Reliability in Multicast Communications
|
|
- Elwin Wiggins
- 5 years ago
- Views:
Transcription
1 Reliability in Multicast Communications Juan Ramón Díaz Santos, Jaime Lloret Mauri, José Miguel Jiménez Herranz Department of Communications Polytechnical University of Valencia Camino de Vera s/n, Valencia SPAIN Abstract: This article deals with a multicast application development for great size archives transference. This transference is done from a server to a selected number of network clients. The application combines the advantages of multicast traffic, which gives higher local network bandwidth performance, with the advantages of the reliable traffic. Key-Words: - Multicast, multicast reliability, real time protocol, bandwidth, file transference 1 Introduction Using multicast traffic it is possible to obtain greater advantage of the network resources [1]. Multicast traffic permits to transmit a packet from one source to great number of clients within the corporative network. Nevertheless, sensible information to the loss of packages is not possible to transmit using multicast techniques exclusively [2]. Multicast traffic uses UDP (User Datagram Protocol) as a transport layer protocol. Unlike it happens with TCP, UDP protocol does not provide any mechanism of segmentation. It does not provide acknowledgements neither send again lost fragments. So, this protocol does not provide reliability for communications [3][4]. Therefore, if we want to obtain reliability in a multicast communication, we must resort to the application layer to complement it with services that UDP is not able to provide. This work is a development of one of the possible solutions to the reliability problem in multicast transmissions [5]. 2 Problem Formulation The initial situation is the following: Different computers inside the corporate network need to update their operating system and their installed applications periodically. In order to update this software, it is necessary to transfer, from the file server, one or several archives, sometimes with great size, to each computer of the network. It wastes a lot of network resources and sometimes it causes the network collapse when it is required the total bandwidth during an excessive time interval. When this update is working, the traffic stops a lot of clients in the network. The use of multicast permits to reduce the transmitted traffic through the network considerably. But it is necessary to create a mechanism providing reliability. 2.1 Reliability In order to obtain the wished reliability, we need to design an application layer protocol to manage the flow of multicast frames between the file server and the different clients. It will be done exchanging control messages. The developed protocol must have the following functions: To identify the multicast group clients To initiate the multicast files transference To finalize multicast transference once all the clients have received the file. To detect the multicast frames lost implementing a mechanism of receipt requested. To send again those multicast frames lost diminishing the use of the network. Segmentation of the transferred file. Establishment of transmission windows. Considering the characteristics of this protocol it is decided to implement it on an independent TCP connection between each one of the clients and the server TCP Connection Each client who needs to receive an update file, it establishes a connection TCP with the file server. By means of this connection, the needed file to update is identified and it is communicated to the server establishing a TCP connection with the file server. Later, it is a delay of the beginning of the file transference by means of multicast [6].
2 In order to manage the communication, several control messages exchanged are defined. Those messages are shown in Figure 1. Figure 2. Graph indicating how the transfer flow control takes place Lost Frames By means of a series of timers one detects when the lost one of a frame takes place. In these cases the client uses TCP connection to request retransmit of the frame: Figure 1. Control messages 2.2 Multicast Transference When the number of connected clients, waiting the same file to update, reaches a certain predefined threshold, the transference of the file begins of automatic way. Using unicast TCP connection notifies to all the clients the beginning of the transference so that they are united to suitable group multicast. 1.- The client detects lost of the frame using the timers 2.- Send a control message requesting the retransmission of the frame. 3.- The server retransmit the frame using the nicast TCP connection only to the client who has asked for it, diminishing therefore the use of the network resources. 4.- The client sends an acknowledgment for the complete window. 5.- The transference of the following window begins Windowing The developed protocol manages the flow of multicast traffic segmenting the file in frames of small size and transferring every time a number N of frames, where N would be the size of the window: The process is the following one: 1.- Sending N frames multicast 2.- The clients send request acknowledgment after the correct reception of the N frames 3.- Send next N frames Figure 3. Designed mechanism Figure 3. Mechanism designed to recover lost frames. Figure 2. Transfer flow control 3 Problem Solution For the implementation of the communication protocol it has been chosen C++ by the capacity and flexibility that the language allows C and by the power that provides the object-oriented programming. In concrete it has been used like compiler Visual C++ version 6.0 and the libraries MFC of Microsoft. [7] The architecture has been used Client-Server of the applications TCP/IP for the creation of the connection TCP unicast between each one of the network clients who must receive the transmitted file and the server.
