EBU response to the public consultation on the draft BEREC report 'Monitoring quality of Internet access services in the context of net neutrality'
|
|
- Elwin Barton
- 5 years ago
- Views:
Transcription
1 BoR PC02 (14) 11 EBU response to the public consultation on the draft BEREC report 'Monitoring quality of Internet access services in the context of net neutrality' The European Broadcasting Union (EBU) welcomes the opportunity to respond to the draft BEREC report on 'Monitoring quality of Internet access services in the context of net neutrality'. The EBU and its members public service media organisations from 56 countries across Europe and beyond are strong supporters of an open, neutral and transparent public Internet. Safeguarding transparency to end users and preventing degradation of services and content online by creating effective systems monitoring the quality of Internet access is essential in order to achieve net neutrality in Europe. That s why the EBU strongly supports the work BEREC is doing in this field. Work undertaken by BEREC will also establish a solid basis for much needed practical tools for National Regulatory Authorities (NRAs) to enforce open Internet provisions both at national level and EU level, in particular the regulatory provisions proposed in the European Commission s connected continent proposal and recently improved by the European Parliament in first reading. With its response, the EBU would like to reiterate the importance of measurements beyond the ISP leg and of transparency of the actual data throughput of the service delivered by an ISP. It also provides an overview of relevant monitoring techniques that are used already or can be used in future with regard to net neutrality for broadcasters and other content providers. First of all, we support the BEREC recommendation that the measurement beyond the ISP leg should be used to account for the connectivity of the ISPs interconnection to the Internet. Such measurement allows testing the real-world throughput an ISP can provide to connect an end-user to the open Internet. Data throughput is important for end-users to be able to consume media services over the Internet. Watching video or listening to radio will not be possible if the speed varies or the service is interrupted frequently. Broadcasters often use adaptive streaming techniques to modify the real-time viewing quality to match the current available speed without interrupting the continuity of the video. However, if the speed drops substantially, the audio or video cannot be displayed. Thus, transparency of the actual current throughput of the service delivered by an ISP is essential. Open Internet exchanges (IXPs) are the most important measuring location as content providers have the possibility to influence their connection to this entity. An ISP can use different interconnection arrangements between other ISPs and content providers, and thereby manipulate data traffic. This could be done by limiting an ISP s connection to an IXP. Therefore we think the available throughput to an open IXP is most important. We are of the opinion that NRAs should be active in providing and provisioning the infrastructure required for network neutrality related network measurements. ISPs do not deliver these real-time figures themselves and could even filter out information that might be gathered in their network like trace-route information. Throughput and other measurements as depicted below are only practical if there are appropriate servers available in different IXPs or other well-connected gateways. The ISPs are considered UNION EUROPEENNE DE RADIO-TELEVISION L Ancienne-Route 17A Tél. +41(0) BP Le Grand-Saconnex Genève, Suisse
2 to be a black box and the first available open connection to the Internet can be used to install servers with measuring tools. If the data were open this infrastructure would not be required by the market, but the current situation means that measurement provisions can only be implemented at national level with central investments and NRA involvement. Thus, the appropriate NRA can oversee the measurements and take action if needed on basis of their own findings. The way broadcasters monitor the performance of the Internet is typically using plugins for software players. These tools detect problems such as package loss, ping speeds to nearest caches buffer under run, switching between different bitrates, and start-up times that all influence the consumer s Quality of Experience (QoE). Variations in video quality can be influenced by the choice of content delivery network (CDN), stream source failures and client-side buffering in real-time. But such monitoring won't tell you if an ISP is simply flooded (which is not a network neutrality question), or that it is actively degrading your connection quality for your content (which is a network neutrality question). Therefore we propose an approach to monitoring that can identify forms of network neutrality violations with statistical certainty. Telecom operators have the ability to artificially degrade or even block some Internet services, and have been known to use this ability. Blocking a service, while drastic, is also easy to detect. More subtle network