CSE3213 Computer Network I

Size: px
Start display at page:

Download "CSE3213 Computer Network I"

Transcription

1 SE33 omputer Network I Service Model, Error ontrol, Flow ontrol, and Link Sharing (h and 5.7.) ourse page: Slides modiied om lberto Leon-Garcia and Indra Widjaja

2 Peer-to to-peer Protocols and Service Models

3 Peer-to to-peer Protocols n + peer process SDU n peer process n peer process PDU n + peer process SDU n peer process n peer process Peer-to-Peer processes execute layer-n protocol to provide service to layer-(n+) Layer-(n+) peer calls layer-n and passes Service Data Units (SDUs) or transer Layer-n peers exchange Protocol Data Units (PDUs) to eect transer Layer-n delivers SDUs to destination layer-(n+) peer 3

4 Service Models The service model speciies the inormation transer service layer-n provides to layer-(n+) The most important distinction is whether the service is: onnection-oriented onnectionless Service model possible eatures: rbitrary message size or structure Sequencing and Reliability Timing, Pacing, and Flow control Multiplexing Privacy, integrity, and authentication 4

5 onnection-oriented Transer Service onnection Establishment onnection must be established between layer-(n+) peers Layer-n protocol must: Set initial parameters, e.g. sequence numbers; and llocate resources, e.g. buers Message transer phase Exchange o SDUs Disconnect phase Example: TP, PPP n + peer process send n + peer process receive SDU Layer n connection-oriented service SDU 5

6 onnectionless Transer Service No onnection setup, simply send SDU Each message send independently Must provide all address inormation per message Simple & quick Example: UDP, IP n + peer process send n + peer process receive SDU Layer n connectionless service 6

7 Message Size and Structure What message size and structure will a service model accept? Dierent services impose restrictions on size & structure o data it will transer Single bit? Block o bytes? Byte stream? Ex: Transer o voice mail = long message Ex: Transer o voice call = byte stream (a) voice mail= message = entire sequence o speech samples call = sequence o -byte messages (b) 7

8 Segmentation & Blocking To accommodate arbitrary message size, a layer may have to deal with messages that are too long or too short or its protocol Segmentation & Reassembly: a layer breaks long messages into smaller blocks and reassembles these at the destination Blocking & Unblocking: a layer combines small messages into bigger blocks prior to transer long message or more short messages or more blocks block 8

9 Reliability & Sequencing Reliability: re messages or inormation stream delivered error-ee and without loss or duplication? Sequencing: re messages or inormation stream delivered in order? RQ protocols combine error detection, retransmission, and sequence numbering to provide reliability & sequencing Examples: TP and HDL 9

10 Pacing and Flow ontrol Messages can be lost i receiving system does not have suicient buering to store arriving messages I destination layer-(n+) does not retrieve its inormation ast enough, destination layern buers may overlow Pacing & Flow ontrol provide backpressure mechanisms that control transer according to availability o buers at the destination Examples: TP and HDL 0

11 Timing pplications involving voice and video generate units o inormation that are related temporally Destination application must reconstruct temporal relation in voice/video units Network transer introduces delay & jitter Timing Recovery protocols use timestamps & sequence numbering to control the delay & jitter in delivered inormation Examples: RTP & associated protocols in Voice over IP

12 Multiplexing Multiplexing enables multiple layer-(n+) users to share a layer-n service multiplexing tag is required to identiy speciic users at the destination Examples: UDP, IP

13 Privacy, Integrity, & uthentication Privacy: ensuring that inormation transerred cannot be read by others Integrity: ensuring that inormation is not altered during transer uthentication: veriying that sender and/or receiver are who they claim to be Security protocols provide these services and are discussed in hapter Examples: IPSec, SSL 3

14 End-to to-end vs. Hop-by by-hop service eature can be provided by implementing a protocol end-to-end across the network across a single hop in the network Example: Perorm error control at every hop in the network or only between the source and destination? Perorm low control between every hop in the network or only between source & destination? We next consider the tradeos between the two approaches 4

15 Error control in Data Link Layer (a) Packets Data link layer Physical layer Frames Packets Data link layer Physical layer B Data Link operates over wire-like, directly-connected systems Frames can be corrupted or lost, but arrive in order (b) 3 Medium B 3 Data link perorms error-checking & retransmission Ensures error-ee packet transer between two systems Physical layer entity Data link layer entity 3 Network layer entity 5

16 Error ontrol in Transport Layer Transport layer protocol (e.g. TP) sends segments across network and perorms end-to-end error checking & retransmission Underlying network is assumed to be unreliable End system Messages Transport layer Network layer Data link layer Physical layer Network layer Data link layer Physical layer Segments Network layer Data link layer Physical layer Messages Transport layer Network layer Data link layer Physical layer End system B Network 6

17 Segments can experience long delays, can be lost, or arrive out-o-order because packets can ollow dierent paths across network End-to-end error control protocol more diicult 3 End System α End System β Medium B Network 3 Network layer entity 4 Transport layer 7entity

18 End-to to-end pproach Preerred Hop-by-hop Data Data Data Data / N / N / N / N Hop-by-hop cannot ensure EE correctness Faster recovery End-to-end /N Simple inside the network Data Data Data Data More scalable i complexity at the edge 8

19 RQ Protocols and Reliable Data Transer 9

20 utomatic Repeat Request (RQ) Purpose: to ensure a sequence o inormation packets is delivered in order and without errors or duplications despite transmission errors & losses We will look at: Stop-and-Wait RQ Go-Back N RQ Selective Repeat RQ Basic elements o RQ: Error-detecting code with high error coverage s (positive acknowledgments Ns (negative acknowlegments) Timeout mechanism 0

21 Stop-and and-wait RQ Transmit a ame, wait or Packet Timer set ater each ame transmission Transmitter (Process ) Inormation ame ontrol ame Receiver (Process B) Error-ee packet Header Inormation packet R Header R Inormation ame ontrol ame: s

22 Need or Sequence Numbers (a) Frame lost B Frame 0 Time-out Frame Frame Frame Time (b) lost B Frame 0 Time-out Frame Frame Frame Time In cases (a) & (b) the transmitting station acts the same way But in case (b) the receiving station B accepts ame twice Question: How is the receiver to know the second ame is also ame? nswer: dd ame sequence number in header S last is sequence number o most recent transmitted ame

