Distributed multimedia applications have dierent quality of service (QoS) requirements

Size: px
Start display at page:

Download "Distributed multimedia applications have dierent quality of service (QoS) requirements"

Transcription

1 Automatic Generation of Dynamically Adaptable Protocols R. de Silva L. Dairaine A. Richards A. Seneviratne M. Fry 29th May 1995 University of Technology, Sydney School of Electrical Engineering P.O. Box 123, Broadway NSW 2007 Australia Abstract: Distributed multimedia applications have dierent quality of service (QoS) requirements from the simple reliable data transfer QoS provided by transport protocols like TCP and TP4. New protocols can be created to handle some of the general QoS requirements of distributed multimedia applications although this is a costly process in terms of time and money. In addition, given the variety of dierent multimedia applications and their dierent requirements, hand-crafting tailored protocols is not a viable approach for the future. A solution to this problem is to automate the process for protocol generation. This paper examines and contrasts two relevant models of automatic protocol generation, namely stub compilation and runtime adaptive approaches. Then, a new model based on the combined strengths of the previous approaches is introduced. The proposed model envelopes concepts like application layer framing, integrated layer processing and dynamic adaption of functionality. Keywords: Tailored Protocols, Transport Protocols, Application Layer Framing, Integrated Layer Processing, User level protocols. 1. Introduction In the seventies and early eighties, transport protocols such as TCP and TP4 provided functionality for applications running over unreliable networks. The main requirements of those applications were to be able to reliably transfer data across the network. Given the highly unreliable nature of the networks then, the transport layer provided functionality to hide the errors of the underlying network from the application. Today, applications have new sets of requirements. These requirements are not constant and vary depending on the applications and the media they support. In addition, underlying networks now provide faster and more reliable services than before. The result of these changes

2 2 R. De Silva L. Dairaine A. Richards A. Seneviratne M. Fry is that classical protocols are neither able to satisfy the requirements of the applications nor properly use the services provided by the network. Therefore, it is necessary to develop new protocols that are able to handle the new requirements of applications while optimizing the use of the services provided by the underlying network. Given that dierent applications may have suciently dierent requirements this would mean that to achieve maximum benets, each application would require its own protocol. This is a very time consuming problem. One solution to this problem is to automate the creation of protocols according to a given set of application requirements. This paper looks at two such automated models INRIA's stub compiler model and Sydney's University of Technology's runtime adaptive model. The two models are discussed and contrasted before dening a new model based on the strengths of two previous approaches. The proposed model for automatically generating adaptable protocols, integrate concepts of application layer framing, integrated layer processing and dynamic adaptation which are only partially supported in the previous models. The rest of the paper is structured as follows: section 2 discusses important factors relevant when designing protocols for high speed environments. Section 3 shows the basic concepts of automated protocol generation. Section 4 and 5 look at the stub compiler and runtime adaptive models. Section 6, will introduce the new model. Concluding remarks are presented in section Tailoring Protocols in High Speed Environments Classical protocols like TCP and TP4 have been shown to be a bottleneck in the communication system when used over high speed networks [9, 12, 18]. A number of dierent solutions have been proposed to solve the problems of these protocols. The proposals can be placed into two main categories. One suggests that classical protocols can be made more suitable by applying some simple optimizations to the protocol implementation [7]. The second group proposes the design of new protocols [20, 8, 5]. Optimizing the protocol implementation, especially the critical path of execution improves performance of the protocol [21]. This however does not address one of the major problems of current protocols, namely the functionality used is unsuitable to certain applications. For example, the ARQ error recovery schemes are unsuitable for most real time data transfers and normally will only increase the end-to-end delay of the connection [11]. Thus optimizations to the implementation fail to solve problems resulting from functionality supported by the protocol. Then the alternative is to create new protocols, adapted to the application characteristics and underlying network. In the process of tailoring a protocol to an application, there are three basic concepts that should be applied, namely protocol function selection, implementation optimizations and dynamic protocol conguration Protocol Function Selection The rst concept is to choose appropriate functionality for the given application requirements. This involves choosing the appropriate functionality as well as the appropriate mechanism.