degradations (e.g. inducing additional delay) are just as effective a disruption to media services, but can be the result of other users activity in the same geographical neighbourhood. Since the Internet is a best-effort service, it is hard to distinguish between such temporary congestion and deliberate artificial degradation. Below we describe various methods to make that distinction, thereby removing the plausible deniability from ISPs and providing transparency into their network management policies. Below, you ll find a technical overview of possible degradations, along with the selection criteria an ISP may use to decide whether or not to apply the degradation to a particular service. It then provides examples of measurement setups to highlight that degradation beyond reasonable doubt. Earlier in this document, we have outlined the technical requirements to build an appropriate measurement setup. As an introduction, we refer to the image below as the architectural map of the Internet: 2/6
3 Purely as example: Say you (client B) find vimeo.com (Service B) slower than youtube.com (Service C). Is this because YouTube/Google have better hosting (connected to router C)? Or is this because your ISP (at router E) is slowing Vimeo down? There are many reasons why vimeo.com might be slower, yielding plausible deniability for the ISP: maybe Client C is downloading something from Service A, congesting the D-E link, Types of degradation A typical user experience is the sum of a number of different layers working together. The top layer, the one the user interacts with, is called the Application Layer. For example, this might be a web browser the user uses to surf to a given website. It can also be service specific application, such as a smartphone app, or a SmartTV OTT (Over the Top) channel. This application does not do all the hard work itself, but uses underlying layers such as the Session and Presentation Layers (where the TLSprotocol is responsible to secure HTTP requests into HTTPS requests), the Transport Layer (which will attempt to reorder out-of-order segments, recover lost segments, etc.) and the Network Layer (which does the actual end-to-end delivery of IP packets). An ISP only transports packets at this lower Network Layer, and thus cannot (directly) impact the layers above it. Thus an ISP cannot (directly) cause a video-player to rebuffer, it can however delay IP packets, which may or may not cause a particular player to deplete its buffer. 3/6
4 It is therefore necessary to translate observed behaviour back-and-forth between the effects on the Network Layer, the Application Layer and ultimately the user experience. Only limited possibilities exist to influence traffic at a packet level. A packet can be delivered immediately, delayed or discarded. Looking at a stream of packets, there are a number of additional factors that could degrade traffic: increased jitter: the addition of delay to only some packets limiting the throughput: allow a certain number of packets (or bytes) per second to pass unhampered, but drop (or delay) packets above this threshold Technically, a packet can also be corrupted (have its content changed), but this is usually detected by an upper layer, and treated the same as that packet being lost. The effects of these degradations on the user experience vary depending on the severity of the degradation, and the protocol used. Voice-over-IP calls for example are quite sensitive to jitter, while video-streaming requires a high sustained throughput. Types of triggers for the degradation of services Network neutrality covers degradations that are only applied to a portion of an ISP s traffic. There are various criteria to establish whether a particular packet/flow might be affected: Time of day, day of week Type of service: o TCP/UDP port o protocol (RTP, RTMP, ) o Content of the media container: audio-only, or audio+video? Source/destination IP addresses Protocol header values o HTTP Host:-header o HTTP UserAgent:-header Measurement methods There are several existing measurement methods available, such as the ones provided by M-lab ( They tackle the problem by combining (averaging) many thousands of clients. If the traffic degradation is done based on service (i.e. all video-streams are slowed down), these tests can demonstrate this. If the impairment is applied on a source/destination basis, these tests can only show that a particular site is slower on a particular ISP compared to other ISPs, but they don't identify whether that ISP causes this slower behaviour intentionally. To really identify artificial degradations based on source/destination, more in-depth techniques are needed, such as those suggested by Dan Kaminsky in his "Black Ops of TCP" presentation ( and Extra latency based on HTTP-header Suppose an ISP introduces an additional 50ms delay on all packets belonging to an HTTP-session with host The policy is activated by the HTTP Host:- header. 4/6