23 (c) Premature Time-out Sequence Numbers B Time-out Frame 0 Frame 0 Frame Frame Time The transmitting station misinterprets duplicate s Incorrectly assumes second acknowledges Frame Question: How is the receiver to know second is or ame 0? nswer: dd ame sequence number in header R next is sequence number o next ame expected by the receiver Implicitly acknowledges receipt o all prior ames 3

24 -Bit Sequence Numbering Suices S last Timer R next Transmitter S last Receiver B R next Global State: (S last, R next ) (0,0) Error-ee ame 0 (0,) arrives at receiver or ame arrives at transmitter Error-ee ame (,0) arrives at receiver (,) or ame 0 arrives at transmitter 4

25 Stop-and and-wait RQ Transmitter Ready state wait request om higher layer or packet transer When request arrives, transmit ame with updated S last and R Go to Wait State Wait state Wait or or timer to expire; block requests om higher layer I timeout expires retransmit ame and reset timer I received: I sequence number is incorrect or i errors detected: ignore I sequence number is correct (R next = S last +): accept ame, go to Ready state Receiver lways in Ready State Wait or arrival o new ame When ame arrives, check or errors I no errors detected and sequence number is correct (S last =R next ), then accept ame, update R next, send ame with R next, deliver packet to higher layer I no errors detected and wrong sequence number discard ame send ame with R next I errors detected discard ame 5

26 First ame bit enters channel Stop-and and-wait Eiciency Last ame bit enters channel hannel idle while transmitter waits or arrives t B t First ame bit arrives at receiver Last ame bit arrives at receiver Receiver processes ame and prepares 0000 bit Mbps takes 0 ms to transmit I wait or = ms, then eiciency = 0/= 9% I wait or = 0 ms, then eiciency =0/30 = 33% 6

27 Stop-and and-wait Model t 0 = total time to transmit ame t proc B t prop ame t time t proc t ack t prop t 0 = = t t prop prop + + t t proc proc + + t n R + t + ack n R a bits/ino ame bits/ ame channel transmission rate 7

28 S&W Eiciency on Error-ee channel Eective transmission rate: R 0 e bits or header & R number o inormation bits delivered to destination n = = total time required to deliver the inormation bits t 0 n o, Transmission eiciency: η 0 = R e R = n n t0 R o = + n n a + n n ( t o prop + t n proc ) R. Eect o ame overhead Eect o ame Eect o Delay-Bandwidth Product 8

29 Example: Impact o Delay-Bandwidth Product n =50 bytes = 0000 bits, n a =n o =5 bytes = 00 bits xdelayxbw Eiciency ms 00 km 0 ms 000 km 00 ms 0000 km sec km Mbps % % 0 5 9% 0 6 % Gbps 0 6 % % % % Stop-and-Wait does not work well or very high speeds or long propagation delays 9

30 S&W Eiciency in hannel with Errors Let P = probability ame arrives w/o errors vg. # o transmissions to irst correct arrival is then / ( P ) I -in-0 get through without error, then avg. 0 tries to success vg. Total Time per ame is then t 0 /( P ) η SW = R e R = n t 0 n o P R = + n n a + n n ( t o prop + t n proc ) R ( P ) Eect o ame loss 30

31 Example: Impact Bit Error Rate n =50 bytes = 0000 bits, n a =n o =5 bytes = 00 bits Find eiciency or random bit errors with p=0, 0-6, 0-5, 0-4 P = ( p) n e n p or large n and small p P Eiciency Mbps & ms 88% 86.6% 79.% 3.% Bit errors impact perormance as n p approach 3

32 Go-Back Back-N Improve Stop-and-Wait by not waiting! eep channel busy by continuing to send ames llow a window o up to W s outstanding ames Use m-bit sequence numbering I or oldest ame arrives beore window is exhausted, we can continue transmitting I window is exhausted, pull back and retransmit all outstanding ames lternative: Use timeout 3

33 Go-Back Back-N N RQ Go-Back-4: 4 ames are outstanding; so go back Time B 3 out o sequence ames R next Frame transmission are pipelined to keep the channel busy Frame with errors and subsequent out-o-sequence ames are ignored Transmitter is orced to go back when window o 4 is exhausted 33

34 Window size long enough to cover round trip time Stop-and-Wait RQ 0 Time-out expires 0 Time B Receiver is looking or R next =0 Go-Back-N RQ 0 Four ames are outstanding; so go back Time B Receiver is looking or R next =0 Out-osequence ames

35 Go-Back Back-N N with Timeout Problem with Go-Back-N as presented: I ame is lost and source does not have ame to send, then window will not be exhausted and recovery will not commence Use a timeout with each ame When timeout expires, resend all outstanding ames 35

36 Go-Back Back-N N Transmitter & Receiver Frames transmitted and ed Timer Timer Timer Transmitter Send Window... S last S recent S last +W s - Buers S last S last +... S recent... S last +W s - oldest un- ed ame most recent transmission max Seq # allowed Receiver Frames received Receive Window R next Receiver will only accept a ame that is error-ee and that has sequence number R next When such ame arrives R next is incremented by one, so the receive window slides orward by one 36

37 Sliding Window Operation Transmitter Send Window... m-bit Sequence Numbering Frames transmitted and ed S last S recent S last +W s - m 0 Transmitter waits or error-ee ame with sequence number S last When such ame arrives, S last is incremented by one, and the send window slides orward by one S last send window i + W s i + i 37

38 Maximum llowable Window Size is W s = m - M = = 4, Go-Back - 4: Transmitter goes back Time B R next Receiver has R next = 0, but it does not know whether its or ame 0 was received, so it does not know whether this is the old ame 0 or a new ame 0 M = = 4, Go-Back-3: 0 Transmitter goes back 3 0 Time B R next Receiver has R next = 3, so it rejects the old ame 0 38