3 Automatic Generation of Dynamically Adaptable Protocols 3 The table below summaries some of the functionality that could be used and some of examples of mechanisms associated with them. Application Requirements Functionality Mechanism Error Detection Sequence Detection Sequence Number Parity based CRCs Odd, Even, BCC, Checksum Various Polynomials Error Recovery ARQ Variation of Go-back-N, Selective Repeat Forward error recovery Hamming, Reed Solomon Codes Flow & Congestion Control Sliding windows Fixed size, Variable size, Slow start Rate control Leaky bucket, gapping Connection Setup Explicit 3-way, 2-way handshakes Implicit Connectionless, First packet Connection Closing Explicit 2-way handshake Implicit Timer mechanism Table 1: Protocol Functionality and Mechanisms. Note that the selection of protocol functionality can overlap. For example, if sliding windows was chosen for ow control then the same mechanism should be used for detecting sequencing errors. It is also important to recognise that none of the above functionality are mandatory. For example, UDP could be considered to only support optional error detection using checksums and none of the other functionality Implementation Optimizations The second concept involves using implementation optimisations like Application Layer Framing (ALF) and Integrated Layer Processing (ILP)[6]. Application layer framing involves designing the application to send self-contained blocks of information to the communication system. This means that this block can be sent to the receiving application which can proceed to process the block of information without knowledge of the previous or next blocks of information. This allows for faster processing of information as the application does not have to wait for packets and also allows for better use of system resources. Integrated layer processing is a method of increasing the cohesiveness of the application and communication system to improve the implementation [6, 1]. ILP involves grouping byte operations that are done at various layers of the communication system and combining them. An example of this is to combine presentation layer processing like XDR with checksum calculations at the transport layer.

4 4 R. De Silva L. Dairaine A. Richards A. Seneviratne M. Fry 2.3. Dynamic Protocol Conguration The nal concept that is can be in improving performance of the transport protocols especially in regard to the underlying network is dynamic adaption of protocol functionality. It has shown in [15] that it is possible to dynamically remove and add protocol functions at runtime to improve the performance of the application and the transport protocol. An example would be that due to a failure with a terrestrial link, the data is redirected through a satelite link. As a result of the increased end-to-end delay, it may be ecient to dynamically change the error recovery mechanism of a protocol from go-back-n to FEC. Although the example of the dynamic protocols given are based on changes at the network layer, this concept could just as easily be used for changes in the application layer. It is important to note that there has to be a mechanism for detecting when the changes that should take place and a mechanism for handling the end-to-end mechanism adaptation. Although these three concepts can be applied to develop new protocols tailored to a given application, the main problem is this new protocols will be very likely unsuitable for a second application. This results with a new protocol being developed for each application or application class which is very costly. Moreover, the implementation of these concepts are not simple an hence would require highly skilled personnel. The proposed solution for this problem is to automate the generation of protocols given an application specication. 3. Automated Communication Protocol Generation Automated tailored protocol generation can be achieved by dening, for a given application, the functionalities the protocol should provide and the associated mechanisms. As illustrated in gure 1, the overall process involves three basic tasks: 1. Specication: How to specify the application's requirements, and the system and network characteristics; 2. Selection: How to select the right mechanisms according to the application needs; 3. Synthesis: How to generate and implement the tailored communication subsystem. The specication of the application forms the rst phase in the automated process. The specication should contain all the revelant information needed by the automated process to create the appropriate tailored protocol. The specication should therefore include information on the structure and characteristic of the data to be transfered. This includes information about the possibilities of having self contained data packets (based on ALF principles), temporal constraints of the data and possible ranges for acceptable performance criteria (i.e., throughput, delay, jitter, etc.). Also, to include integrated layer processing, the automated process requires knowledge of any processing done on the data so that it can, where possible, be combined these to the main communication processing loop. Network and system information may also form part of the specication. The specication phase determines the quality of the tailored protocol.

5 Automatic Generation of Dynamically Adaptable Protocols 5 Application Requirements Specification Network & System Characteristics Automatic Protocol Generator Selection Synthesis Tailored Protocol Protocol Functions Figure 1: Automated protocol building scheme. The selection of mechanisms is the second phase of the automated process. Using information that characterizes the application, the Automatic Protocol Generator (APG) decides the overall functionality required to build the tailored protocol. If the protocol is intended to be dynamic then decisions of when to switch protocol functionality can be decided at this stage of the APG. Finally, the synthesis phase involves the implementation of the protocol. It has been shown that for ecient implementations integrated layer processing (ILP) [6] should be adopted. The implementation can be static or dynamic. Dynamism can be implemented by using dynamic linking of protocol functions as required or statically implemented in a state machine which changes states when changes in protocol functionality is required. The latter can result in code bloat if a large number of dynamic states are dened. An important feature of APGs is that it is not viable to create tailored protocols at the kernel level for two reasons. Firstly, because a tailored protocol is designed for one application and the kernel should oer common services to all applications. Secondly, recompiling the kernel for each new application created is a time consuming process. And given that tailored protocols have to be created for specialized applications, they should be done at the user level. Maeda has shown that such a user level protocols does not detract from the performance of the implementation [14]. A number of automated approaches have been proposed such as: 1. Da CaPo [19]: a congurable protocol allowing the ordering of protocol functions using dependency graphs; 2. F-CSS [22]: a exible protocol stack aimed at parallel implementation; 3. ADAPTIVE [17]: a dynamically assembled protocol transformation, integration and validation environment; 4. Runtime Adaptive Approach [16]: a dynamically congurable approach based on a library of protocol functions;