5 This behaviour can be detected by measuring the difference in round-trip time (RTT) of a baseline measurement, and an affected measurement: Baseline: Measure the RTT for a connection establishment (TCP SYN until TCP SYN-ACK). Since these packets are exchanged before any Host:-header is sent, they are equal for all web-traffic. Affected: Measure the RTT of the normal data flow. Since these packets are exchanged after the Host:-header, the policy will be triggered. Since there is no technical reason why a packet carrying a connection request should be any faster than a regular packet (of the same size), these two measurements should yield the same value (after statistical averaging). If there is a statistically significant difference, the artificial degradation has been exposed. Throttling based on HTTP-header Suppose an ISP limits the throughput of a HTTP-session with host The policy is activated by the HTTP Host:-header. This behaviour can be detected by measuring the difference in throughput of a baseline measurement, and an affected measurement: Baseline: Measure the throughput of a dummy web-service running on a controlled server, which is known to be on a net neutral Internet connection. Affected: Measure the throughput of a clone of the affected web service on the same controlled server (e.g. by setting up a proxy and making sure that all content is cached). Since the traffic is coming from the same physical server over the same network path, there is no technical reason why these two measurements should be different. If there is a statistically significant difference, the artificial degradation has been exposed. Increasing loss based on IP-address Suppose an ISP adds additional loss to a TCP-based video streaming session with a particular (set of) IP address(es). The policy is activated by matching the source IP address in the packets, and requires the full TCP-connection to be visible. To detect this behaviour, we need an additional controlled server, which is known to be on a net neutral Internet connection. Additionally, it needs to be able to send out IP packets with someone else's source IP address (IP spoofing). A VPN between the measurement client and this server allows the client to send out packets to the Internet which can't be inspected by the ISP's policy engine because they are encrypted. This behaviour can be detected my measuring the difference in packet loss of a baseline measurement, and an affected measurement: Baseline: Measure the packet loss of a TCP-connection between the client and the controlled server Affected: Set up a specially crafted asymmetric TCP-connection: o The client sends a connection request over the normal Internet connection, but makes sure that this packet does not reach the final 5/6
6 o o o o target (e.g. by setting the TTL too low). An additional copy of this connection request is send over the VPN to the controlled server. The controlled server initiates a connection with the affected IP address. Replies from the affected IP address, received by the controlled server, are reflected back to the client (outside of the VPN) with spoofed IP addresses. From the ISP's point of view, these look like replies to the original connection request of the client. All further communication from client to server is sent out both via the normal connection (but these should not reach the destination), and though the VPN, where the controlled server will relay them All further communication from the affected server to the controlled server are reflected to the client Since the traffic is, in both cases, coming from the same physical server, over the same network path, both connections should have the same packet loss rate. If there is a statistically significant difference, the artificial degradation has been exposed /6
4 rd class Department of Network College of IT- University of Babylon
1. INTRODUCTION We can divide audio and video services into three broad categories: streaming stored audio/video, streaming live audio/video, and interactive audio/video. Streaming means a user can listen
More informationOutline 9.2. TCP for 2.5G/3G wireless
Transport layer 9.1 Outline Motivation, TCP-mechanisms Classical approaches (Indirect TCP, Snooping TCP, Mobile TCP) PEPs in general Additional optimizations (Fast retransmit/recovery, Transmission freezing,
More informationOSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,
ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure
More informationDa t e: August 2 0 th a t 9: :00 SOLUTIONS
Interne t working, Examina tion 2G1 3 0 5 Da t e: August 2 0 th 2 0 0 3 a t 9: 0 0 1 3:00 SOLUTIONS 1. General (5p) a) Place each of the following protocols in the correct TCP/IP layer (Application, Transport,
More informationETSF10 Internet Protocols Transport Layer Protocols
ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.1 Kaan Bür, Jens Andersson Transport Layer Protocols Process-to-process delivery [ed.4 ch.23.1] [ed.5 ch.24.1] Transmission Control
More information4. The transport layer
4.1 The port number One of the most important information contained in the header of a segment are the destination and the source port numbers. The port numbers are necessary to identify the application
More informationAn overview on Internet Measurement Methodologies, Techniques and Tools
An overview on Internet Measurement Methodologies, Techniques and Tools AA 2011/2012 emiliano.casalicchio@uniroma2.it (Agenda) Lezione 2/05/2012 Part 1 Intro basic concepts ISP Traffic exchange (peering)