39 Piggybacking in Bidirectional GBN Transmitter Receiver S B recent RB next S recent R next Receiver Transmitter Receive Window B Receive Window R next Send Window... R B next B Send Window... S last S last +W s - Timer Timer Timer Timer Buers S last S last +... S recent... S last +W s - Note: Out-osequence error-ee ames discarded ater R next examined S B last S B last +WB s - Timer Buers S B last Timer S B last +... Timer S B recent... Timer S B last +WB s - 39

40 Required Timeout & Window Size T out T proc T prop T T T prop Timeout value should allow or: Two propagation times + processing time: T prop + T proc ame that begins transmission right beore our ame arrives T Next ame carries the, T W s should be large enough to keep channel busy or T out 40

41 Eiciency o Go-Back Back-N GBN is completely eicient, i W s large enough to keep channel busy, and i channel is error-ee ssume P ame loss probability, then time to deliver a ame is: t i irst ame transmission succeeds ( P ) T + W s t /(-P ) i the irst transmission does not succeed P t η GBN GBN = t ( P n no tgbn = R ) + P { t s Wst + P no n = + ( W ) P } = t ( P + ) P W t s P and Delay-bandwidth product determines W s 4

42 Example: Impact Bit Error Rate on GBN n =50 bytes = 0000 bits, n a =n o =5 bytes = 00 bits ompare S&W with GBN eiciency or random bit errors with p = 0, 0-6, 0-5, 0-4 and R = Mbps & 00 ms Mbps x 00 ms = bits = 0 ames Use W s = Eiciency S&W 8.9% 8.8% 8.0% 3.3% GBN 98% 88.% 45.4% 4.9% Go-Back-N signiicant improvement over Stop-and-Wait or large delay-bandwidth product Go-Back-N becomes ineicient as error rate increases 4

43 Selective Repeat RQ Go-Back-N RQ ineicient because multiple ames are resent when errors or losses occur Selective Repeat retransmits only an individual ame Timeout causes individual corresponding ame to be resent N causes retransmission o oldest un-acked ame Receiver maintains a receive window o sequence numbers that can be accepted Error-ee, but out-o-sequence ames with sequence numbers within the receive window are buered rrival o ame with R next causes window to slide orward by or more 43

44 44 B 0 Time N Selective Repeat RQ Selective Repeat RQ

45 Selective Repeat RQ Transmitter Send Window... Receiver Receive Window Frames transmitted and ed S last S recent S last + W s - Frames received R next R next + W r - Timer Buers S last Buers R next + Timer S last + R next + Timer... S recent R next + W r - max Seq # accepted S last + W s - 45

46 Send & Receive Windows Transmitter Receiver m - 0 m - 0 S last send window i + W s i + Moves k orward when arrives with R next = S last + k k =,, W s - i j + W r R next receive window Moves orward by or more when ame arrives with Seq. # = R next i j 46

47 What size W s and W r allowed? Example: M= =4, W s =3, W r =3 Send Window {0,,} {,} {} {.} 0 0 Frame 0 resent Time Receive Window B 3 {0,,} {,,3} {,3,0} {3,0,} Old ame 0 accepted as a new ame because it alls in the receive window 47

48 W s + W r = m is maximum allowed Example: M= =4, W s =, W r = Send Window {0,} {} {.} 0 Frame 0 resent 0 Time Receive Window B {0,} {,} {,3} Old ame 0 rejected because it alls outside the receive window 48

49 Why W s + W r = m works Transmitter sends ames 0 to Ws-; send window empty ll arrive at receiver ll s lost Transmitter resends ame 0 Receiver window starts at {0,, W r } Window slides orward to {W s,,w s +W r -} Receiver rejects ame 0 because it is outside receive window m - 0 m - 0 S last W s +W r - send window W s - receive window R next W s 49

50 pplications o Selective Repeat RQ TP (Transmission ontrol Protocol): transport layer protocol uses variation o selective repeat to provide reliable stream service Service Speciic onnection Oriented Protocol: error control or signaling messages in TM networks 50

51 Eiciency o Selective Repeat ssume P ame loss probability, then number o transmissions required to deliver a ame is: t / (-P ) η SR = t n R n o /( P ) = ( n n o )( P ) 5

52 Example: Impact Bit Error Rate on Selective Repeat n =50 bytes = 0000 bits, n a =n o =5 bytes = 00 bits ompare S&W, GBN & SR eiciency or random bit errors with p=0, 0-6, 0-5, 0-4 and R= Mbps & 00 ms Eiciency S&W 8.9% 8.8% 8.0% 3.3% GBN 98% 88.% 45.4% 4.9% SR 98% 97% 89% 36% Selective Repeat outperorms GBN and S&W, but eiciency drops as error rate increases 5

53 omparison o RQ Eiciencies ssume n a and n o are negligible relative to n, and L = (t prop +t proc )R/n =(W s -), then Selective-Repeat: no ηsr = ( P )( ) ( P n Go-Back-N: P P ηgbn = = + ( W ) P + LP Stop-and-Wait: ( P ηsw = n ( t a + + n S prop ) + t n proc ) R ) P + L For P 0, SR & GBN same For P, GBN & SW same 53

54 RQ Eiciencies Eiciency RQ Eiciency om parison LOG(p) p Delay-Bandwidth product = 0, 00 Selective Repeat Go Back N 0 Stop and Wait 00 Go Back N 00 Stop and Wait 0 54

55 Flow ontrol 55

56 Flow ontrol buer ill Inormation ame Transmitter Receiver ontrol ame Receiver has limited buering to store arriving ames Several situations cause buer overlow Mismatch between sending rate & rate at which user can retrieve data Surges in ame arrivals Flow control prevents buer overlow by regulating rate at which source is allowed to send inormation 56

57 X ON / X OFF threshold Inormation ame Transmitter Receiver Transmit X OFF Transmit Time on o o on B Time T prop Threshold must activate OFF signal while T prop R bits still remain in buer 57

58 t cycle Window Flow ontrol Return o permits Time B Sliding Window RQ method with W s equal to buer available Transmitter can never send more than W s ames s that slide window orward can be viewed as permits to transmit more an also pace s as shown above Return permits (s) at end o cycle regulates transmission rate Problems using sliding window or both error & low control hoice o window size Interplay between transmission rate & retransmissions TP separates error & low control Time 58