3 In such a way that we will have two types of applications, by a side we will have the server application who will run in the file server, and on the other hand, the client application running in the rest of computers. The server application remains in listening in a certain TCP port, hoping to that the clients connect themselves. Establishing an individual TCP connection between each one of the clients and the file server. Through TCP connection the interchange of control messages takes place, the managament of multicast communication between the server and each one of the clients, as well as the shipment of lost multicast frames, providing reliability to the transference of the update files. The communication protocol of layer application that has been developed, it appears like a set of objects and functions for C++. In order to facilitate the handling of the functions and the easy incorporation of the protocol to new network applications, the functions in an only librarie have been grouped. - TCP Control Connection - Multicast connection for transference Server In the server application, all the parameters used in the communication settle down and control, as much in the TCP Control Connection as in the transference of multicast files. The application allows to modify the following variables: - Threshold of connected clients - Size of multicast Frame - Size of TCP Frame - Size of Window - IP Address of the multicast group - Multicast port - TCP Port - Timers for retransmission 3.1 Application In order to be able to verify the operation of the communication protocol for the reliable transmission with multicast, an application has been developed that implements the librarie of functions. The operation of the application is very different according to executes in the updates file server or an PC client. Figure 5. Multicast server interface Figure 4. Application block diagram Figure 4 shows the block diagram of the application as much server as of the application client and as one double communication among them takes place: Figure 5 shows the server application while the multicacst transference of a update file of 40 Mb to 10 connected clients is taking. The server application puts to listening in selected TCP port and monitor the connections with the users who connect to the server. When the number of users surpasses the wished threshold, the file transference, using chosen multicast group, it starts of automatic way for all the clients. The application shows the results of the transference: Use of the bandwidth, total time of transmission, frames lost and returns to send using the TCP connection and introduced delays.
4 3.1.2 Client The client application connects with the server and hopes to that the rest of clients is connected to join to suitable group multicast. the file, and the average use of the bandwidth during the transference. The used dependent variables in the study are the number of equipment clients pertaining to group multicast and the size of the file Total time of transference In the first place we measured the total time that has been needed to complete the transference for files of different sizes and with a variable number of clients. Figure 7. Transference results Figure 6. Multicast client interface Figure 6 shows the graphical user interface to monitor the state of the transference in the client equipment. The client start the TCP connection with the file server and hopes to that the multicast begins transmission. Using the defined timers, it detects when the lost one of a multicast frame has taken place and solicits to cases out server its broadcasting through TCP connection. Once received the N frames that conform a window, the client send acknowledge to the server so that it sends the following window. Figure 7 shows the results obtained when measuring the total time necessary to make the transference of 5 files of 1, 2, 5, 10 y 40 Mbytes Bandwidth Next we have measured the average use of the bandwidth. 3.2 Measures In order to verify the operation of the application and to know the impact the communication protocol on the performance of the network a series of measures is made on a corporative network, using like interconnection devices switches Cisco Catalyst 1924, with 24 Ethernet ports of 10 Mbps. The server aplication run in the computer where they are you case the file updates, and the client application is running in 20 differents computers within the same broadcast domain. They are used like dependent variables, the total time of necessary transference for the transference of Figure 8. Bandwidth usage Figure 8 shows the used average bandwidth during the transference of the file Multicast vs Unicast In order to be able to observe the improvement in the yield that is obtained when using multicast in the transference of update archives, the results obtained