6 6 R. De Silva L. Dairaine A. Richards A. Seneviratne M. Fry 5. Stub compiler [3]: a static model based on the use of Esterel to create tailored protocol. The rst four models provide runtime conguration while the fth model only provides compilation time conguration. The two next sections of the paper will give detail on the two last approaches, namely Stub compilation and runtime adaptive approaches. These two model have been selected to contrast the runtime and compilation approaches. 4. Stub Compilation approach The stub compilation approach has been developed at INRIA (Institut National de la Recherche en Informatique et Automatique) in France. This approach is a preliminary step in the design of a new generation of remote procedure call models [10]. In this model, a distributed application can specify its own communication requirements to be associated to a dedicated communication protocol. This is realized by a means of an application specication used by the protocol compiler to integrate communication facilities to the application and to generate the client and server stubs. The implementation of the protocol compiler is based on the use of Esterel, a imperative language belonging to the family of synchronous reactive formalisms [2]. The language was selected for numerous reasons [3]. Firstly, Esterel provides only for the description of the control part of the protocol. This feature creates a strong separation between specication and implementation issues. Due to its properties of synchronicity it is particularly appropriate for the description of communication protocols. Moreover, it can be eciently combined to a data description language. Finally, the environment provided with Esterel is complete and ecient (both a development and a validation environment are available). As illustrated in gure 2, the stub compiler model includes the three main steps for the generation of a tailored protocol, namely specication, selection and synthesis. The specication step is achieved using both Esterel and C code. Esterel species the control and synchronization aspects of the application, while data structures and application software are directly coded in C. More specically, the Esterel specication describes the application's behavior, and the level of reliability required for the transmission of the Application Data Unit 1. The level of service required is described by a set of predened Esterel signals expressed in the specication, such as selective_retransmission, ow_control, checksum, etc. Then, the selection step is realized through the parsing of the specication [10] as shown in gure 2. From the Esterel description of the application's behavior, the parser extracts possible synchronization points and any parallelism that exists between the dierent modules that compose the description. These synchronization points will be used in the synthesis stage to design the most ecient implementation. The predened Esterel signals present in the application specication are extended by the parser to integrate the requested communication facilities. The result of this step is the integrated specication, still expressed in Esterel. The new Esterel specication is then compiled through a Esterel compiler [2] [4] which produces C-code for a nite state machine dening the dierent protocol states. This C-code is then combined with the appropriate application code and the appropriate protocol functions 1 The smallest unit of data that the application can handle on its own, i.e., ALF

7 Automatic Generation of Dynamically Adaptable Protocols 7 User specification Application Specification in Esterel Application Software in C Data Structure Description in C Parser Protocols & Functions Specification in Esterel Compilation Processes Integrated Specification in Esterel Esterel Compiler Integrated Source in C Protocol Functions in C C Compiler Tailored Protocol Figure 2: The Stub compiler model. to create the executable application. The C and Esterel compilers form the implementation stage of the APG model. The main strength of the stub compiler model is that it provides a high degree of tailorability. The main reason for this is the use of Esterel, a formal language, which allows for an accurate description of the application's requirements. The stub compiler model can handle application layer framing. The model could be extended to incorporate ILP by passing information about the application processing loops to the Esterel compiler. If the Esterel compiler integrates the combined code of the Esterel specications, application and protocol functions then it could apply ILP concepts in the implementation it creates. One weakness of this model is that the stub compiler model is based on a state machine which changes state to provide dierent services. Therefore if ILP were carried out, it could have to be done on each of the states and might result in a code bloat if a large number of states are dened. Currently, this model does not properly consider dynamic adaption as it fails to take into consideration external factors such as network and system loads.