More informationFeatures of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy
Que: -Proxy server Introduction: Proxy simply means acting on someone other s behalf. A Proxy acts on behalf of the client or user to provide access to a network service, and it shields each side from
More informationDistributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013
Distributed Systems 27. Firewalls and Virtual Private Networks Paul Krzyzanowski Rutgers University Fall 2013 November 25, 2013 2013 Paul Krzyzanowski 1 Network Security Goals Confidentiality: sensitive
More informationBasic Reliable Transport Protocols
Basic Reliable Transport Protocols Do not be alarmed by the length of this guide. There are a lot of pictures. You ve seen in lecture that most of the networks we re dealing with are best-effort : they
More informationCSE 4215/5431: Mobile Communications Winter Suprakash Datta
CSE 4215/5431: Mobile Communications Winter 2013 Suprakash Datta datta@cse.yorku.ca Office: CSEB 3043 Phone: 416-736-2100 ext 77875 Course page: http://www.cse.yorku.ca/course/4215 Some slides are adapted
More informationCSCD 433/533 Advanced Networks
CSCD 433/533 Advanced Networks Lecture 2 Network Review Winter 2017 Reading: Chapter 1 1 Topics Network Topics Some Review from CSCD330 Applications Common Services Architecture OSI Model AS and Routing
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationOpenCache. A Platform for Efficient Video Delivery. Matthew Broadbent. 1 st Year PhD Student
OpenCache A Platform for Efficient Video Delivery Matthew Broadbent 1 st Year PhD Student Motivation Consumption of video content on the Internet is constantly expanding Video-on-demand is an ever greater
More informationUser Datagram Protocol
Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram
More informationPaper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015
Paper solution Subject: Computer Networks (TE Computer- 2012 pattern) Marks : 30 Date: 5/2/2015 Q1 a) What is difference between persistent and non persistent HTTP? Also Explain HTTP message format. [6]
More informationMobile Transport Layer
Mobile Transport Layer 1 Transport Layer HTTP (used by web services) typically uses TCP Reliable transport between TCP client and server required - Stream oriented, not transaction oriented - Network friendly:
More informationNetworks Fall This exam consists of 10 problems on the following 13 pages.
CSCI 466 Final Networks Fall 2011 Name: This exam consists of 10 problems on the following 13 pages. You may use your two- sided hand- written 8 ½ x 11 note sheet during the exam and a calculator. No other
More informationProblem Set 7 Due: Start of Class, November 2
CS242 Computer Networks Handout # 14 Randy Shull October 26, 2017 Wellesley College Problem Set 7 Due: Start of Class, November 2 Reading: Kurose & Ross, Sections 3.6, 3.7, 3.8 Wireshark Lab [26] In these
More informationMobile Communications Chapter 9: Mobile Transport Layer
Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany Mobile Communications Chapter 9: Mobile Transport Layer Motivation, TCP-mechanisms Classical approaches (Indirect
More informationNetworking: Network layer
control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer
More informationChapter 8 roadmap. Network Security
Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 8.4 Securing e-mail 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7 Securing
More informationMobile Communications Chapter 9: Mobile Transport Layer
Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany Mobile Communications Chapter 9: Mobile Transport Layer Motivation, TCP-mechanisms Classical approaches (Indirect
More informationLab Exercise UDP & TCP
Lab Exercise UDP & TCP Objective UDP (User Datagram Protocol) is an alternative communications protocol to Transmission Control Protocol (TCP) used primarily for establishing low-latency and loss tolerating
More informationInformation Network Systems The network layer. Stephan Sigg
Information Network Systems The network layer Stephan Sigg Tokyo, November 1, 2012 Error-detection and correction Decoding of Reed-Muller codes Assume a second order (16, 11) code for m = 4. The r-th order
More informationReliable Transport I: Concepts and TCP Protocol
Reliable Transport I: Concepts and TCP Protocol Stefano Vissicchio UCL Computer Science COMP0023 Today Transport Concepts Layering context Transport goals Transport mechanisms and design choices TCP Protocol
More informationSaaS Providers. ThousandEyes for. Summary
USE CASE ThousandEyes for SaaS Providers Summary With Software-as-a-Service (SaaS) applications rapidly replacing onpremise solutions, the onus of ensuring a great user experience for these applications
More informationChapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms
Overview Chapter 13 TRANSPORT Motivation Simple analysis Various TCP mechanisms Distributed Computing Group Mobile Computing Winter 2005 / 2006 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer
More informationIntroduction to Networks and the Internet
Introduction to Networks and the Internet CMPE 80N Announcements Project 2. Reference page. Library presentation. Internet History video. Spring 2003 Week 7 1 2 Today Internetworking (cont d). Fragmentation.