5 with a traditional unicast transmission are compared, for a file of 40 Mb of size and based on the number of clients. Figure 9 Multicast vs unicast Figure 9 shows the time necessary to complete the transference for a transmission unicast and a communication multicast. Whereas with multicast communication the time necessary to complete the transference is practically independent of the number of clients, with the unicast transference to each one of the clients the total time of transmission grows of linear form with the number of clients. [1]Armstrong, S., Freier, A. and Marzullo, K., Multicast Transport Protocol, RFC 1301, Internet Engineering Task Force, February 1992 [2] Sidnie Feit, TCP/IP, arquitectura, protocolos, impementación y seguridad, McGraw-Hill, 1998 [3] Talpade, R., Ammar, M. H., Single Connection Emulation: An Architecture for Providing a Reliable Multicast Transport Service, in Proceedings of the 15th IEEE Intl Conf on Distributed Computing Systems, Vancouver, June 1995 [4] Zabele, G.S., DeCleene, B., and Koifman, A., Reliable Multicast for Internet Applications, Proceedings of the Technical Conference on Telecommunications R&D in Massachusetts (March 12, 1996, Lowell, MA), pp [5] Levine, B., A Comparison of Known Classes of Reliable Multicast Protocols, Masters Thesis, University of California Santa Cruz, June [6]Chris Oggerino, High Availability Network Fundamentals, CiscoPress, 1998 [7] George Shepherd, Programación avanzada con Microsoft Visual C++.NET, McGraw-Hill, Conclusions The obtained results agree with the awaited ones. The transmission of the update files has been completed in all the cases of satisfactory way what demonstrates that the primary target of this project has been obtained: multicast transference multicast of files with reliability. On the other hand, one has demonstrated that with the use of multicast transmission is obtained to a very important saving of the resources of the corporative network when comparing the results obtained with those of a unicast traditional transference. In future extensions of this work the behavior of the communication protocol developed in complex atmospheres of work will study but, as they are: 1 Clients distributed in different VLAN 2 Number of clients very elevated 3 Access to the file server using a WAN connection Also diverse improvements have seted out, like the substitution of UDP protocol UDP for the control connection and the introduction of new timers that optimize the transmission. References:
CS-461 Internetworking. Dr. Mohamed Aboutabl
CS-461 Internetworking Dr. Mohamed Aboutabl http://www.cs.jmu.edu/users/aboutams The McGraw-Hill Companies, Inc., 2000 1 Chapter 1 Introduction The McGraw-Hill Companies, Inc., 2000 2 Internet today Network
More informationConcept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.
223 Chapter 19 Inter mediate TCP The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research that the Defense Advanced Research Projects Agency
More information4 rd class Department of Network College of IT- University of Babylon
1. INTRODUCTION We can divide audio and video services into three broad categories: streaming stored audio/video, streaming live audio/video, and interactive audio/video. Streaming means a user can listen
More informationTransport Layer Protocols TCP
Transport Layer Protocols TCP Gail Hopkins Introduction Features of TCP Packet loss and retransmission Adaptive retransmission Flow control Three way handshake Congestion control 1 Common Networking Issues
More informationQuestion 7: What are Asynchronous links?
Question 1:.What is three types of LAN traffic? Unicasts - intended for one host. Broadcasts - intended for everyone. Multicasts - intended for an only a subset or group within an entire network. Question2:
More informationVisionair. TNA - Collaborative remote visualization ENSAM URJC. Miguel Ramos García. Universidad Rey Juan Carlos, Móstoles (Spain)
Visionair TNA - Collaborative remote visualization ENSAM URJC Miguel Ramos García Universidad Rey Juan Carlos, Móstoles (Spain) Index Introduction... 3 1 Framework, the first contact.... 4 1.1 Information
More informationCCNA 1 Chapter 7 v5.0 Exam Answers 2013
CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the
More informationTransport Over IP. CSCI 690 Michael Hutt New York Institute of Technology
Transport Over IP CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP What is a transport protocol? Choosing to use a transport protocol Ports and Addresses Datagrams UDP What is a
More informationReliable Mobile IP Multicast Based on Hierarchical Local Registration
Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Reliable Mobile IP Multicast Based on Hierarchical Local Registration Huanming ZHANG, * Quanlong GUAN, Zi Zhao ZHU, Weiqi
More informationIntro to LAN/WAN. Transport Layer