8 8 R. De Silva L. Dairaine A. Richards A. Seneviratne M. Fry 5. Runtime adaptive approach The runtime adaptive approach has been developed at UTS (University of Technology, Sydney) in Australia [15]. As shown in gure 3, the conceptual architecture of the runtime adaptive model follows the general view of tailored protocols. User Specification Application Application Needs Runtime Adative Processes Network Status System Load Functionality Selector Profile Synthesis Engine Protocol Functions Library Implementation Techniques (e.g., ILP) Tailored Protocol Figure 3: The runtime adaptive model. The functioning of UTS follow the 3 classical phases: 1. Specication: at runtime, the application indicates its requirements to the Functionality Selector, for example via a QoS management entity. 2. Selection: the Functionality Selector then determines the protocols functions that will be required to satisfy the application's requirements. A prole is then generated that indicates to the Synthesis Engine, the optimal choice. 3. Synthesis: the Synthesis Engine the takes into account the environment status (i.e., network status and system load) and chooses the appropriate mechanisms to provide the requested functionality. It then uses optimized implementation techniques such as ILP to implement the transport system. In addition, the Synthesis Engine continuously monitors the status of the network and host system and, where possible, dynamically chooses the algorithms that will best suit the given conditions. The library based model diers most from the compiler based model, in its inherent dynamicity. The conguration engine creates/modies the protocol as necessary due to the

9 Automatic Generation of Dynamically Adaptable Protocols 9 changes in any of its inputs (network status, prole). Dynamicity is achieved by dynamically linking in and out the appropriate protocol functionality as determined by the Synthesis Engine. Like the compiler model, the adaptive approach takes into account ALF and ILP principles although this model does not totally handle the problem of ILP. Since the protocol is dynamic which requires the inclusion and removal of protocol functionality, it is dicult to apply principles of integrated layer processing which are optimizations naturally based for static implementations. If we look at each model and try to determine the most important process of the model - for the INRIA model it is based around the Esterel compiler to create the best tailored protocol while with the runtime adaptive model it is based on the synthesis engine. 6. New Dynamic Model The suggested model, depicted in gure 4, is primarily an extension to the runtime adaptive model. The model includes the concepts of the stub compiler model in that the specication analyser basically can be represented by the parser and the synthesis engine by the Esterel compiler stages of the stub compiler approach. Although, it should be noted that the output of the Esterel compiler would dier for this model than that of the stub compiler approach and as such this representation has not be shown in the model to prevent confusion. The model consists of three main processes - the specication analyser, the compiler and the synthesis engine. The model proposed, like the runtime adaptive model, is dynamically recongurable. When dealing with dynamic models there are two stages at which decisions on protocol functionality are made. The rst one is during compilation time, when decisions about application layer framing and stages of data transfer are realized. The second one is during runtime, when the inuence of the underlying network and system loads aect the performance of the protocol. This model is then divided into two main sections : the ALF processes or compilation processes (the specication analyser and the compiler) and the ILP processes or runtime processes (the conguration engine and the tailored protocol) The Compilation Processes This stage of the APG model basically results in an executable which consists of the application and a conguration engine. There are three main inputs into this section the application code, the application specication and the conguration engine code. The specication should contain information to aid the conguration engine with deciding the appropriate functionality. This information can be specied using three methods: Request direct functionality - Here the application directly requests the functionality it needs or the specic method of providing functionality (see table 1). This method reduces the decisions made by the conguration engine but can be restrictive as changes due to network or system load will not be able to modify this functionality.

10 10 R. De Silva L. Dairaine A. Richards A. Seneviratne M. Fry User specification Application Specification Application Code Compilation Processes Specification Analyser Profile Compiler Synthesis Engine Code Protocol Functionalities Runtime Adaptive processes Application Structure Application User Interface Network Status System Load Synthesis Engine Tailored Protocol Protocol Mechanisms Figure 4: The new dynamic model. Provide requested QoS only - This allows for maximum exibility as the conguration has only to satisfy the requested QoS for the data transfers. The main disadvantage of this method is the large amount of decisions that have to be made by the conguration engine due to the large number of combinations. Combination - Here the application request functionality but species that if certain QoS parameters are not met then the functionality can be changed. Suggested changes can also be provided. For example the application may request error control but specify under certain conditions that this functionality may be removed. The specication should also contain information about any processes that can be included into an ILP loop by the conguration engine. Finally the specication should have any information about any ALF handling done by the application so that the tailored protocol and provide appropriate support functionality. The specication in processed by the specication analyser to produce a prole of the application. As previously mentioned, the specication analyser can be compared to the Esterel compiler and parser of the stub compiler approach. The prole, the application code and conguration engine code is then compiled to produce the application with the conguration engine for the tailored protocol.

