3 0 RTT Jan Rüth, Christian Bormann, Oliver Hohlfeld 1
4 Why now? IW : RFC 2414 experimental IWs measured Padhye and Floyd SIGCOMM 01 IWs in ISP Qian et al. IMC : RFC 6928 experimental IW 1 Van Jacobsen SIGCOMM 88 IW : RFC 2001 standardized IW : RFC 3390 standardized Dukkipati et al. SIGCOMM CCR 2010 Linux Kernel 2011 IWs measured Medina et al. SIGCOMM CCR Jan Rüth, Christian Bormann, Oliver Hohlfeld
5 Why now? IW : RFC 2414 experimental IWs measured Padhye and Floyd SIGCOMM 01 IWs in ISP Qian et al. IMC : RFC 6928 experimental IW 1 Van Jacobsen SIGCOMM 88 IW : RFC 2001 standardized IW : RFC 3390 standardized Dukkipati et al. SIGCOMM CCR 2010 Linux Kernel 2011 IWs measured Medina et al. SIGCOMM CCR Jan Rüth, Christian Bormann, Oliver Hohlfeld
6 Why now? IW : RFC 2414 experimental IWs measured Padhye and Floyd SIGCOMM 01 IWs in ISP Qian et al. IMC : RFC 6928 experimental Paper Goal: Actively monitor IWs in entire IPv4 space IW 1 Van Jacobsen SIGCOMM 88 IW : RFC 2001 standardized IW : RFC 3390 standardized Dukkipati et al. SIGCOMM CCR 2010 Linux Kernel 2011 IWs measured Medina et al. SIGCOMM CCR Jan Rüth, Christian Bormann, Oliver Hohlfeld
7 Rüth et al. Measuring IWs Our Scanner Probed Host SYN [MSS=...,WIN=...] Loss is a problem Actually tail-loss SYN, ACK ACK, REQUEST Estimate MSS Estimate IW=n Verify IW full Do multiple scans Scan early in the morning ACK, SEG 1 SEG n SEG 1 ACK n+1, WIN=2 MSS SEG n+1 SEG n+2 RST Timeout Retransmission Disable tail-loss probes ¾ Do not enable SACK Trigger big response and Announce MSS and large gure 1: Scan procedure: small A small MSS is announced andreceive vered, preventing to run out of data prior to reaching IW. The Use ACK to test for more data imated IW is the # bytes received before retransmission. window Was the host out of data or was the IW actually full? stop sending before reaching the full IW size if the request not trigger a large enough response. As in [18], we do not Jan Rüth, Christian Bormann, Oliver Hohlfeld d 7acknowledgments causing the remote end not to increase the
8 Measuring IWs Probe without prior knowledge Send a client hello as the request Server hello contain certificate chains variants elow that nitor the m for our ds to trigail in the etermine they are Fails smission received In case a e of more umber of 8 CCDF IMC 17, options November 1 3, 2017,the London, Kingdom We further request enlarging replyunited (e.g., cert stapling) Certificate Chain Length MSS 64, IW 1/2/4/10 MSS 1336, IW 1/2/ Size in kb Figure 2: CCDF of certi cate chain length of 36.5M hosts from censys.io TCP payload sizes covered with several when SNI isdata. enforced IWs using MSS of 64 and a typical MSS of 1336 B.1 the scan, anticipating a long enough response. We choose the URI to ll up the MTU of our connection, thus transmitting more bytes Jan Rüth, Christian Bormann, Oliver Hohlfeld than we announced we would be capable of in the MSS.