59 Link Sharing Using Statistical Multiplexing 59

60 Statistical Multiplexing Multiplexing concentrates bursty traic onto a shared line Greater eiciency and lower cost Header Data payload B Buer Output line Input lines 60

61 Tradeo Delay or Eiciency (a) Dedicated lines B B (b) Shared lines B B Dedicated lines involve not waiting or other users, but lines are used ineiciently when user traic is bursty Shared lines concentrate packets into shared line; packets buered (delayed) when line is not immediately available 6

62 Multiplexers inherent in Packet Switches N N Packets/ames orwarded to buer prior to transmission om switch Multiplexing occurs in these buers 6

63 Multiplexer Modeling B Input lines Buer Output line rrivals: What is the packet interarrival pattern? Service Time: How long are the packets? Service Discipline: What is order o transmission? Buer Discipline: I buer is ull, which packet is dropped? Perormance Measures: Delay Distribution; Packet Loss Probability; Line Utilization 63

64 Delay = Waiting + Service Times Packet completes transmission Packet begins transmission P P P3 P4 P5 Service time Packet arrives at queue P P P3 P4 Waiting time P5 Packets arrive and wait or service Waiting Time: om arrival instant to beginning o service Service Time: time to transmit packet Delay: total time in system = waiting time + service time 64

65 Fluctuations in Packets in the System (a) Dedicated lines B B (b) Shared line B B (c) N(t) Number o packets in the system 65

66 Packet Lengths & Service Times R bits per second transmission rate L = # bits in a packet X = L/R = time to transmit ( service ) a packet Packet lengths are usually variable Distribution o lengths Dist. o service times ommon models: onstant packet length (all the same) Exponential distribution Internet Measured Distributions airly constant See next chart 66

67 Measure Internet Packet Distribution Dominated by TP traic (85%) ~40% packets are minimum-sized 40 byte packets or TP s ~5% packets are maximum-sized Ethernet 500 ames ~5% packets are 55 & 576 byte packets or TP implementations that do not use path MTU discovery Mean=43 bytes Stand Dev=509 bytes Source: caida.org 67

Chapter 5 Peer-to-Peer Protocols and Data Link Layer

Chapter 5 Peer-to-Peer Protocols and Data Link Layer Chapter 5 Peer-to-Peer Protocols and Data Link Layer PRT I: Peer-to-Peer Protocols Peer-to-Peer Protocols and Service Models RQ Protocols and Reliable Data Transfer Flow Control Timing Recovery TCP Reliable

More information

CS4/MSc Computer Networking. Lectures 4-5 Transport layer protocols TCP/UDP automatic repeat request

CS4/MSc Computer Networking. Lectures 4-5 Transport layer protocols TCP/UDP automatic repeat request S4/MSc omputer Networking Lectures 4-5 Transport layer protocols TP/UDP automatic repeat request omputer Networking, opyright University o Edinburgh 005 Transport services and protocols provide logical

More information

Chapter 5 Peer-to-Peer Protocols. School of Info. Sci. & Eng. Shandong Univ..

Chapter 5 Peer-to-Peer Protocols. School of Info. Sci. & Eng. Shandong Univ.. hapter 5 Peer-to-Peer Protocols School of Info. Sci. & Eng. Shandong Univ.. Outline 5. Peer-to-peer protocols and service models 5. RQ Protocols 5.3 Other daptation Functions Sliding Window Flow ontrol

More information

INF4/MSc Computer Networking. Lectures 3-4 Transport layer protocols TCP/UDP automatic repeat request

INF4/MSc Computer Networking. Lectures 3-4 Transport layer protocols TCP/UDP automatic repeat request INF4/MSc omputer Networking Lectures 3-4 Transport layer protocols TP/UDP automatic repeat request Transport services and protocols provide logical communication between app processes running on different

More information

Peer-to-Peer Protocols and Data Link Layer. Chapter 5 from Communication Networks Leon-Gracia and Widjaja

Peer-to-Peer Protocols and Data Link Layer. Chapter 5 from Communication Networks Leon-Gracia and Widjaja Peer-to-Peer Protocols and Data Link Layer Chapter 5 from Communication Networks Leon-Gracia and Widjaja Peer-to-Peer Protocols At each layer two (or more) entities execute These are peer processes For

More information

Data Link Control Protocols

Data Link Control Protocols Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,

More information

How to cope with last hop impairments? Part 2 ARQ #5. How to cope with last hop impairments?

How to cope with last hop impairments? Part 2 ARQ #5. How to cope with last hop impairments? How to cope with last hop impairments? Part 2 ARQ #5 Victor S. Frost Dan F. Servey Distinguished Proessor Electrical Engineering and Computer Science University o Kansas 2335 Irving Hill Dr. Lawrence,

More information

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections Application / Transport Interface Application requests service from transport layer Transport Layer Application Layer Prepare Transport service requirements Data for transport Local endpoint node address

More information

CSCD 330 Network Programming

CSCD 330 Network Programming CSCD 330 Network Programming Lecture 10 Transport Layer Continued Spring 2018 Reading: Chapter 3 Some Material in these slides from J.F Kurose and K.W. Ross All material copyright 1996-2007 1 Last Time.