11 Automatic Generation of Dynamically Adaptable Protocols The Runtime Adaptive Processes The conguration engine dynamically links in the appropriate protocol functions based on decisions made based on the prole of the application. The conguration has then three main functions that it has to do - monitor for any conditions that would require changes in protocol functionality; when necessary make decisions on what protocol functionality to support and to carry out ILP processing for the chosen functionality. This can be represented by gure 5. Synthesis Engine Monitor Decision Engine ILP Processor Figure 5: Synthesis Engine Processes Conguration Engine Monitor The conguration engine monitors checks for conditions that could results in changes to con- guration of the tailored protocol functionality. There are three conditions that could result with the change of protocol functionality : Changes in State of Data Transfer - Some forms of data transfer have dierent requirements for dierent stages of transfer. These changes in state are at xed positions of the transfer and these positions will be decided in the application specication. Changes from User Interface - Users may request changes in the underlying service through the interface. For example the user may change from browsing to recording a video le from a server thus changing the QoS requirements of the data. The main problem caused by this condition is that it can occur at any point during the data transfer. Changes caused by Network or System Load - Network and system load conditions may prompt the conguration engine to change the functionality of the tailored protocol to improve performance. These three factors are represented in the model as inputs into the synthesis engine. The synthesis engine will rstly attempt to solve any problems caused by these changes internally. If it fails to resolve any conicts then it will request help from the user, similarly to how disconnected operations are handled in the Coda [13] le system.

12 12 R. De Silva L. Dairaine A. Richards A. Seneviratne M. Fry Decision Engine The decision engine bases decisions on two sets of rules. An internal set of rules based on the dierent characteristics of the protocol functionality supported and external information provided by the application prole. The latter is given precedence when decisions are made ILP Processor The ILP processor attempts to combine the protocol functionality chosen by the decision engine into an ILP loop to improve the performance of the tailored protocol. Any external application processes specied in the prole would also be included in this loop. Integrated layer processing concepts are complicated again for this model as they are being applied as optimizations to a dynamic system and at runtime. 7. Concluding remarks In this paper, we have introduced a new model for the automatic generation of dynamically adaptable protocols. The model was based on a study of two approaches, namely stub compilation and runtime adaptive approaches. The approach can be divided into two main set of processes the compilation processes and the runtime processes. Compilation process takes into account an application specication to create a synthesis engine tailored to the application requirements. The runtime processes include the synthesis engine which dynamically congurates a tailored protocol depending on various external triggers. The separation of the compilation and runtime processes allows for the accurate specication of an tailored protocol while achieving all the benets of dynamicity and adaption. We are currently designing and implementing a prototype implementation of the proposed model. 8. Acknowledgments Laurent Dairaine thanks INRIA from its the nancial support. Anthony Richards acknowledges the support from Telecom Australia. Aruna Seneviratne acknowledges the support from the UTS Internal Grants Scheme. References [1] M. Abbott and L. Peterson, Increasing network throughput by integrating protocol layers, IEEE/ACM Transactions on Networking, 1 (1993), pp ftp://cs.arizona.edu/xkernel/. [2] G. Berry, The Esterel synchronous programming language: Design, semantic, implementation, Journal of Science of Computer Programming, 19 (1992).