9 Scanner implementation We want to probe all reachable IPv4 / hosts We implement the methodology in Zmap Bypasses the kernel stack Typically only used for enumeration We enable Zmap to send multiple packets We can manually craft connections and manipulate them Modified Zmap, / scanners available on Github 9 Jan Rüth, Christian Bormann, Oliver Hohlfeld
10 Fraction of IPs [%] Results IPv4 / % 30% 100% 50 % 10 % Initial Window Size 25 and do not agree Many hosts still use IW 4 scan triggers many abuse mails In contrast to, this appears in access logs How much scanning is enough? 10 10% 50% 100 % 30 % 1 % Jan Rüth, Christian Bormann, Oliver Hohlfeld
11 Fraction of IPs [%] Results IPv4 / % 30% 100% 50 % 10 % % 5 6 seems to 20 be 25 30enough Scanning Initial Window Size and do not agree Many hosts still use IW 4 scan triggers many abuse mails In contrast to, this appears in access logs How much scanning is enough? 11 10% 50% 100 % 30 % 1 % Jan Rüth, Christian Bormann, Oliver Hohlfeld
12 Results Who uses which IW? IMC 17, November 1 3, 2017, London, United Kingdom % 80% 105 7% 8% 7% 11% Service IW1 IW2 IW4 IW10 IW1 IW2 IW4 IW Akamai EC Cloud are Azure Access NW Initial Window Size Figure 5: Distribution of IWs per AS. Left, 3 and 3 clusters of ASs standing out. Right, representatives of these clusters or ASs that do not t into the clusters # IPs Rüth et Table 3: Per-service IW distribution [%] clustered by IP ran (servers) or reverse DNS (access). Dominant IWs highlight reachable hosts within the entire IPv4 address space. In light of ongoing debate on IW sizes, our study provides an up-to-date v of the current Internet-wide IW con gurations documenting slow adherence Here: similar distribution for and to RFC recommended changes of the IW. and ) with nearly exclusive use of mostly compromise The main result of our study is a rather network dependent content provider, e.g., hosters, cloud provider, and CDNs. ASes with con guration. Since especially service providers can bene t fr many IW 2 based hosts belong to ISPs or in case of also to larger IWs, their adoption (or even larger IWs) is high. universities. The cluster for IW 4 is a mixture between ISPs and also noted service speci c customizations, e.g., Akamai enables hosters. While the measurement shows more ISPs, the service and even per-customer speci c IW con gurations. Si measurement stands out with an AS from Akamai that use IW 4. In these services are virtualized, analyzing such service (not h case of GoDaddy, 19.8% (32.7%) of the 137 k (193 k ) hosts -speci c con gurations requires prior knowledge to present va that were announced by AS26496 (704 pre xes) use an IW of 48. We host names/urls a setting our generalized methodology avoid remark that the number of GoDaddy hosts is 1% which is why be applicable to the Internet at large. Circumventing this limitat this IW peak is not clearly visible in Figure 3. Unlike our previous by probing selected services with manually curated URL lists t observed 4 kb IW hosts, these hosts use a static con guration of motivates future work. In contrast, networks with a larger fract IW 48, irrespective of the announced MSS. We found no obvious of legacy and other devices show a much lower deploym reason for these comparably large IWs. Jan Rüth, Christian Bormann, and higher shares of older recommended IW sizes (i.e., 1, 2, 4) Oliver Hohlfeld 12 We nd a diverse picture of di erent IW con gurations. To comcase of Linux, this can be caused by outdated systems since IW Most people in the Alexa list follow current RFCs Generally, we see older IWs in Access Networks CDNs and Cloud seem to be more up to date
13 Conclusion Distributions dominated by RFC-recommended values Still a lot of IW 2 and IW 4 Heavily used infrastructure and popular hosts seem to be on We also find some customization Some hosts have very large IWs Periodic 1% scans are available at Source code available at 13 Jan Rüth, Christian Bormann, Oliver Hohlfeld
On the use of TCP's Initial Congestion Window in IPv4 and by Content Delivery Networks
On the use of TCP's Initial Congestion Window in IPv4 and by Content Delivery Networks Jan Rüth, Christian Bormann, Oliver Hohlfeld http://comsys.rwth-aachen.de/ London / IETF-11, March 218 Why look at
More informationA First Look at QUIC in the Wild
A First Look at QUIC in the Wild Jan Rüth 1, Ingmar Poese 2, Christoph Dietzel 3, Oliver Hohlfeld 1 1 : RWTH Aachen University 2 : Benocs GmbH 3 : TU Berlin / DE-CIX http://comsys.rwth-aachen.de/ London
More informationAdoption, Human Perception, and Performance of HTTP/2 Server Push
Adoption, Human Perception, and Performance of HTTP/2 Server Push https://comsys.rwth-aachen.de London / IETF 101 maprg, 23.2018 Why focus on HTTP/2 (H2) Server Push? H2 major changes over H1 Binary, single