More informationJust enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL
Just enough TCP/IP Borrowed from my ITS475/575 class the ITL 1 Protocol Overview E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP RTP RTCP SCTP IP ICMP ARP RARP (Auxiliary Services) Ethernet, X.25,
More informationPrincess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)
Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Prepared by Dr. Samia Chelloug E-mail: samia_chelloug@yahoo.fr Content
More informationSession 4. Regulation and Policy: Power of OTTs vs. Telcos. Rajkumar Upadhyay
Session 4 Regulation and Policy: Power of OTTs vs. Telcos Rajkumar Upadhyay rkupadhyay@gmail.com Data transforming Service and Application value chain Move from traditional networks towards a IP based
More informationThe aim of this unit is to review the main concepts related to TCP and UDP transport protocols, as well as application protocols. These concepts are
The aim of this unit is to review the main concepts related to TCP and UDP transport protocols, as well as application protocols. These concepts are important requirements for developing programs that
More informationWashington State University CptS 455 Sample Final Exam (corrected 12/11/2011 to say open notes) A B C
Washington State University CptS 455 Sample Final Exam (corrected 12/11/2011 to say open notes) Your name: This exam consists 13 numbered problems on 6 pages printed front and back on 3 sheets. Please
More informationICS 351: Networking Protocols
ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol
More informationThousandEyes for. Application Delivery White Paper
ThousandEyes for Application Delivery White Paper White Paper Summary The rise of mobile applications, the shift from on-premises to Software-as-a-Service (SaaS), and the reliance on third-party services
More informationInternet Content Distribution
Internet Content Distribution Chapter 1: Introduction Jussi Kangasharju Chapter Outline Introduction into content distribution Basic concepts TCP DNS HTTP Outline of the rest of the course Kangasharju:
More informationWireless TCP. TCP mechanism. Wireless Internet: TCP in Wireless. Wireless TCP: transport layer
Wireless TCP W.int.2-2 Wireless Internet: TCP in Wireless Module W.int.2 Mobile IP: layer, module W.int.1 Wireless TCP: layer Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University
More informationDistributed Systems. 29. Firewalls. Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems 29. Firewalls Paul Krzyzanowski Rutgers University Fall 2015 2013-2015 Paul Krzyzanowski 1 Network Security Goals Confidentiality: sensitive data & systems not accessible Integrity:
More information9. Wireshark I: Protocol Stack and Ethernet
Distributed Systems 205/2016 Lab Simon Razniewski/Florian Klement 9. Wireshark I: Protocol Stack and Ethernet Objective To learn how protocols and layering are represented in packets, and to explore the
More informationACM Policy rule on the provision of information concerning internet speeds
Please note that, although every effort has been made to ensure this translation is accurate and consistent, it is for informational purposes only. In case of any dispute or inconsistencies, the Dutch
More informationBEREC Public debriefing
BEREC Public debriefing from the 31th BEREC plenary meetings Sébastien Soriano, BEREC Chair 2017 Elisabeth Dornetshumer, Co-Chair of the Roaming Expert Group Michiel van Dijk, Co-Chair of the Net Neutrality
More informationDifferent Layers Lecture 20
Different Layers Lecture 20 10/15/2003 Jian Ren 1 The Network Layer 10/15/2003 Jian Ren 2 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host,
More informationECE4110 Internetwork Programming. Introduction and Overview
ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?