Intro to LAN/WAN Transport Layer Transport Layer Topics Introduction (6.1) Elements of Transport Protocols (6.2) Internet Transport Protocols: TDP (6.5) Internet Transport Protocols: UDP (6.4) socket interface
More informationCS164 Final Exam Winter 2013
CS164 Final Exam Winter 2013 Name: Last 4 digits of Student ID: Problem 1. State whether each of the following statements is true or false. (Two points for each correct answer, 1 point for each incorrect
More informationRouting with a distance vector protocol - EIGRP
Routing with a distance vector protocol - EIGRP Introducing Routing and Switching in the Enterprise Chapter 5.2 Copyleft 2012 Vincenzo Bruno (www.vincenzobruno.it) Released under Crative Commons License
More informationThe aim of this unit is to review the main concepts related to TCP and UDP transport protocols, as well as application protocols. These concepts are
The aim of this unit is to review the main concepts related to TCP and UDP transport protocols, as well as application protocols. These concepts are important requirements for developing programs that
More informationA Fault-Tolerant P2P-based Protocol for Logical Networks Interconnection
A Fault-Tolerant P2P-based Protocol for Logical Networks Interconnection Jaime Lloret 1, Juan R. Diaz 2, Fernando Boronat 3 and Jose M. Jiménez 4 Department of Communications, Polytechnic University of
More informationGuide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16
Guide To TCP/IP, Second Edition Chapter 5 Transport Layer TCP/IP Protocols Objectives Understand the key features and functions of the User Datagram Protocol (UDP) Explain the mechanisms that drive segmentation,
More informationImproving Reliability in Ethernet Control Networks
Tech Tips Improving Reliability in Ethernet Control Networks SUMMARY The proliferation of Ethernet-enabled devices on the factory floor from PLCs to modules all the way down to sensors in support of the
More informationApplications and Performance Analysis of Bridging with L3 Forwarding on Wireless LANs
Applications and Performance Analysis of Bridging with L3 Forwarding on Wireless LANs Chibiao Liu and James Yu DePaul University School of CTI Chicago, IL {cliu1, jyu}@cs.depaul.edu Abstract This paper
More informationConcept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.
113 Chapter 9 TCP/IP Transport and Application Layer Services that are located in the transport layer enable users to segment several upper-layer applications onto the same transport layer data stream.
More informationBridging and Switching Basics
CHAPTER 4 Bridging and Switching Basics This chapter introduces the technologies employed in devices loosely referred to as bridges and switches. Topics summarized here include general link-layer device
More informationIntroduction to Networking. Operating Systems In Depth XXVII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved.
Introduction to Networking Operating Systems In Depth XXVII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved. Distributed File Systems Operating Systems In Depth XXVII 2 Copyright 2017 Thomas W.
More informationCS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP
CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering
More informationInternetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS
Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS 1. General (5p) a) The so-called hourglass model (sometimes referred to as a wine-glass ) has been used
More informationA. ARPANET was an early packet switched network initially connecting 4 sites (Stanford, UC Santa Barbara, UCLA, and U of Utah).
Volume: 245 Questions Question No: 1 Which of the following statements best describes ARPANET? A. ARPANET was an early packet switched network initially connecting 4 sites (Stanford, UC Santa Barbara,
More informationOSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,
ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure
More informationUser Datagram Protocol (UDP):
SFWR 4C03: Computer Networks and Computer Security Feb 2-5 2004 Lecturer: Kartik Krishnan Lectures 13-15 User Datagram Protocol (UDP): UDP is a connectionless transport layer protocol: each output operation
More informationObjectives. Chapter 10. Upon completion you will be able to:
Chapter 10 Figure 10.1 Position of IGMP in the network layer Objectives Upon completion you will be able to: Know the purpose of IGMP Know the types of IGMP messages Understand how a member joins a group
More informationZyPerUHD Network Requirements
ZyPerUHD Network Requirements ZeeVee, Inc. 295 Foster Street, Suite 200 Littleton, MA 01460 USA Table of Contents Basic elements of ZyPerUHD communication... 3 IP Address allocation... 3 Ports... 3 ZyPer
More informationIP Multicast Routing Technology Overview
Finding Feature Information, on page 1 Information About IP Multicast Technology, on page 1 Finding Feature Information Your software release may not support all the features documented in this module.