More informationFast Retransmit. Problem: coarsegrain. timeouts lead to idle periods Fast retransmit: use duplicate ACKs to trigger retransmission
Fast Retransmit Problem: coarsegrain TCP timeouts lead to idle periods Fast retransmit: use duplicate ACKs to trigger retransmission Packet 1 Packet 2 Packet 3 Packet 4 Packet 5 Packet 6 Sender Receiver
More informationTCP WISE: One Initial Congestion Window Is Not Enough
TCP WISE: One Initial Congestion Window Is Not Enough Xiaohui Nie $, Youjian Zhao $, Guo Chen, Kaixin Sui, Yazheng Chen $, Dan Pei $, MiaoZhang, Jiyang Zhang $ 1 Motivation Web latency matters! latency
More informationCS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control
: Computer Networks Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control TCP performance We ve seen how TCP the protocol works Sequencing, receive window, connection setup and teardown And
More informationBack-Office Web Traffic on the Internet. IMC 2014 Vancouver, BC, CANADA November 5-7, 2014
Back-Office Web Traffic on the Internet Enric Pujol Philipp Richter Balakrishnan Chandrasekaran Georgios Smaragdakis Anja Feldmann Bruce Maggs Keung- Chi Ng TU- Berlin TU- Berlin Duke University MIT /
More informationECE 435 Network Engineering Lecture 10
ECE 435 Network Engineering Lecture 10 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 28 September 2017 Announcements HW#4 was due HW#5 will be posted. midterm/fall break You
More informationimage 3.8 KB Figure 1.6: Example Web Page
image. KB image 1 KB Figure 1.: Example Web Page and is buffered at a router, it must wait for all previously queued packets to be transmitted first. The longer the queue (i.e., the more packets in the
More informationCongestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014
1 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2014 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion
More informationCongestion Control End Hosts. CSE 561 Lecture 7, Spring David Wetherall. How fast should the sender transmit data?
Congestion Control End Hosts CSE 51 Lecture 7, Spring. David Wetherall Today s question How fast should the sender transmit data? Not tooslow Not toofast Just right Should not be faster than the receiver
More informationCMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 25, 2018
CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet IP
More informationCongestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014
1 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2014 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion
More informationTCP Performance. EE 122: Intro to Communication Networks. Fall 2006 (MW 4-5:30 in Donner 155) Vern Paxson TAs: Dilip Antony Joseph and Sukun Kim
TCP Performance EE 122: Intro to Communication Networks Fall 2006 (MW 4-5:30 in Donner 155) Vern Paxson TAs: Dilip Antony Joseph and Sukun Kim http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks
More informationNetworked Systems and Services, Fall 2018 Chapter 3
Networked Systems and Services, Fall 2018 Chapter 3 Jussi Kangasharju Markku Kojo Lea Kutvonen 4. Transport Layer Reliability with TCP Transmission Control Protocol (TCP) RFC 793 + more than hundred other
More informationNetworked Systems and Services, Fall 2017 Reliability with TCP
Networked Systems and Services, Fall 2017 Reliability with TCP Jussi Kangasharju Markku Kojo Lea Kutvonen 4. Transmission Control Protocol (TCP) RFC 793 + more than hundred other RFCs TCP Loss Recovery
More informationCongestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015
1 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2015 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion
More informationCOMP/ELEC 429/556 Introduction to Computer Networks
COMP/ELEC 429/556 Introduction to Computer Networks The TCP Protocol Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng at cs.rice.edu
More informationInternet Networking recitation #10 TCP New Reno Vs. Reno
recitation #0 TCP New Reno Vs. Reno Spring Semester 200, Dept. of Computer Science, Technion 2 Introduction Packet Loss Management TCP Reno (RFC 258) can manage a loss of at most one packet from a single
More informationOverview. TCP & router queuing Computer Networking. TCP details. Workloads. TCP Performance. TCP Performance. Lecture 10 TCP & Routers
Overview 15-441 Computer Networking TCP & router queuing Lecture 10 TCP & Routers TCP details Workloads Lecture 10: 09-30-2002 2 TCP Performance TCP Performance Can TCP saturate a link? Congestion control
More informationAkamai's V6 Rollout Plan and Experience from a CDN Point of View. Christian Kaufmann Director Network Architecture Akamai Technologies, Inc.