More informationComputer Science 461 Midterm Exam March 14, :00-10:50am
NAME: Login name: Computer Science 461 Midterm Exam March 14, 2012 10:00-10:50am This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor
More informationSynthesizing Adaptive Protocols by Selective Enumeration (SYNAPSE)
Synthesizing Adaptive Protocols by Selective Enumeration (SYNAPSE) Problem Definition Solution Approach Benefits to End User Talk Overview Metrics Summary of Results to Date Lessons Learned & Future Work
More informationBroadband Internet Access Disclosure
Broadband Internet Access Disclosure This document provides information about the network practices, performance characteristics, and commercial terms applicable broadband Internet access services provided
More informationVOIP Network Pre-Requisites
VOIP Network Pre-Requisites Executive Summary This document contains basic network requirements that are foundational for good voice quality when using Vogtec VoIP products/solutions over a data network.
More informationCMPE 80N: Introduction to Networking and the Internet
CMPE 80N: Introduction to Networking and the Internet Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 11 CMPE 80N Fall'10 1 Announcements Forum #2 due on 11.05. CMPE 80N Fall'10 2 Last
More informationTo see the details of TCP (Transmission Control Protocol). TCP is the main transport layer protocol used in the Internet.
Lab Exercise TCP Objective To see the details of TCP (Transmission Control Protocol). TCP is the main transport layer protocol used in the Internet. The trace file is here: https://kevincurran.org/com320/labs/wireshark/trace-tcp.pcap
More informationMultimedia Networking
CMPT765/408 08-1 Multimedia Networking 1 Overview Multimedia Networking The note is mainly based on Chapter 7, Computer Networking, A Top-Down Approach Featuring the Internet (4th edition), by J.F. Kurose
More informationName Student ID Department/Year. Midterm Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2007
Name Student ID Department/Year Midterm Examination Introduction to Computer Networks Class#: 901 E31110 Fall 2007 9:30-11:10 Tuesday November 27, 2007 Prohibited 1. You are not allowed to write down the
More informationIntroduction to VoIP. Cisco Networking Academy Program Cisco Systems, Inc. All rights reserved. Cisco Public. IP Telephony
Introduction to VoIP Cisco Networking Academy Program 1 Requirements of Voice in an IP Internetwork 2 IP Internetwork IP is connectionless. IP provides multiple paths from source to destination. 3 Packet
More informationUNIT IV -- TRANSPORT LAYER
UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission
More informationNet Neutrality A solution in search of a problem?
Net Neutrality A solution in search of a problem? Net Neutrality and the Quest for Sustainable Internet Bucharest June 5, 2012 Veronica Bocarova Cullen International What is net neutrality? The ability
More informationInternetworking Models The OSI Reference Model
Internetworking Models When networks first came into being, computers could typically communicate only with computers from the same manufacturer. In the late 1970s, the Open Systems Interconnection (OSI)
More informationQuestion Score 1 / 19 2 / 19 3 / 16 4 / 29 5 / 17 Total / 100
NAME: Login name: Computer Science 461 Midterm Exam March 10, 2010 3:00-4:20pm This test has five (5) questions. Put your name on every page, and write out and sign the Honor Code pledge before turning
More information5 th July BoR PC03 (17) 15
BoR PC03 (17) 15 Vodafone s response to BEREC s regulatory assessment to support National Regulatory Agencies with the implementation of the net neutrality provisions of the Regulation 2015/2120, concerning
More informationDraft BEREC Guidelines on Net Neutrality and Transparency: Best practices and recommended approaches, October 2011
Draft BEREC Guidelines on Net Neutrality and Transparency: Best practices and recommended approaches, October 2011 The Internet Society welcomes the opportunity to comment on BEREC s draft Guidelines on
More informationICS 451: Today's plan
ICS 451: Today's plan ICMP ping traceroute ARP DHCP summary of IP processing ICMP Internet Control Message Protocol, 2 functions: error reporting (never sent in response to ICMP error packets) network
More informationPage 1. Outline / Computer Networking : 1 st Generation Commercial PC/Packet Video Technologies
Outline 15-441/15-641 Computer Networking Lecture 18 Internet Video Delivery Peter Steenkiste Slides by Professor Hui Zhang Background Technologies: - HTTP download - Real-time streaming - HTTP streaming
More informationLayered Architecture
1 Layered Architecture Required reading: Kurose 1.7 CSE 4213, Fall 2006 Instructor: N. Vlajic Protocols and Standards 2 Entity any device capable of sending and receiving information over the Internet
More informationEEC-684/584 Computer Networks
EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking
More informationII. Principles of Computer Communications Network and Transport Layer
II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part
More informationInternet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.
Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:
More information20-CS Cyber Defense Overview Fall, Network Basics
20-CS-5155 6055 Cyber Defense Overview Fall, 2017 Network Basics Who Are The Attackers? Hackers: do it for fun or to alert a sysadmin Criminals: do it for monetary gain Malicious insiders: ignores perimeter
More informationUNIT 2 TRANSPORT LAYER
Network, Transport and Application UNIT 2 TRANSPORT LAYER Structure Page No. 2.0 Introduction 34 2.1 Objective 34 2.2 Addressing 35 2.3 Reliable delivery 35 2.4 Flow control 38 2.5 Connection Management
More informationNetwork Test and Monitoring Tools
ajgillette.com Technical Note Network Test and Monitoring Tools Author: A.J.Gillette Date: December 6, 2012 Revision: 1.3 Table of Contents Network Test and Monitoring Tools...1 Introduction...3 Link Characterization...4
More informationFixed Broadband Analysis Report. 01 January March 2013 between 00:00:00 and 24:00:00 Bahrain. Published 07 April 2013.
Fixed Broadband Analysis Report 01 January 2013 31 March 2013 between 00:00:00 and 24:00:00 Bahrain Published 07 April 2013 Public Document Page 1 of 25 Table of contents Introduction.... 3 Measurement
More informationInternet Video Delivery. Professor Hui Zhang
18-345 Internet Video Delivery Professor Hui Zhang 1 1990 2004: 1 st Generation Commercial PC/Packet Video Technologies Simple video playback, no support for rich app Not well integrated with Web browser
More informationMASV Accelerator Technology Overview
MASV Accelerator Technology Overview Introduction Most internet applications, FTP and HTTP to name a few, achieve network transport via the ubiquitous TCP protocol. But TCP suffers from latency, packet
More informationQoS on Low Bandwidth High Delay Links. Prakash Shende Planning & Engg. Team Data Network Reliance Infocomm
QoS on Low Bandwidth High Delay Links Prakash Shende Planning & Engg. Team Data Network Reliance Infocomm Agenda QoS Some Basics What are the characteristics of High Delay Low Bandwidth link What factors
More informationCNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems
Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems Contents Purpose of Hardware and Protocols Associated with Computer Networks... 3 Lab Objectives... 3 Lab Resources...
More informationCS 43: Computer Networks The Link Layer. Kevin Webb Swarthmore College November 28, 2017
CS 43: Computer Networks The Link Layer Kevin Webb Swarthmore College November 28, 2017 TCP/IP Protocol Stack host host HTTP Application Layer HTTP TCP Transport Layer TCP router router IP IP Network Layer
More informationGrowth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.
Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,
More informationInternetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS
Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS 1. General (5p) a) The so-called hourglass model (sometimes referred to as a wine-glass ) has been used
More informationAdaptive Video Acceleration. White Paper. 1 P a g e
Adaptive Video Acceleration White Paper 1 P a g e Version 1.0 Veronique Phan Dir. Technical Sales July 16 th 2014 2 P a g e 1. Preface Giraffic is the enabler of Next Generation Internet TV broadcast technology
More informationECE 333: Introduction to Communication Networks Fall 2001
ECE 333: Introduction to Communication Networks Fall 2001 Lecture 26: Transport layer I 1 Transport Layer In the remaining lectures, we will discuss several issues that are commonly addressed at the transport
More informationOutline. Connecting to the access network: DHCP and mobile IP, LTE. Transport layer: UDP and TCP
Outline Connecting to the access network: DHCP and mobile IP, LTE Transport layer: UDP and TCP IETF TCP/IP protocol suite User application, e.g., http with Mozilla Communication for each process on computer
More informationVorlesung Kommunikationsnetze
Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen
More informationCCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols
CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means
More informationOverview of TCP/IP Overview of TCP/IP protocol: TCP/IP architectural models TCP protocol layers.