More informationCommunicating over the Network
Communicating over the Network Network Fundamentals Chapter 2 Version 4.0 1 Network Structure The elements of communication 3 common elements of communication Message source people/electronic devices need
More informationLecture 3: The Transport Layer: UDP and TCP
Lecture 3: The Transport Layer: UDP and TCP Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 3-1 The Transport Layer Provides efficient and robust end-to-end
More informationIP Multicast: Does It Really Work? Wayne M. Pecena, CPBE, CBNE
IP Multicast: Does It Really Work? Wayne M. Pecena, CPBE, CBNE Texas A&M Information Technology Educational Broadcast Services - KAMU v2 Agenda Introduction IP Networking Review The Multicast Group Multicast
More informationDefining Networks with the OSI Model. Module 2
Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the
More informationVoIP / RoIP for Technicians
Phase 4 Design, Inc VoIP / RoIP for Technicians Presented by Dave Grant Phase 4 Design, Inc dave@phase4.org 2017 Phase 4 Design, Inc Notes 2 2017, Phase 4 Design, Inc. Table of Contents What are we going
More informationHands-On IP Multicasting for Multimedia Distribution Networks
Hands-On for Multimedia Distribution Networks Course Description This Hands-On course provides an in-depth look how IP multicasting works, its advantages and limitations and how it can be deployed to provide
More information1: Review Of Semester Provide an overview of encapsulation.
1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,
More informationConfiguring Data Export for Flexible NetFlow with Flow Exporters
Configuring Data Export for Flexible NetFlow with Flow Exporters Last Updated: September 4, 2012 This document contains information about and instructions for configuring flow exporters to export Flexible
More informationThe Network Layer and Routers
The Network Layer and Routers Daniel Zappala CS 460 Computer Networking Brigham Young University 2/18 Network Layer deliver packets from sending host to receiving host must be on every host, router in
More informationIP Telephony development and performance over IEEE g WLAN
IP Telephony development and performance over IEEE 8.11g WLAN Miguel Edo 1, Miguel Garcia, Carlos Turro 3 and Jaime Lloret Universidad Politécnica de Valencia, Camino Vera s/n,, Valencia (Spain) 1 miedmon@epsg.upv.es;
More informationNetworking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ
Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking
More informationGoals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks
Verkkomedian perusteet Fundamentals of Media T-110.250 19.2.2002 Antti Ylä-Jääski 19.2.2002 / AYJ lide 1 Goals and topics protocols Discuss how packet-switching networks differ from circuit switching networks.
More informationChao Li Thomas Su Cheng Lu
CMPT885 High-Performance Network Final Project Presentation Transport Protocols on IP Multicasting Chao Li Thomas Su Cheng Lu {clij, tmsu, clu}@cs.sfu.ca School of Computing Science, Simon Fraser University
More informationTable of Contents 1 IGMP Snooping Configuration 1-1
Table of Contents 1 IGMP Snooping Configuration 1-1 IGMP Snooping Overview 1-1 Principle of IGMP Snooping 1-1 Basic Concepts in IGMP Snooping 1-2 How IGMP Snooping Works 1-3 Processing of Multicast Protocol
More informationEthernet Hub. Campus Network Design. Hubs. Sending and receiving Ethernet frames via a hub
Campus Network Design Thana Hongsuwan Ethernet Hub 2003, Cisco Systems, Inc. All rights reserved. 1-1 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0 1-2 Sending and receiving Ethernet frames
More informationWCCPv2 and WCCP Enhancements
WCCPv2 and WCCP Enhancements Release 12.0(11)S June 20, 2000 This feature module describes the Web Cache Communication Protocol (WCCP) Enhancements feature and includes information on the benefits of the
More informationUNIVERSITY OF OSLO Department of informatics. Investigating the limitations of video stream scheduling in the Internet. Master thesis.