Akamai's V6 Rollout Plan and Experience from a CDN Point of View Christian Kaufmann Director Network Architecture Akamai Technologies, Inc. Agenda About Akamai General IPv6 transition technologies Challenges
More informationStudying Fairness of TCP Variants and UDP Traffic
Studying Fairness of TCP Variants and UDP Traffic Election Reddy B.Krishna Chaitanya Problem Definition: To study the fairness of TCP variants and UDP, when sharing a common link. To do so we conduct various
More informationIPv6: Are we really ready to turn off IPv4? Geoff Huston APNIC
IPv6: Are we really ready to turn off IPv4? Geoff Huston APNIC The IPv6 Timeline 1990 2000 2010 2020 The IPv6 Timeline Yes, we ve been working on this for close to 30 years! 1990 2000 2010 2020 In-situ
More informationCongestion Control. Brighten Godfrey CS 538 January Based in part on slides by Ion Stoica
Congestion Control Brighten Godfrey CS 538 January 31 2018 Based in part on slides by Ion Stoica Announcements A starting point: the sliding window protocol TCP flow control Make sure receiving end can
More informationTCP Strategies. Keepalive Timer. implementations do not have it as it is occasionally regarded as controversial. between source and destination
Keepalive Timer! Yet another timer in TCP is the keepalive! This one is not required, and some implementations do not have it as it is occasionally regarded as controversial! When a TCP connection is idle
More informationIPv6: Are we really ready to turn off IPv4?
IPv6: Are we really ready to turn off IPv4? In-situ transition In-situ transition Phase 1 Early Deployment IPv4 Internet Edge Dual-Stack Networks IPv6 networks interconnect by IPv6-over-IPv4 tunnels In-situ
More informationECE 461 Internetworking. Problem Sheet 6
ECE 461 Internetworking Problem Sheet 6 Problem 1. Consider the state of a sliding window at the sending side of a TCP connections as shown in Figure 1. (Each number corresponds to one byte).. (a) Explain
More informationA Client-side Split-ACK Tool for TCP Slow Start Investigation. Master thesis. Rolf Erik G. Normann. UNIVERSITY OF OSLO Department of Informatics
UNIVERSITY OF OSLO Department of Informatics A Client-side Split-ACK Tool for TCP Slow Start Investigation Master thesis Rolf Erik G. Normann 2011-08-01 A Client-side Split-ACK Tool for TCP Slow Start
More informationTBIT: TCP Behavior Inference Tool
TBIT: TCP Behavior Inference Tool Jitendra Padhye Sally Floyd AT&T Center for Internet Research at ICSI (ACIRI) http://www.aciri.org/tbit/ 1 of 24 Outline of talk Motivation Description of the tool Results
More informationNon-Cooperative End-to-End Path Characterisation
Non-Cooperative End-to-End Path Characterisation Kapil Bajaj, Balaji Kasal, Harshal Ninawe, Sriharsha and D. Manjunath Indian Institute of Technology, Bombay Powai Mumbai 400 076 INDIA Email: {kapil@cse,balaji@ee,hani@cse,harsha@ee,dmanju@ee}.iitb.ac.in
More informationTCP Congestion Control
TCP Congestion Control What is Congestion The number of packets transmitted on the network is greater than the capacity of the network Causes router buffers (finite size) to fill up packets start getting
More informationTCP Congestion Control
What is Congestion TCP Congestion Control The number of packets transmitted on the network is greater than the capacity of the network Causes router buffers (finite size) to fill up packets start getting
More informationConfiguring IP TCP MSS
Finding Feature Information, page 1 Feature History for IP TCP MSS, page 2 Information About IP TCP MSS, page 2 Licensing Requirements for IP TCP MSS, page 3 Default Settings for IP TCP MSS, page 3 Guidelines
More informationA Hybrid Systems Modeling Framework for Fast and Accurate Simulation of Data Communication Networks. Motivation
A Hybrid Systems Modeling Framework for Fast and Accurate Simulation of Data Communication Networks Stephan Bohacek João P. Hespanha Junsoo Lee Katia Obraczka University of Delaware University of Calif.
More informationAnswers to Sample Questions on Transport Layer
Answers to Sample Questions on Transport Layer 1) Which protocol Go-Back-N or Selective-Repeat - makes more efficient use of network bandwidth? Why? Answer: Selective repeat makes more efficient use of
More informationTCP modifications for Congestion Exposure
TCP modifications for Congestion Exposure ConEx 82. IETF Taipei November 17, 2011 draft-kuehlewind-conex-tcp-modifications-01 Mirja Kühlewind Richard Scheffenegger
More information8. TCP Congestion Control
8. TCP Congestion Control 1 TCP Congestion Control Slow-start increase Multiplicative decrease Congestion avoidance Measurement of variation Exponential timer backoff 2002 Yanghee Choi 2 Congestion Control
More informationAkamai's V6 Rollout Plan and Experience from a CDN Point of View. Christian Kaufmann Director Network Architecture Akamai Technologies, Inc.