More information

Principles of Reliable Data Transfer

Principles of Reliable Data Transfer Principles of Reliable Data Transfer 1 Reliable Delivery Making sure that the packets sent by the sender are correctly and reliably received by the receiver amid network errors, i.e., corrupted/lost packets

More information

NWEN 243. Networked Applications. Layer 4 TCP and UDP

NWEN 243. Networked Applications. Layer 4 TCP and UDP NWEN 243 Networked Applications Layer 4 TCP and UDP 1 About the second lecturer Aaron Chen Office: AM405 Phone: 463 5114 Email: aaron.chen@ecs.vuw.ac.nz Transport layer and application layer protocols

More information

Flow control: Ensuring the source sending frames does not overflow the receiver

Flow control: Ensuring the source sending frames does not overflow the receiver Layer 2 Technologies Layer 2: final level of encapsulation of data before transmission over a physical link responsible for reliable transfer of frames between hosts, hop by hop, i.e. on a per link basis

More information

CS422 Computer Networks

CS422 Computer Networks CS422 Computer Networks Lecture 3 Data Link Layer Dr. Xiaobo Zhou Department of Computer Science CS422 DataLinkLayer.1 Data Link Layer Design Issues Services Provided to the Network Layer Provide service

More information

Intro to LAN/WAN. Transport Layer

Intro to LAN/WAN. Transport Layer Intro to LAN/WAN Transport Layer Transport Layer Topics Introduction (6.1) Elements of Transport Protocols (6.2) Internet Transport Protocols: TDP (6.5) Internet Transport Protocols: UDP (6.4) socket interface

More information

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 11, 2018

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 11, 2018 CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet IP

More information

ECE697AA Lecture 3. Today s lecture

ECE697AA Lecture 3. Today s lecture ECE697AA Lecture 3 Transport Layer: TCP and UDP Tilman Wolf Department of Electrical and Computer Engineering 09/09/08 Today s lecture Transport layer User datagram protocol (UDP) Reliable data transfer

More information

Analyzation of Automatic Repeat Request (ARQ) Protocols

Analyzation of Automatic Repeat Request (ARQ) Protocols RESEARCH ARTICLE OPEN ACCESS Analyzation of Automatic Repeat Request (ARQ) Protocols 1 Jeshvina.S, 2 Sneha.P, 3 Saraanya.S Final year BCA, Dept of Computer Science New Horizon College Kasturinagar, Bangalore

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

Computer Communication Networks Midterm Review

Computer Communication Networks Midterm Review Computer Communication Networks Midterm Review ICEN/ICSI 416 Fall 2018 Prof. Aveek Dutta 1 Instructions The exam is closed book, notes, computers, phones. You can use calculator, but not one from your

More information

Chapter 24. Transport-Layer Protocols

Chapter 24. Transport-Layer Protocols Chapter 24. Transport-Layer Protocols 23.1 Introduction 23.2 User Datagram Protocol 23.3 Transmission Control Protocol 23.4 SCTP Computer Networks 24-1 Position of Transport-Layer Protocols UDP is an unreliable

More information

End-to-End Protocols. End-to-End Protocols

End-to-End Protocols. End-to-End Protocols End-to-End Protocols UDP (User Datagram Protocol) (Transport Control Protocol) Connection Establishment/Termination Sliding Window Revisit Flow Control Adaptive Retransmission End-to-End Protocols Limitations

More information

Transport Protocols and TCP: Review

Transport Protocols and TCP: Review Transport Protocols and TCP: Review CSE 6590 Fall 2010 Department of Computer Science & Engineering York University 1 19 September 2010 1 Connection Establishment and Termination 2 2 1 Connection Establishment

More information

Announcements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

Announcements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine Computer Science Department 1 / 33 1 COS 140: Foundations

More information

Transport Protocols & TCP TCP

Transport Protocols & TCP TCP Transport Protocols & TCP CSE 3213 Fall 2007 13 November 2007 1 TCP Services Flow control Connection establishment and termination Congestion control 2 1 TCP Services Transmission Control Protocol (RFC

More information

User Datagram Protocol

User Datagram Protocol Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram

More information

ERROR AND FLOW CONTROL. Lecture: 10 Instructor Mazhar Hussain

ERROR AND FLOW CONTROL. Lecture: 10 Instructor Mazhar Hussain ERROR AND FLOW CONTROL Lecture: 10 Instructor Mazhar Hussain 1 FLOW CONTROL Flow control coordinates the amount of data that can be sent before receiving acknowledgement It is one of the most important

More information

Problem 7. Problem 8. Problem 9

Problem 7. Problem 8. Problem 9 Problem 7 To best answer this question, consider why we needed sequence numbers in the first place. We saw that the sender needs sequence numbers so that the receiver can tell if a data packet is a duplicate

More information

Reliable Transport I: Concepts and TCP Protocol

Reliable Transport I: Concepts and TCP Protocol Reliable Transport I: Concepts and TCP Protocol Brad Karp UCL Computer Science CS 3035/GZ01 29 th October 2013 Part I: Transport Concepts Layering context Transport goals Transport mechanisms 2 Context:

More information

Lecture 20 Overview. Last Lecture. This Lecture. Next Lecture. Transport Control Protocol (1) Transport Control Protocol (2) Source: chapters 23, 24

Lecture 20 Overview. Last Lecture. This Lecture. Next Lecture. Transport Control Protocol (1) Transport Control Protocol (2) Source: chapters 23, 24 Lecture 20 Overview Last Lecture Transport Control Protocol (1) This Lecture Transport Control Protocol (2) Source: chapters 23, 24 Next Lecture Internet Applications Source: chapter 26 COSC244 & TELE202

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 33 COS 140:

More information

Reliable Transport I: Concepts and TCP Protocol

Reliable Transport I: Concepts and TCP Protocol Reliable Transport I: Concepts and TCP Protocol Stefano Vissicchio UCL Computer Science COMP0023 Today Transport Concepts Layering context Transport goals Transport mechanisms and design choices TCP Protocol

More information

Reliable Transport : Fundamentals of Computer Networks Bill Nace

Reliable Transport : Fundamentals of Computer Networks Bill Nace Reliable Transport 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administration Stuff is due HW #1

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Lecture 6. TCP services. Internet Transport Layer: introduction to the Transport Control Protocol (TCP) A MUCH more complex transport

Lecture 6. TCP services. Internet Transport Layer: introduction to the Transport Control Protocol (TCP) A MUCH more complex transport Lecture 6. Internet Transport Layer: introduction to the Transport ontrol Protocol (TP) RF 793 (estensioni RF 1122,1323,2018,2581,working group tsvwg) A MUH more complex transport for three main reasons

More information

Lecture 5: Flow Control. CSE 123: Computer Networks Alex C. Snoeren

Lecture 5: Flow Control. CSE 123: Computer Networks Alex C. Snoeren Lecture 5: Flow Control CSE 123: Computer Networks Alex C. Snoeren Pipelined Transmission Sender Receiver Sender Receiver Ignored! Keep multiple packets in flight Allows sender to make efficient use of