13 Automatic Generation of Dynamically Adaptable Protocols 13 [3] C. Castelluccia, I. Chrisment, W. Dabbous, C. Diot, C. Huitema, E. Siegel, and R. de Simone, Tailored protocol development using ESTEREL, Research Report 2374, INRIA, 2004, route de Lucioles, B.P. 93, Sophia Antipolis cedex, France, Oct [4] C. Castelluccia and W. Dabbous, Modular communication subsystem implementation using a synchronous approach, internal report, INRIA HIPPARCH Project, 2004, route de Lucioles, B.P. 93, Sophia Antipolis cedex, France, [5] G. Chesson, Protocol engine design, in Usenix Conference, Amsterdam, June 1987, pp [6] D. Clark and D. Tennenhouse, Architectural considerations for a new generation of protocols, in Proceedings of ACM SIGCOMM Conference (Communication Architecture and Protocols), USA, 1990, pp [7] D. D. Clark and H. S. V. Jacobson, J. Romkey, An analysis clark of tcp processing overhead, IEEE Communication Magazine, 27 (1989), pp [8] A. Danthine, Esprit project osi 95 new transport services for high-speed networking, in 3rd Joint European Networking Conference, Innsbruck, May [9] A. Danthine, B. Hauzeur, P. Henquet, C. Constantinidis, D. Fagnoule, and V. Cornette, Corporate communication system by LAN interconnection, in EURINFO Information Technology for Organisational Systems, E. N. Holland), ed., Athen, May 1988, pp [10] C. Diot, I. Chrisment, and A. Richards, Application level framing and automated implementation, in IFIP HPN international conference, Sept [11] J. Harju, V. Kosonen, and C. Li, Quality and performance of a desktop video conferencing system in the network of interconnected LANs, in In 19th Conference on Local Computer Networks, [12] S. Heathley and D. Stokesberry, Analysis of transport measurements over a local area network, IEEE Communication Magazine, 27 (1989). [13] J. J. Kistler and M. Satyanarayan, Disconnected operation in the coda lesystem, ACM Transactions on Computer Systems, (1992). [14] C. Maeda and B. Bershad, Networking performance for microkernel, internal report, Carnegie Mellon University, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA 15213, USA, Mar ftp://mach.cs.cmu.edu/doc/. [15] A. Richards, The Universal Transport Service, an Adaptive End-to-end Protocol Analysis and Design, ph.d. thesis, University of Technology, Sydney, Department of Electrical Engineering, P.O. Box 123, Broadway, NSW 2007, Australia, Dec ftp://ftp.ee.uts.edu.au/pub/prose/.

14 14 R. De Silva L. Dairaine A. Richards A. Seneviratne M. Fry [16] A. Richards, T. Ginige, A. Seneviratne, T. Buczkowska, and M. Fry, An adaptive transport service suitable for high speed network, The Journal of Concurrency: Practice and Experience, (1994). ftp://ftp.ee.uts.edu.au/pub/prose/. [17] D. Schmidt, D. Box, and T. Suda, ADAPTIVE: A exible and adaptive transport system architecture to support lightweight protocols for multimedia applications on high speed networks, in Proceedings of the Symposium on High Performance Distributed Computing Conference, Amsterdam, Sept [18] L. Svodobova, Measured performance of transport service in LANs, Computer Network and ISDN Systems, 18 (1989), pp [19] M. Vogt, B. Plattner, T. Plagemann, and T. Walter, A runtime environment for Da CaPo, in INET, [20] A. C. Weaver, Making transport protocols fast, IEEE, (1991). [21] C. Woodside, K. Ravindran, and R. Franks, The protocol bypass concept for high speed OSI data transfer, in IFIP WG 6.1/WG 6.4, Amsterdam, Nov. 1990, North-Holland Publisher, pp [22] M. Zitterbart, B. Stiller, and A. Tantawy, A model for exible high performance communication subsystems, IEEE Journal on Selected Areas in Communications, 11 (1993), pp

Enhancing Integrated Layer Processing using Common Case. Anticipation and Data Dependence Analysis. Extended Abstract

Enhancing Integrated Layer Processing using Common Case. Anticipation and Data Dependence Analysis. Extended Abstract Enhancing Integrated Layer Processing using Common Case Anticipation and Data Dependence Analysis Extended Abstract Philippe Oechslin Computer Networking Lab Swiss Federal Institute of Technology DI-LTI

More information

A taxonomy of race. D. P. Helmbold, C. E. McDowell. September 28, University of California, Santa Cruz. Santa Cruz, CA

A taxonomy of race. D. P. Helmbold, C. E. McDowell. September 28, University of California, Santa Cruz. Santa Cruz, CA A taxonomy of race conditions. D. P. Helmbold, C. E. McDowell UCSC-CRL-94-34 September 28, 1994 Board of Studies in Computer and Information Sciences University of California, Santa Cruz Santa Cruz, CA

More information

Application. Protocol Stack. Kernel. Network. Network I/F

Application. Protocol Stack. Kernel. Network. Network I/F Real-Time Communication in Distributed Environment Real-Time Packet Filter Approach 3 Takuro Kitayama Keio Research Institute at SFC Keio University 5322 Endo Fujisawa Kanagawa, Japan takuro@sfc.keio.ac.jp

More information

The effect of Mobile IP handoffs on the performance of TCP

The effect of Mobile IP handoffs on the performance of TCP Mobile Networks and Applications 4 (1999) 131 135 131 The effect of Mobile IP handoffs on the performance of TCP Anne Fladenmuller a and Ranil De Silva b a Alcatel CIT, Software Department, Route de Nozay,

More information

Backbone Router. Base Station. Fixed Terminal. Wireless Terminal. Fixed Terminal. Base Station. Backbone Router. Wireless Terminal. time.