Akamai's V6 Rollout Plan and Experience from a CDN Point of View Christian Kaufmann Director Network Architecture Akamai Technologies, Inc. Agenda About Akamai General IPv6 transition technologies Challenges
More informationCongestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015
Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2015 1 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion
More informationPerformance Consequences of Partial RED Deployment
Performance Consequences of Partial RED Deployment Brian Bowers and Nathan C. Burnett CS740 - Advanced Networks University of Wisconsin - Madison ABSTRACT The Internet is slowly adopting routers utilizing
More informationActive Measurement of Data-Path Quality in a Non-cooperative Internet
Active Measurement of Data-Path Quality in a Non-cooperative Internet Rocky K. C. Chang Internet Infrastructure and Security Group 7 Oct. 2010 Active Measurement of Data-Path Quality in a Non-cooperative
More informationCongestion Control. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Congestion Control Daniel Zappala CS 460 Computer Networking Brigham Young University 2/25 Congestion Control how do you send as fast as possible, without overwhelming the network? challenges the fastest
More information6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1
6. Transport Layer 6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6.1 Internet Transport Layer Architecture The
More informationTCP Sendbuffer Advertising. Costin Raiciu University Politehnica of Bucharest
TCP Sendbuffer Advertising Costin Raiciu University Politehnica of Bucharest Problem statement There is only so much we can find about about a connection by looking at in flight packets (losses, retransmissions,
More informationImpact of High TCP s Initial Window in Congested Links
Impact of High TCP s Initial Window in Congested Links Balekaki Gerald Nathan 1 and Idris A. Rai 2 1 Makerere University P.O.Box 7062 Kampala, Uganda balekaki.gerald@gmail.com 2 rai@cit.mak.ac.ug Abstract.
More informationHybrid Control and Switched Systems. Lecture #17 Hybrid Systems Modeling of Communication Networks
Hybrid Control and Switched Systems Lecture #17 Hybrid Systems Modeling of Communication Networks João P. Hespanha University of California at Santa Barbara Motivation Why model network traffic? to validate
More informationAn In-depth Study of LTE: Effect of Network Protocol and Application Behavior on Performance
An In-depth Study of LTE: Effect of Network Protocol and Application Behavior on Performance Authors: Junxian Huang, Feng Qian, Yihua Guo, Yuanyuan Zhou, Qiang Xu, Z. Morley Mao, Subhabrata Sen, Oliver
More informationTCP Tuning for the Web
TCP Tuning for the Web Jason Cook - @macros - jason@fastly.com Me Co-founder and Operations at Fastly Former Operations Engineer at Wikia Lots of Sysadmin and Linux consulting The Goal Make the best use
More informationManaging Caching Performance and Differentiated Services
CHAPTER 10 Managing Caching Performance and Differentiated Services This chapter explains how to configure TCP stack parameters for increased performance ant throughput and how to configure Type of Service
More informationHost Solutions Group Technical Bulletin August 30, 2007
Summary ISCSI PERFORMANCE CONSIDERATIONS Host Solutions Group Technical Bulletin August 30, 2007 Meeting throughput and response time requirements in iscsi SANs requires considering both component and
More informationSaaS Providers. ThousandEyes for. Summary
USE CASE ThousandEyes for SaaS Providers Summary With Software-as-a-Service (SaaS) applications rapidly replacing onpremise solutions, the onus of ensuring a great user experience for these applications
More informationThe Guide to Best Practices in PREMIUM ONLINE VIDEO STREAMING
AKAMAI.COM The Guide to Best Practices in PREMIUM ONLINE VIDEO STREAMING PART 3: STEPS FOR ENSURING CDN PERFORMANCE MEETS AUDIENCE EXPECTATIONS FOR OTT STREAMING In this third installment of Best Practices
More informationOn the State of ECN and TCP Options on the Internet
On the State of ECN and TCP Options on the Internet PAM 2013, March 19, Hong Kong Mirja Kühlewind Sebastian Neuner Brian
More informationINGI1341: Project 2 Analysis of a website
INGI3141:PROJECT 2 1 INGI1341: Project 2 Analysis of a website Sergio Alejandro Chávez Cárdenas Abstract The details of a remote website sopitas.com are analysed and its responses over the Internet are