UNIVERSITY OF OSLO Department of informatics Investigating the limitations of video stream scheduling in the Internet Master thesis Espen Jacobsen May, 2009 Investigating the limitations of video stream
More informationConfiguring Asynchronous Serial Traffic over UDP
Configuring Asynchronous Serial Traffic over UDP This chapter describes how to communicate with a modem using the Asynchronous Serial Traffic over UDP feature in the following main sections: UDPTN Overview
More informationConfiguring Data Export for Flexible NetFlow with Flow Exporters
Configuring Data Export for Flexible NetFlow with Flow Exporters Last Updated: November 29, 2012 This document contains information about and instructions for configuring flow exporters to export Flexible
More informationConfigure Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) Service Settings on a Switch
Configure Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) Service Settings on a Switch Objective Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are transportation
More informationContinuous Real Time Data Transfer with UDP/IP
Continuous Real Time Data Transfer with UDP/IP 1 Emil Farkas and 2 Iuliu Szekely 1 Wiener Strasse 27 Leopoldsdorf I. M., A-2285, Austria, farkas_emil@yahoo.com 2 Transilvania University of Brasov, Eroilor
More informationET4254 Communications and Networking 1
Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of
More informationNetwork Working Group Request for Comments: 1663 Category: Standards Track July 1994
Network Working Group D. Rand Request for Comments: 1663 Novell Category: Standards Track July 1994 Status of this Memo PPP Reliable Transmission This document specifies an Internet standards track protocol
More informationECE 650 Systems Programming & Engineering. Spring 2018
ECE 650 Systems Programming & Engineering Spring 2018 Networking Transport Layer Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) TCP/IP Model 2 Transport Layer Problem solved:
More informationCopyleft 2005, Binnur Kurt. Objectives
1 ing Fundamentals Copyleft 2005, Binnur Kurt Objectives Define basic networking terms Describe some commonly used network applications Describe the main purposes and functions of computer networking Describe
More informationIntroduction to Protocols
Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These
More informationTHE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.
THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical OSI Model Chapter 1 Review By: Allan Johnson Table of Contents Go There! Go There! Go There! Go There! Go There! Go There!
More informationOperating Systems and. Computer Networks. Introduction to Computer Networks. Operating Systems and
Computer Networks Introduction to Computer Networks Linux System Structure Corbet et al, Linux Device Drivers, O Reilly, 2005 Categories of System Calls Process Control load, execute, end, abort, create
More informationOperation Manual IP Addressing and IP Performance H3C S5500-SI Series Ethernet Switches. Table of Contents
Table of Contents Table of Contents... 1-1 1.1 IP Addressing Overview... 1-1 1.1.1 IP Address Classes... 1-1 1.1.2 Special Case IP Addresses... 1-2 1.1.3 Subnetting and Masking... 1-2 1.2 Configuring IP
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationClick Here for Type Bulletin
Click Here for Type Bulletin No: H-080102 Category: VersaMax To: 1/5, 2, 3, 4 Summary VersaMax CPUE05 Ethernet Loading Considerations Guidelines on how to determine if you are overloading the CPUE05's
More informationVersion 2.1 User Guide 08/2003
UDP TEST TOOL TM Version 2.1 User Guide 08/2003 SimpleComTools, LLC 1 OVERVIEW Introduction................................... UDP vs. TCP................................... 3 3 SOFTWARE INSTALLATION..........................
More informationIntroduction. IP Datagrams. Internet Service Paradigm. Routers and Routing Tables. Datagram Forwarding. Example Internet and Conceptual Routing Table
Introduction Datagram Forwarding Gail Hopkins Service paradigm IP datagrams Routing Encapsulation Fragmentation Reassembly Internet Service Paradigm IP Datagrams supports both connectionless and connection-oriented
More informationUDP, TCP, IP multicast
UDP, TCP, IP multicast Dan Williams In this lecture UDP (user datagram protocol) Unreliable, packet-based TCP (transmission control protocol) Reliable, connection oriented, stream-based IP multicast Process-to-Process
More informationMULTICAST AND IGMPv3. Announcements. Today s Lecture. Multicast (No Sharing) Unicast. I. HW5 will be online today CIDR, subnets, routing
Announcements MULTICAST AND IGMPv3 I. HW5 will be online today CIDR, subnets, routing due in one week Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University II. Correction to calendar! copyright
More informationInternet Management Overview
Internet Management Overview Based on the Manager-Agent Model Initially SNMPv1 (1990), SNMPv2 1996 Managed Objects similar to OSI attributes, specified through ASN.1 Macros the SNMP Structure of Management
More informationUsing the Multicast Routing Monitor
Using the Multicast Routing Monitor Last Updated: December 5, 2012 The Multicast Routing Monitor (MRM) is a management diagnostic tool that provides network fault detection and isolation in a large multicast
More informationTCP Congestion Control
1 TCP Congestion Control Onwutalobi, Anthony Claret Department of Computer Science University of Helsinki, Helsinki Finland onwutalo@cs.helsinki.fi Abstract This paper is aimed to discuss congestion control
More informationObjectives. 1. Introduction:
University of Jordan Faculty of Engineering & Technology Computer Engineering Department Advance Networks Laboratory 0907529 Exp.5 Spanning-Tree Protocol (STP) Objectives 1. Explain the role of redundancy
More informationIntroduction to Networks and the Internet
Introduction to Networks and the Internet CMPE 80N Announcements Project 2. Reference page. Library presentation. Internet History video. Spring 2003 Week 7 1 2 Today Internetworking (cont d). Fragmentation.