Backbone Router. Base Station. Fixed Terminal. Wireless Terminal. Fixed Terminal. Base Station. Backbone Router. Wireless Terminal. time. Combining Transport Layer and Link Layer Mechanisms for Transparent QoS Support of IP based Applications Georg Carle +, Frank H.P. Fitzek, Adam Wolisz + Technical University Berlin, Sekr. FT-2, Einsteinufer

More information

Question 1 In answering the following questions use the following network conguration. Each node in the network represents a router, and the weights o

Question 1 In answering the following questions use the following network conguration. Each node in the network represents a router, and the weights o University of Uppsala Department of Computer Systems (DoCS) Final Examination Datakommunikation (DVP)) Data Communication and Networks INSTRUCTIONS TO CANDIDATES This is a SIX (6) hour examination Answer

More information

Network Level Framing in INSTANCE. Pål Halvorsen, Thomas Plagemann

Network Level Framing in INSTANCE. Pål Halvorsen, Thomas Plagemann Network Level Framing in INSTANCE Pål Halvorsen, Thomas Plagemann UniK, University of Oslo P.O. Box 70, N-2027 KJELLER, Norway {paalh, plageman}@unik.no Vera Goebel Department of Informatics, University

More information

\Classical" RSVP and IP over ATM. Steven Berson. April 10, Abstract

\Classical RSVP and IP over ATM. Steven Berson. April 10, Abstract \Classical" RSVP and IP over ATM Steven Berson USC Information Sciences Institute April 10, 1996 Abstract Integrated Services in the Internet is rapidly becoming a reality. Meanwhile, ATM technology is

More information

Number of bits in the period of 100 ms. Number of bits in the period of 100 ms. Number of bits in the periods of 100 ms

Number of bits in the period of 100 ms. Number of bits in the period of 100 ms. Number of bits in the periods of 100 ms Network Bandwidth Reservation using the Rate-Monotonic Model Sourav Ghosh and Ragunathan (Raj) Rajkumar Real-time and Multimedia Systems Laboratory Department of Electrical and Computer Engineering Carnegie

More information

Communication Protocol Decomposition and Component-based Protocol Submodule

Communication Protocol Decomposition and Component-based Protocol Submodule Communication Protocol Decomposition and Component-based Protocol Submodule Tianzhou Chen 1, Quan Gan 2, Zhaohui Wu 1 College of Computer Science, Zhejiang University, Hangzhou, P.R.CHINA, 310027 1 {tzchen,

More information

Natural Semantics [14] within the Centaur system [6], and the Typol formalism [8] which provides us with executable specications. The outcome of such

Natural Semantics [14] within the Centaur system [6], and the Typol formalism [8] which provides us with executable specications. The outcome of such A Formal Executable Semantics for Java Isabelle Attali, Denis Caromel, Marjorie Russo INRIA Sophia Antipolis, CNRS - I3S - Univ. Nice Sophia Antipolis, BP 93, 06902 Sophia Antipolis Cedex - France tel:

More information

and easily tailor it for use within the multicast system. [9] J. Purtilo, C. Hofmeister. Dynamic Reconguration of Distributed Programs.

and easily tailor it for use within the multicast system. [9] J. Purtilo, C. Hofmeister. Dynamic Reconguration of Distributed Programs. and easily tailor it for use within the multicast system. After expressing an initial application design in terms of MIL specications, the application code and speci- cations may be compiled and executed.

More information

Demultiplexing on the ATM Adapter: Experiments withinternetprotocolsinuserspace

Demultiplexing on the ATM Adapter: Experiments withinternetprotocolsinuserspace Demultiplexing on the ATM Adapter: Experiments withinternetprotocolsinuserspace Ernst W. Biersack, Erich Rütsche B.P. 193 06904 Sophia Antipolis, Cedex FRANCE e-mail: erbi@eurecom.fr, rue@zh.xmit.ch Abstract

More information

An Experimental User Level Implementation of TCP.