More informationResults of a security assessment of the TCP and IP protocols and common implementation strategies
Results of a security assessment of the TCP and IP protocols and common implementation strategies Fernando Gont project carried out on behalf of UK CPNI DEEPSEC 2009 Conference November 17-20, 2009. Vienna,
More informationThousandEyes for. Application Delivery White Paper
ThousandEyes for Application Delivery White Paper White Paper Summary The rise of mobile applications, the shift from on-premises to Software-as-a-Service (SaaS), and the reliance on third-party services
More informationCMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 30, 2018
CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala October 30, 2018 Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet
More informationCongestion Control. Lecture 12: TCP Friendliness, DCCP, NATs, and STUN. Chiu Jain Phase Plots. Fair A=B. Responding to Loss. Flow B rate (bps) t 1 t 3
Congestion Control Lecture 12: TCP Friendliness, DCCP, s, and STUN TCP dynamically adapts its rate in response to congestion AIMD causes flows to converge to fair goodput But how do losses (e.g., bit errors)
More informationA Client-side Split ACK Tool for TCP Slow Start Investigation. Master Thesis. Rolf Erik G. Normann. UNIVERSITY OF OSLO Department of Informatics
UNIVERSITY OF OSLO Department of Informatics A Client-side Split ACK Tool for TCP Slow Start Investigation Master Thesis Rolf Erik G. Normann 2011-08-01 A Client-side Split ACK Tool for TCP Slow Start
More informationCSE/EE 461 Lecture 16 TCP Congestion Control. TCP Congestion Control
CSE/EE Lecture TCP Congestion Control Tom Anderson tom@cs.washington.edu Peterson, Chapter TCP Congestion Control Goal: efficiently and fairly allocate network bandwidth Robust RTT estimation Additive
More informationTCP with dynamic FEC For High Delay and Lossy Networks. Simone Ferlin and Ozgu Alay Simula Research Laboratory, Norway
TCP with dynamic FEC For High Delay and Lossy Networks Simone Ferlin and Ozgu Alay Simula Research Laboratory, Norway TCP: Loss detection and recovery - Introduction TCP has been regularly changed over
More informationTransport Over IP. CSCI 690 Michael Hutt New York Institute of Technology
Transport Over IP CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP What is a transport protocol? Choosing to use a transport protocol Ports and Addresses Datagrams UDP What is a
More informationAppendix B. Standards-Track TCP Evaluation
215 Appendix B Standards-Track TCP Evaluation In this appendix, I present the results of a study of standards-track TCP error recovery and queue management mechanisms. I consider standards-track TCP error
More informationAn Argument for Increasing TCP s Initial Congestion Window
An Argument for Increasing TCP s Initial Congestion Window Nandita Dukkipati, Tiziana Refice, Yuchung Cheng, Jerry Chu Tom Herbert, Amit Agarwal, Arvind Jain and Natalia Sutin Google Inc. Mountain View,
More informationTCP. CSU CS557, Spring 2018 Instructor: Lorenzo De Carli (Slides by Christos Papadopoulos, remixed by Lorenzo De Carli)
TCP CSU CS557, Spring 2018 Instructor: Lorenzo De Carli (Slides by Christos Papadopoulos, remixed by Lorenzo De Carli) 1 Sources Fall and Stevens, TCP/IP Illustrated Vol. 1, 2nd edition Congestion Avoidance
More informationAnnouncements Computer Networking. Outline. Transport Protocols. Transport introduction. Error recovery & flow control. Mid-semester grades
Announcements 15-441 Computer Networking Lecture 16 Transport Protocols Mid-semester grades Based on project1 + midterm + HW1 + HW2 42.5% of class If you got a D+,D, D- or F! must meet with Dave or me
More informationsequence number trillian:1166_==>_marvin:3999 (time sequence graph)
Fixing Two BSD TCP Bugs Mark Allman Sterling Software NASA Lewis Research Center 21000 Brookpark Rd. MS 54-2 Cleveland, OH 44135 mallman@lerc.nasa.gov CR-204151 Abstract 2 Two Segment Initial Window This
More informationYour Name: Your student ID number:
CSC 573 / ECE 573 Internet Protocols October 11, 2005 MID-TERM EXAM Your Name: Your student ID number: Instructions Allowed o A single 8 ½ x11 (front and back) study sheet, containing any info you wish
More informationSharkFest 17 Europe. My TCP ain t your TCP. Simon Lindermann. Stack behavior back then and today. Miele & Cie KG.