More informationLecture (11) OSI layer 4 protocols TCP/UDP protocols
Lecture (11) OSI layer 4 protocols TCP/UDP protocols Dr. Ahmed M. ElShafee ١ Agenda Introduction Typical Features of OSI Layer 4 Connectionless and Connection Oriented Protocols OSI Layer 4 Common feature:
More informationModule 2 Overview of Computer Networks
Module 2 Overview of Computer Networks Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link:
More informationModule 2 Overview of. Computer Networks
Module Overview of Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link: CS454/654 - Issues How
More informationComparison Study of Transmission Control Protocol and User Datagram Protocol Behavior over Multi-Protocol Label Switching Networks in Case of Failures
Journal of Computer Science 5 (12): 1042-1047, 2009 ISSN 1549-3636 2009 Science Publications Comparison Study of Transmission Control Protocol and User Datagram Protocol Behavior over Multi-Protocol Label
More informationWeek 2 / Paper 1. The Design Philosophy of the DARPA Internet Protocols
Week 2 / Paper 1 The Design Philosophy of the DARPA Internet Protocols David D. Clark ACM CCR, Vol. 18, No. 4, August 1988 Main point Many papers describe how the Internet Protocols work But why do they
More informationMLD. MLDv1 (defined in RFC 2710), which is derived from IGMPv2. MLDv2 (defined in RFC 3810), which is derived from IGMPv3.
Introduction to Multicast listener discovery protocol () is used by an IPv6 router to discover the presence of multicast listeners on directly-attached subnets. Multicast listeners are nodes wishing to
More informationOutline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste
Outline 15-441 Computer Networking Lecture 18 TCP Performance Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 TCP congestion avoidance TCP slow start TCP modeling TCP details 2 AIMD Distributed,
More informationCSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1. Brian Harrington. February 13, University of Toronto Scarborough
CSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1 Brian Harrington University of Toronto Scarborough February 13, 2018 ADMIN Assignments Midterm after reading week (Feb 27) In class Covering everything
More informationCCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4
CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication
More informationInternetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1
Internetworking Concepts Overview 2000, Cisco Systems, Inc. 2-1 2000, Cisco Systems, Inc. www.cisco.com ICND v1.0a 2-2 Objectives On completion of this chapter, you will be able to perform the following
More informationII. Principles of Computer Communications Network and Transport Layer
II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part
More informationENSC 427: COMMUNICATION NETWORKS
ENSC 427: COMMUNICATION NETWORKS Comparison of TCP with "utp" for BitTorrent transfers Spring 2009 FINAL PROJECT Adam Ciapponi Robert Hueber Robert Szolomicki aciappon@sfu.ca rhueber@sfu.ca rms6@sfu.ca
More informationInternetworking Models The OSI Reference Model
Internetworking Models When networks first came into being, computers could typically communicate only with computers from the same manufacturer. In the late 1970s, the Open Systems Interconnection (OSI)
More informationCisco Cisco Certified Network Associate (CCNA)
Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data
More informationFall 2012: FCM 708 Bridge Foundation I
Fall 2012: FCM 708 Bridge Foundation I Prof. Shamik Sengupta Instructor s Website: http://jjcweb.jjay.cuny.edu/ssengupta/ Blackboard Website: https://bbhosted.cuny.edu/ Intro to Computer Networking Transport
More informationHigh Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols
High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:
More informationNT1210 Introduction to Networking. Unit 10
NT1210 Introduction to Networking Unit 10 Chapter 10, TCP/IP Transport Objectives Identify the major needs and stakeholders for computer networks and network applications. Compare and contrast the OSI
More informationTCP/IP Performance ITL
TCP/IP Performance ITL Protocol Overview E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP IP ICMP ARP RARP (Auxiliary Services) Ethernet, X.25, HDLC etc. ATM 4/30/2002 Hans Kruse & Shawn Ostermann,
More informationCommunication Networks
Communication Networks Prof. Laurent Vanbever Exercises week 4 Reliable Transport Reliable versus Unreliable Transport In the lecture, you have learned how a reliable transport protocol can be built on
More informationConfiguring TCP Header Compression
Configuring TCP Header Compression First Published: January 30, 2006 Last Updated: May 5, 2010 Header compression is a mechanism that compresses the IP header in a packet before the packet is transmitted.
More informationUNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING
UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING ECE361 Computer Networks Midterm March 06, 2017, 6:15PM DURATION: 80 minutes Calculator Type: 2 (non-programmable calculators) Examiner:
More informationLecture 3. The Network Layer (cont d) Network Layer 1-1
Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets
More informationRequest for Comments: 938 February 1985
Network Working Group Request for Comments: 938 Trudy Miller ACC February 1985 Functional and Interface Specification STATUS OF THIS MEMO This RFC is being distributed to members of the DARPA research
More informationTCP/IP and the OSI Model
TCP/IP BASICS TCP/IP and the OSI Model TCP/IP BASICS The network protocol of the Internet Composed of six main protocols IP Internet Protocol UDP User Datagram Protocol TCP Transmission Control Protocol
More informationInternet Group Management Protocol, Version 3 <draft-ietf-idmr-igmp-v3-07.txt> STATUS OF THIS MEMO
INTERNET-DRAFT Brad Cain, Mirror Image Internet Steve Deering, Cisco Systems Bill Fenner, AT&T Labs - Research Isidor Kouvelas, Cisco Systems Ajit Thyagarajan, Ericsson Expires September 2001 March 2001
More informationChapter 3 Review Questions
Chapter 3 Review Questions. 2. 3. Source port number 6 and destination port number 37. 4. TCP s congestion control can throttle an application s sending rate at times of congestion. Designers of applications
More informationIPV6 SIMPLE SECURITY CAPABILITIES.
IPV6 SIMPLE SECURITY CAPABILITIES. 50 issues from RFC 6092 edited by J. Woodyatt, Apple Presentation by Olle E. Johansson, Edvina AB. ABSTRACT The RFC which this presentation is based upon is focused on
More informationEthernet 101 Siemens Industry Inc All rights reserved. usa.siemens.com/industry
Connected Manufacturing Ethernet 101 usa.siemens.com/industry Why Ethernet Ethernet is Everywhere! Page 2 Ethernet is everywhere Ethernet is the most common computer networking medium Standardization on
More informationCSE 123: Computer Networks Alex C. Snoeren. HW 1 due NOW!
CSE 123: Computer Networks Alex C. Snoeren HW 1 due NOW! Automatic Repeat Request (ARQ) Acknowledgements (ACKs) and timeouts Stop-and-Wait Sliding Window Forward Error Correction 2 Link layer is lossy
More informationTCP Flavors Simulation Evaluations over Noisy Environment
International Journal of Information Engineering and Applications 2018; 1(1): 11-17 http://www.aascit.org/journal/information TCP Flavors Simulation Evaluations over Noisy Environment Elsadig Gamaleldeen
More informationZone-Based Policy Firewall High Availability
The feature enables you to configure pairs of devices to act as backup for each other. High availability can be configured to determine the active device based on a number of failover conditions. When
More informationNetworking Applications
Networking Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport Multimedia Multimedia 1 Outline Audio and Video Services
More information