More information

Transport Protocols and TCP

Transport Protocols and TCP Transport Protocols and TCP Functions Connection establishment and termination Breaking message into packets Error recovery ARQ Flow control Multiplexing, de-multiplexing Transport service is end to end

More information

Chapter 11 Data Link Control 11.1

Chapter 11 Data Link Control 11.1 Chapter 11 Data Link Control 11.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 11-1 FRAMING The data link layer needs to pack bits into frames, so that each

More information

Page 1. Goals for Today" Discussion" Example: Reliable File Transfer" CS162 Operating Systems and Systems Programming Lecture 11

Page 1. Goals for Today Discussion Example: Reliable File Transfer CS162 Operating Systems and Systems Programming Lecture 11 Goals for Today" CS162 Operating Systems and Systems Programming Lecture 11 Reliability, Transport Protocols" Finish e2e argument & fate sharing Transport: TCP/UDP Reliability Flow control October 5, 2011

More information

The aim of this unit is to review the main concepts related to TCP and UDP transport protocols, as well as application protocols. These concepts are

The aim of this unit is to review the main concepts related to TCP and UDP transport protocols, as well as application protocols. These concepts are The aim of this unit is to review the main concepts related to TCP and UDP transport protocols, as well as application protocols. These concepts are important requirements for developing programs that

More information

The Transport Layer Reliability

The Transport Layer Reliability The Transport Layer Reliability CS 3, Lecture 7 http://www.cs.rutgers.edu/~sn4/3-s9 Srinivas Narayana (slides heavily adapted from text authors material) Quick recap: Transport Provide logical communication

More information

Networking Link Layer

Networking Link Layer Networking Link Layer ECE 650 Systems Programming & Engineering Duke University, Spring 2018 (Link Layer Protocol material based on CS 356 slides) TCP/IP Model 2 Layer 1 & 2 Layer 1: Physical Layer Encoding

More information

CSC 4900 Computer Networks: TCP

CSC 4900 Computer Networks: TCP CSC 4900 Computer Networks: TCP Professor Henry Carter Fall 2017 Project 2: mymusic You will be building an application that allows you to synchronize your music across machines. The details of which are

More information

6.033 Lecture 12 3/16/09. Last time: network layer -- how to deliver a packet across a network of multiple links

6.033 Lecture 12 3/16/09. Last time: network layer -- how to deliver a packet across a network of multiple links 6.033 Lecture 12 3/16/09 Sam Madden End to End Layer Last time: network layer -- how to deliver a packet across a network of multiple links Recall that network layer is best effort, meaning: - packets

More information

Transport Over IP. CSCI 690 Michael Hutt New York Institute of Technology

Transport Over IP. CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP What is a transport protocol? Choosing to use a transport protocol Ports and Addresses Datagrams UDP What is a

More information

The Transport Layer. Why is there a transport layer? Addressing

The Transport Layer. Why is there a transport layer? Addressing The Transport Layer Provides logical communication between processes network layer: data transfer between end systems transport layer: data transfer between processes Two types of transport service is

More information

Reliable Data Transfer

Reliable Data Transfer Reliable Data Transfer Kai Shen Reliable Data Transfer What is reliable data transfer? guaranteed arrival no error in order delivery Why is it difficult? unreliable underlying communication channel, which

More information

CMPE150 Midterm Solutions

CMPE150 Midterm Solutions CMPE150 Midterm Solutions Question 1 Packet switching and circuit switching: (a) Is the Internet a packet switching or circuit switching network? Justify your answer. The Internet is a packet switching

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Networking Transport Layer Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) TCP/IP Model 2 Transport Layer Problem solved:

More information

TCP: Flow and Error Control

TCP: Flow and Error Control 1 TCP: Flow and Error Control Required reading: Kurose 3.5.3, 3.5.4, 3.5.5 CSE 4213, Fall 2006 Instructor: N. Vlajic TCP Stream Delivery 2 TCP Stream Delivery unlike UDP, TCP is a stream-oriented protocol

More information

Reliable Byte-Stream (TCP)

Reliable Byte-Stream (TCP) Reliable Byte-Stream () Outline Connection Establishment/Termination Sliding Window Revisited Flow Control Adaptive Timeout Simple Demultiplexer (UDP) Header format Note 16 bit port number (so only 64K

More information

ECE 435 Network Engineering Lecture 10

ECE 435 Network Engineering Lecture 10 ECE 435 Network Engineering Lecture 10 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 28 September 2017 Announcements HW#4 was due HW#5 will be posted. midterm/fall break You

More information

file:///c:/users/hpguo/dropbox/website/teaching/fall 2017/CS4470/H...

file:///c:/users/hpguo/dropbox/website/teaching/fall 2017/CS4470/H... 1 of 9 11/26/2017, 11:28 AM Homework 3 solutions 1. A window holds bytes 2001 to 5000. The next byte to be sent is 3001. Draw a figure to show the situation of the window after the following two events:

More information

TDTS06: Computer Networks

TDTS06: Computer Networks TDTS06: Computer Networks Instructor: Niklas Carlsson Email: niklas.carlsson@liu.se Notes derived from Computer Networking: A Top Down Approach, by Jim Kurose and Keith Ross, Addison-Wesley. The slides

More information

Transport Layer. -UDP (User Datagram Protocol) -TCP (Transport Control Protocol)

Transport Layer. -UDP (User Datagram Protocol) -TCP (Transport Control Protocol) Transport Layer -UDP (User Datagram Protocol) -TCP (Transport Control Protocol) 1 Transport Services The transport layer has the duty to set up logical connections between two applications running on remote

More information

CS 640 Introduction to Computer Networks. Role of data link layer. Today s lecture. Lecture16

CS 640 Introduction to Computer Networks. Role of data link layer. Today s lecture. Lecture16 Introduction to Computer Networks Lecture16 Role of data link layer Service offered by layer 1: a stream of bits Service to layer 3: sending & receiving frames To achieve this layer 2 does Framing Error

More information

CS321: Computer Networks Error and Flow Control in TCP

CS321: Computer Networks Error and Flow Control in TCP CS321: Computer Networks Error and Flow Control in TCP Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in SEQ and ACK numbers in TCP TCP views data as an unstructured,