SharkFest 17 Europe My TCP ain t your TCP Stack behavior back then and today 9th November 2017 Simon Lindermann Miele & Cie KG #sf17eu Estoril, Portugal#sf17eu My TCP Estoril, ain tportugal your TCP 7-10
More informationOpportunities for Exploiting Social Awareness in Overlay Networks. Bruce Maggs Duke University Akamai Technologies
Opportunities for Exploiting Social Awareness in Overlay Networks Bruce Maggs Duke University Akamai Technologies The Akamai Intelligent Platform A Global Platform: 127,000+ Servers 1,100+ Networks 2,500+
More informationOutline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste
Outline 15-441 Computer Networking Lecture 18 TCP Performance Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 TCP congestion avoidance TCP slow start TCP modeling TCP details 2 AIMD Distributed,
More informationCS 638 Lab 6: Transport Control Protocol (TCP)
CS 638 Lab 6: Transport Control Protocol (TCP) Joe Chabarek and Paul Barford University of Wisconsin Madison jpchaba,pb@cs.wisc.edu The transport layer of the network protocol stack (layer 4) sits between
More informationInvestigating the Use of Synchronized Clocks in TCP Congestion Control
Investigating the Use of Synchronized Clocks in TCP Congestion Control Michele Weigle (UNC-CH) November 16-17, 2001 Univ. of Maryland Symposium The Problem TCP Reno congestion control reacts only to packet
More informationTuning, Tweaking and TCP
Tuning, Tweaking and TCP (and other things happening at the Hamilton Institute) David Malone and Doug Leith 16 August 2010 The Plan Intro to TCP (Congestion Control). Standard tuning of TCP. Some more
More informationComputer Communication Networks Midterm Review
Computer Communication Networks Midterm Review ICEN/ICSI 416 Fall 2018 Prof. Aveek Dutta 1 Instructions The exam is closed book, notes, computers, phones. You can use calculator, but not one from your
More informationProportional Rate Reduction for TCP
Proportional Rate Reduction for TCP draft-ietf-tcpm-proportional-rate-reduction-00.txt IETF 82 16-Nov-2011 Matt Mathis, Nandita Dukkipati, Yuchung Cheng We want to improve TCP recovery Traces frequently
More informationOverview. TCP congestion control Computer Networking. TCP modern loss recovery. TCP modeling. TCP Congestion Control AIMD
Overview 15-441 Computer Networking Lecture 9 More TCP & Congestion Control TCP congestion control TCP modern loss recovery TCP modeling Lecture 9: 09-25-2002 2 TCP Congestion Control Changes to TCP motivated
More informationTCP Modifications for Congestion Exposure
TCP Modifications for Congestion Exposure ConEx 87. IETF Berlin July 27, 2013 draft-ietf-conex-tcp-modifications-04 Mirja Kühlewind Richard Scheffenegger
More informationInformation Network 1 TCP 1/2. Youki Kadobayashi NAIST
Information Network 1 TCP 1/2 Youki Kadobayashi NAIST 1 Transport layer: a birds-eye view Hosts maintain state for each transport-layer endpoint Routers don t maintain per-host state H R R R R H Transport
More information11/24/2009. Fundamentals of Computer Networks ECE 478/578. Flow Control in TCP
Fundamentals of Computer Networks ECE 478/578 Lecture #21: TCP Window Mechanism Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University of Arizona Sliding Window in TCP Goals of
More informationMaking TCP more Robust against Packet Reordering
Making TCP more Robust against Packet Reordering Alexander Zimmermann Lennart Schulte TCPM, IETF-9, Honolulu, HI, USA November, 24 TCPM s feedback
More informationLecture 15: TCP over wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 13, Thursday
Lecture 15: TCP over wireless networks Mythili Vutukuru CS 653 Spring 2014 March 13, Thursday TCP - recap Transport layer TCP is the dominant protocol TCP provides in-order reliable byte stream abstraction
More informationENSC 835 project (2002) TCP performance over satellite links. Kenny, Qing Shao Grace, Hui Zhang
ENSC 835 project (2002) TCP performance over satellite links Kenny, Qing Shao Qshao@cs.sfu.ca Grace, Hui Zhang Hzhange@cs.sfu.ca Road map Introduction to satellite communications Simulation implementation
More informationTCP on High-Speed Networks
TCP on High-Speed Networks from New Internet and Networking Technologies for Grids and High-Performance Computing, tutorial given at HiPC 04, Bangalore, India December 22nd, 2004 C. Pham University Lyon,
More informationTo see the details of TCP (Transmission Control Protocol). TCP is the main transport layer protocol used in the Internet.