Overview of TCP/IP 3 Overview of TCP/IP protocol: TCP/IP architectural models TCP protocol layers. 4 2 5 6 3 7 8 4 9 10 5 11 12 6 13 14 7 15 16 8 17 18 9 19 20 10 21 Why TCP/IP? Packet based Provides decentralized
More informationOn Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964
The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format
More informationComputer Communication Networks
Contents ELL 785 Computer Communication Networks Introduction Lecture 1 Taxonomy of communication works Computer Communication Networks Building a work ed work architecture 1-1 Introduction PC server wireless
More informationIntroduction to computer networking
edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing
More informationReliable Transport I: Concepts and TCP Protocol
Reliable Transport I: Concepts and TCP Protocol Brad Karp UCL Computer Science CS 3035/GZ01 29 th October 2013 Part I: Transport Concepts Layering context Transport goals Transport mechanisms 2 Context:
More informationprecise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)
Protocols precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) all packets shipped from network to network as IP packets
More informationQuestion 1 (6 points) Compare circuit-switching and packet-switching networks based on the following criteria:
Question 1 (6 points) Compare circuit-switching and packet-switching networks based on the following criteria: (a) Reserving network resources ahead of data being sent: (2pts) In circuit-switching networks,
More informationModule objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols
Integrated services Reading: S. Keshav, An Engineering Approach to Computer Networking, chapters 6, 9 and 4 Module objectives Learn and understand about: Support for real-time applications: network-layer
More informationIP Packet Switching. Goals of Todayʼs Lecture. Simple Network: Nodes and a Link. Connectivity Links and nodes Circuit switching Packet switching
IP Packet Switching CS 375: Computer Networks Dr. Thomas C. Bressoud Goals of Todayʼs Lecture Connectivity Links and nodes Circuit switching Packet switching IP service model Best-effort packet delivery
More informationBGP Case Studies. ISP Workshops
BGP Case Studies ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last updated
More informationNet Neutrality intersection between regulation and technology
Net Neutrality intersection between regulation and technology Frode Sørensen (@ipfrode) (Nkom) NUF Mobil Agenda Lysaker, 6 June 2017 Content of presentation General introduction What is Net Neutrality?
More informationAT&T Collaborate TM. Network Assessment Tool
AT&T Collaborate TM Network Assessment Tool 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T
More informationNET ID. CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17
CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17 Q1. 2 points Write your NET ID at the top of every page of this test. Q2. X points Name 3 advantages of a circuit network
More informationTelecom Italia response. to the BEREC public consultation on
Telecom Italia response to the BEREC public consultation on Guidelines on Net Neutrality and Transparency: Best practise and recommended approaches - BOR (11) 44 (2 November 2011) Telecom Italia response
More informationIntroduction to Internetworking
Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or
More informationVoice Analysis for Mobile Networks
White Paper VIAVI Solutions Voice Analysis for Mobile Networks Audio Quality Scoring Principals for Voice Quality of experience analysis for voice... 3 Correlating MOS ratings to network quality of service...
More informationData Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies
Data Link Layer Our goals: understand principles behind data link layer services: link layer addressing instantiation and implementation of various link layer technologies 1 Outline Introduction and services
More informationTransport Over IP. CSCI 690 Michael Hutt New York Institute of Technology
Transport Over IP CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP What is a transport protocol? Choosing to use a transport protocol Ports and Addresses Datagrams UDP What is a
More informationThe Transport Layer: User Datagram Protocol
The Transport Layer: User Datagram Protocol CS7025: Network Technologies and Server Side Programming http://www.scss.tcd.ie/~luzs/t/cs7025/ Lecturer: Saturnino Luz April 4, 2011 The UDP All applications
More information