More information

Lecture 3: The Transport Layer: UDP and TCP

Lecture 3: The Transport Layer: UDP and TCP Lecture 3: The Transport Layer: UDP and TCP Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 3-1 The Transport Layer Provides efficient and robust end-to-end

More information

Chapter 3: Transport Layer Part A

Chapter 3: Transport Layer Part A Chapter 3: Transport Layer Part A Course on Computer Communication and Networks, CTH/GU The slides are adaptation of the slides made available by the authors of the course s main textbook 3: Transport

More information

Lecture 5. Transport Layer. Transport Layer 1-1

Lecture 5. Transport Layer. Transport Layer 1-1 Lecture 5 Transport Layer Transport Layer 1-1 Agenda The Transport Layer (TL) Introduction to TL Protocols and Services Connectionless and Connection-oriented Processes in TL Unreliable Data Transfer User

More information

Computer Networking. Reliable Transport. Reliable Transport. Principles of reliable data transfer. Reliable data transfer. Elements of Procedure

Computer Networking. Reliable Transport. Reliable Transport. Principles of reliable data transfer. Reliable data transfer. Elements of Procedure Computer Networking Reliable Transport Prof. Andrzej Duda duda@imag.fr Reliable Transport Reliable data transfer Data are received ordered and error-free Elements of procedure usually means the set of

More information

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer Department of Computer and IT Engineering University of Kurdistan Data Communication Netwotks (Graduate level) Data Link Layer By: Dr. Alireza Abdollahpouri Data Link Layer 2 Data Link Layer Application

More information

Internet transport-layer protocols. Transport services and protocols. Sending and receiving. Connection-oriented (TCP) Connection-oriented

Internet transport-layer protocols. Transport services and protocols. Sending and receiving. Connection-oriented (TCP) Connection-oriented Transport services and protocols Internet -layer protocols logical communication between processes protocols run in end systems send side: breaks app messages into segments, passes to layer rcv side: reassembles

More information

The Transmission Control Protocol (TCP)

The Transmission Control Protocol (TCP) The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, e-mail, WWW) Reliable Stream Transport (TCP) Unreliable Transport Service (UDP) Connectionless Packet Delivery Service (IP) Goals

More information

Computer Network. Direct Link Networks Reliable Transmission. rev /2/2004 1

Computer Network. Direct Link Networks Reliable Transmission. rev /2/2004 1 Computer Network Direct Link Networks Reliable Transmission rev 1.01 24/2/2004 1 Outline Direct link networks (Ch. 2) Encoding Framing Error detection Reliable delivery Media access control Network Adapter

More information

Direct Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc.

Direct Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc. Direct Link Communication I: Basic Techniques Link speed unit: bps abstraction Data Transmission ignore carrier frequency, coding etc. Point-to-point link: wired or wireless includes broadcast case Interested

More information

Transport Protocols. ISO Defined Types of Network Service: rate and acceptable rate of signaled failures.

Transport Protocols. ISO Defined Types of Network Service: rate and acceptable rate of signaled failures. Transport Protocols! Type A: ISO Defined Types of Network Service: Network connection with acceptable residual error rate and acceptable rate of signaled failures. - Reliable, sequencing network service

More information

Chapter 3. The Data Link Layer. Wesam A. Hatamleh

Chapter 3. The Data Link Layer. Wesam A. Hatamleh Chapter 3 The Data Link Layer The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols The Data

More information

16.682: Communication Systems Engineering. Lecture 17. ARQ Protocols

16.682: Communication Systems Engineering. Lecture 17. ARQ Protocols 16.682: Communication Systems Engineering Lecture 17 ARQ Protocols Eytan Modiano Automatic repeat request (ARQ) Break large files into packets FILE PKT H PKT H PKT H Check received packets for errors Use

More information

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control Chapter 6 What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control OSI Model Hybrid Model Software outside the operating system Software inside

More information

EE122 MIDTERM EXAM: Scott Shenker, Ion Stoica

EE122 MIDTERM EXAM: Scott Shenker, Ion Stoica EE MITERM EXM: 00-0- Scott Shenker, Ion Stoica Last name Student I First name Login: ee- Please circle the last two letters of your login. a b c d e f g h i j k l m n o p q r s t u v w x y z a b c d e

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

The Transport Layer Multiplexing, Error Detection, & UDP

The Transport Layer Multiplexing, Error Detection, & UDP CPSC 852 Internetworking The Transport Layer Multiplexing, Error Detection, & UDP Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu http://www.cs.clemson.edu/~mweigle/courses/cpsc852

More information

Outline: Connecting Many Computers

Outline: Connecting Many Computers Outline: Connecting Many Computers Last lecture: sending data between two computers This lecture: link-level network protocols (from last lecture) sending data among many computers 1 Review: A simple point-to-point

More information

TCP/IP-2. Transmission control protocol:

TCP/IP-2. Transmission control protocol: TCP/IP-2 Transmission control protocol: TCP and IP are the workhorses in the Internet. In this section we first discuss how TCP provides reliable, connectionoriented stream service over IP. To do so, TCP

More information

Chapter 3: Transport Layer

Chapter 3: Transport Layer Chapter 3: Transport Layer Chapter goals: understand principles behind transport layer services: multiplexing/demultiplex ing reliable data transfer flow control congestion control instantiation and implementation

More information

CS457 Transport Protocols. CS 457 Fall 2014

CS457 Transport Protocols. CS 457 Fall 2014 CS457 Transport Protocols CS 457 Fall 2014 Topics Principles underlying transport-layer services Demultiplexing Detecting corruption Reliable delivery Flow control Transport-layer protocols User Datagram

More information

Chapter 11 Data Link Control 11.1

Chapter 11 Data Link Control 11.1 Chapter 11 Data Link Control 11.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 11-1 1 FRAMING The data link layer needs to pack bits into frames,, so that

More information

Communications Software. CSE 123b. CSE 123b. Spring Lecture 3: Reliable Communications. Stefan Savage. Some slides couresty David Wetherall

Communications Software. CSE 123b. CSE 123b. Spring Lecture 3: Reliable Communications. Stefan Savage. Some slides couresty David Wetherall CSE 123b CSE 123b Communications Software Spring 2002 Lecture 3: Reliable Communications Stefan Savage Some slides couresty David Wetherall Administrativa Home page is up and working http://www-cse.ucsd.edu/classes/sp02/cse123b/

More information

Introduction to Networks and the Internet

Introduction to Networks and the Internet Introduction to Networks and the Internet CMPE 80N Announcements Project 2. Reference page. Library presentation. Internet History video. Spring 2003 Week 7 1 2 Today Internetworking (cont d). Fragmentation.