Lab Exercise TCP Objective To see the details of TCP (Transmission Control Protocol). TCP is the main transport layer protocol used in the Internet. The trace file is here: https://kevincurran.org/com320/labs/wireshark/trace-tcp.pcap
More informationENSC 835 project (2002) TCP performance over satellite links. Kenny, Qing Shao Grace, Hui Zhang
ENSC 835 project (2002) TCP performance over satellite links Kenny, Qing Shao Qshao@cs.sfu.ca Grace, Hui Zhang Hzhange@cs.sfu.ca Road map Introduction to satellite communications Simulation implementation
More informationcs/ee 143 Communication Networks
cs/ee 143 Communication Networks Chapter 4 Transport Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Recap: Internet overview Some basic mechanisms n Packet switching n Addressing n Routing o
More informationLecture 14: Congestion Control"
Lecture 14: Congestion Control" CSE 222A: Computer Communication Networks George Porter Thanks: Amin Vahdat, Dina Katabi and Alex C. Snoeren Lecture 14 Overview" TCP congestion control review Dukkipati
More informationCS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT
CS 421: COMPUTER NETWORKS SPRING 2012 FINAL May 24, 2012 150 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable
More informationLecture 21: Congestion Control" CSE 123: Computer Networks Alex C. Snoeren
Lecture 21: Congestion Control" CSE 123: Computer Networks Alex C. Snoeren Lecture 21 Overview" How fast should a sending host transmit data? Not to fast, not to slow, just right Should not be faster than
More informationChapter 3 Review Questions
Chapter 3 Review Questions. 2. 3. Source port number 6 and destination port number 37. 4. TCP s congestion control can throttle an application s sending rate at times of congestion. Designers of applications
More informationIllegitimate Source IP Addresses At Internet Exchange Points
Illegitimate Source IP Addresses At Internet Exchange Points @ DENOG8, Darmstadt Franziska Lichtblau, Florian Streibelt, Philipp Richter, Anja Feldmann 23.11.2016 Internet Network Architectures, TU Berlin
More informationTransmission Control Protocol. ITS 413 Internet Technologies and Applications
Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion
More informationTCP-Peach and FACK/SACK Options: Putting The Pieces Together
TCP-Peach and FACK/SACK Options: Putting The Pieces Together Giacomo Morabito, Renato Narcisi, Sergio Palazzo, Antonio Pantò Dipartimento di Ingegneria Informatica e delle Telecomunicazioni University
More informationRED behavior with different packet sizes
RED behavior with different packet sizes Stefaan De Cnodder, Omar Elloumi *, Kenny Pauwels Traffic and Routing Technologies project Alcatel Corporate Research Center, Francis Wellesplein, 1-18 Antwerp,
More informationEECS 122, Lecture 19. Reliable Delivery. An Example. Improving over Stop & Wait. Picture of Go-back-n/Sliding Window. Send Window Maintenance
EECS 122, Lecture 19 Today s Topics: More on Reliable Delivery Round-Trip Timing Flow Control Intro to Congestion Control Kevin Fall, kfall@cs cs.berkeley.eduedu Reliable Delivery Stop and Wait simple
More informationTopics. TCP sliding window protocol TCP PUSH flag TCP slow start Bulk data throughput
Topics TCP sliding window protocol TCP PUSH flag TCP slow start Bulk data throughput 2 Introduction In this chapter we will discuss TCP s form of flow control called a sliding window protocol It allows
More informationOn Inferring TCP Behavior
On Inferring TCP Behavior Jitendra Padhye and Sally Floyd AT&T Center for Internet Research at ICSI (ACIRI) padhye@aciri.org, floyd@aciri.org ABSTRACT Most of the traffic in today s Internet is controlled
More informationDocuments. Configuration. Important Dependent Parameters (Approximate) Version 2.3 (Wed, Dec 1, 2010, 1225 hours)
1 of 7 12/2/2010 11:31 AM Version 2.3 (Wed, Dec 1, 2010, 1225 hours) Notation And Abbreviations preliminaries TCP Experiment 2 TCP Experiment 1 Remarks How To Design A TCP Experiment KB (KiloBytes = 1,000
More informationUnderstanding the Share of IPv6 Traffic in a Dual-Stack ISP
Understanding the Share of IPv6 Traffic in a Dual-Stack ISP Enric Pujol, Philipp Richter, and Anja Feldmann PAM 2017, Sydney, Australia IPv6 adoption metrics User end hosts Server-side measurements e.g.,
More information