More information

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Transport Layer Network Fundamentals Chapter 4 Version 4.0 1 Transport Layer Role and Services Transport layer is responsible for overall end-to-end transfer of application data 2 Transport Layer Role

More information

32 bits. source port # dest port # sequence number acknowledgement number not used. checksum. Options (variable length)

32 bits. source port # dest port # sequence number acknowledgement number not used. checksum. Options (variable length) Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer 3.5 Connectionoriented transport: TCP segment

More information

Outline. CS5984 Mobile Computing

Outline. CS5984 Mobile Computing CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline Review Transmission Control Protocol (TCP) Based on Behrouz Forouzan, Data Communications and Networking,

More information

Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. Link Layer. Fundamentals of Communication Networks

Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. Link Layer. Fundamentals of Communication Networks Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione Link Layer Fundamentals of Communication Networks Data Link layer o It is the first logical layer in the protocol stack o Functions

More information

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2. Goals for Todayʼs Lecture. Role of Transport Layer

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2. Goals for Todayʼs Lecture. Role of Transport Layer Transport Protocols Reading: Sections 2.5, 5.1, and 5.2 CS 375: Computer Networks Thomas C. Bressoud 1 Goals for Todayʼs Lecture Principles underlying transport-layer services (De)multiplexing Detecting

More information

TCP/IP Performance ITL

TCP/IP Performance ITL TCP/IP Performance ITL Protocol Overview E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP IP ICMP ARP RARP (Auxiliary Services) Ethernet, X.25, HDLC etc. ATM 4/30/2002 Hans Kruse & Shawn Ostermann,

More information

CS 421: COMPUTER NETWORKS SPRING FINAL May 8, minutes

CS 421: COMPUTER NETWORKS SPRING FINAL May 8, minutes CS 421: COMPUTR NTWORKS SPRIN 2016 INL May 8, 2016 150 minutes Name: Student No: Q1 Q2 Q3 TOT 1) a) (6 pts) iven the following parameters for a datagram packet switching network: N: number of hops between

More information

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste Outline 15-441 Computer Networking Lecture 18 TCP Performance Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 TCP congestion avoidance TCP slow start TCP modeling TCP details 2 AIMD Distributed,

More information

C H A P T E R 15 TRA N SM I SSI O N C O N T RO L P RO T O C O L (T C P ) SUM M A RY

C H A P T E R 15 TRA N SM I SSI O N C O N T RO L P RO T O C O L (T C P ) SUM M A RY C H A P T E R 15 TRA N SM I SSI O N C O N T RO L P RO T O C O L (T C P ) 497 15.15 SUM M A RY Transmission C ontrol Protocol (T C P) is one of the transport layer protocols in the T C P/IP protocol suite.

More information

Introduction to Protocols

Introduction to Protocols Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These

More information

Chapter 3 Transport Layer

Chapter 3 Transport Layer Chapter 3 Transport Layer Lec 9: Reliable Data Transfer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose

More information

Chapter 3 Transport Layer

Chapter 3 Transport Layer Chapter 3 Transport Layer Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Prof.ssa Chiara Petrioli Parte di queste slide sono state prese dal materiale associato

More information

I. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations

I. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations I. INTRODUCTION (a) Network Topologies (i) point-to-point communication each station (i.e., computer, telephone, etc.) directly connected to all other stations (ii) switched networks (1) circuit switched

More information

Chapter 7. The Transport Layer

Chapter 7. The Transport Layer Chapter 7 The Transport Layer 1 2 3 4 5 6 7 8 9 10 11 Addressing TSAPs, NSAPs and transport connections. 12 For rarely used processes, the initial connection protocol is used. A special process server,

More information

TCP and Congestion Control (Day 1) Yoshifumi Nishida Sony Computer Science Labs, Inc. Today's Lecture

TCP and Congestion Control (Day 1) Yoshifumi Nishida Sony Computer Science Labs, Inc. Today's Lecture TCP and Congestion Control (Day 1) Yoshifumi Nishida nishida@csl.sony.co.jp Sony Computer Science Labs, Inc 1 Today's Lecture Part1: TCP concept Part2: TCP detailed mechanisms Part3: Tools for TCP 2 1

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Transport Layer Pipelined Reliable Data Transfer Protocols: Go-Back-N and Selective Repeat Sec 3.4.2-3.4.3 Prof. Lina Battestilli Fall 2017 Transport Layer

More information

Congestion Control in Communication Networks

Congestion Control in Communication Networks Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below

More information

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16 Guide To TCP/IP, Second Edition Chapter 5 Transport Layer TCP/IP Protocols Objectives Understand the key features and functions of the User Datagram Protocol (UDP) Explain the mechanisms that drive segmentation,

More information

Lecture 08: The Transport Layer (Part 2) The Transport Layer Protocol (TCP) Dr. Anis Koubaa

Lecture 08: The Transport Layer (Part 2) The Transport Layer Protocol (TCP) Dr. Anis Koubaa NET 331 Computer Networks Lecture 08: The Transport Layer (Part 2) The Transport Layer Protocol (TCP) Dr. Anis Koubaa Reformatted slides from textbook Computer Networking a top-down appraoch, Fifth Edition

More information

ADVANCED COMPUTER NETWORKS

ADVANCED COMPUTER NETWORKS ADVANCED COMPUTER NETWORKS Congestion Control and Avoidance 1 Lecture-6 Instructor : Mazhar Hussain CONGESTION CONTROL When one part of the subnet (e.g. one or more routers in an area) becomes overloaded,

More information