An Experimental User Level Implementation of TCP. INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE An Experimental User Level Implementation of TCP. T. Braun, C. Diot, A. Hoglander, V. Roca N 2650 September 1995 PROGRAMME 1 Architectures

More information

Abstract Studying network protocols and distributed applications in real networks can be dicult due to the need for complex topologies, hard to nd phy

Abstract Studying network protocols and distributed applications in real networks can be dicult due to the need for complex topologies, hard to nd phy ONE: The Ohio Network Emulator Mark Allman, Adam Caldwell, Shawn Ostermann mallman@lerc.nasa.gov, adam@eni.net ostermann@cs.ohiou.edu School of Electrical Engineering and Computer Science Ohio University

More information

Rance Cleaveland The Concurrency Factory is an integrated toolset for specication, simulation,

Rance Cleaveland The Concurrency Factory is an integrated toolset for specication, simulation, The Concurrency Factory Software Development Environment Rance Cleaveland (rance@csc.ncsu.edu) Philip M. Lewis (pml@cs.sunysb.edu) y Scott A. Smolka (sas@cs.sunysb.edu) y Oleg Sokolsky (oleg@ccc.com) y

More information

Mobile NFS. Fixed NFS. MFS Proxy. Client. Client. Standard NFS Server. Fixed NFS MFS: Proxy. Mobile. Client NFS. Wired Network.

Mobile NFS. Fixed NFS. MFS Proxy. Client. Client. Standard NFS Server. Fixed NFS MFS: Proxy. Mobile. Client NFS. Wired Network. On Building a File System for Mobile Environments Using Generic Services F. Andre M.T. Segarra IRISA Research Institute IRISA Research Institute Campus de Beaulieu Campus de Beaulieu 35042 Rennes Cedex,

More information

Implementation choices

Implementation choices Towards designing SVM coherence protocols using high-level specications and aspect-oriented translations David Mentre, Daniel Le Metayer, Thierry Priol fdavid.mentre, Daniel.LeMetayer, Thierry.Priolg@irisa.fr

More information

Steering. Stream. User Interface. Stream. Manager. Interaction Managers. Snapshot. Stream

Steering. Stream. User Interface. Stream. Manager. Interaction Managers. Snapshot. Stream Agent Roles in Snapshot Assembly Delbert Hart Dept. of Computer Science Washington University in St. Louis St. Louis, MO 63130 hart@cs.wustl.edu Eileen Kraemer Dept. of Computer Science University of Georgia

More information

Micro-Communication Element System

Micro-Communication Element System Micro-Communication Element System Peng Zheng, Zeng Jiazhi, Zhang Ming, and Zhao Jidong School of Computer Science and Engineering, UESTC, Chengdu, 610054, China peppeng@hotamil.com, jzzeng@uestc.edu.cn,

More information

Protocol Implementation Using Integrated Layer Processing

Protocol Implementation Using Integrated Layer Processing Protocol Implementation Using Integrated Layer Processing Torsten Braun 1 and Christophe Diot 24 rte des Lucioles, F-692 Sophia-Antipolis Cedex, France e-mail: [Torsten.Braun Christophe.Diot]@sophia.inria.fr

More information

Comparison of Concepts for IP Multicast over ATM. 1 Introduction. 2 IP Multicast. 3 IP-Multicast over ATM

Comparison of Concepts for IP Multicast over ATM. 1 Introduction. 2 IP Multicast. 3 IP-Multicast over ATM Comparison of Concepts for IP Multicast over ATM Torsten Braun, Stefan Gumbrich, and Heinrich J. Stüttgen IBM European Networking Center, Vangerowstr. 18, D-69115 Heidelberg E-mail: braun@heidelbg.ibm.com,

More information

Optimization Techniques for Parallel Protocol Implementation

Optimization Techniques for Parallel Protocol Implementation Optimization Techniques for Parallel Protocol Implementation Stefan Leue Institute for Informatics University of Berne Langgassstrasse 51 CH-3012 Berne, Switzerland leue@iam.unibe.ch Philippe Oechslin

More information

Transport protocols are of practical. login, le transfer, and remote procedure. calls. will operate on and therefore are generally

Transport protocols are of practical. login, le transfer, and remote procedure. calls. will operate on and therefore are generally Hazard-Free Connection Release Jennifer E. Walter Department of Computer Science Texas A&M University College Station, TX 77843-3112, U.S.A. Jennifer L. Welch Department of Computer Science Texas A&M University

More information

UNIT 2 TRANSPORT LAYER

UNIT 2 TRANSPORT LAYER Network, Transport and Application UNIT 2 TRANSPORT LAYER Structure Page No. 2.0 Introduction 34 2.1 Objective 34 2.2 Addressing 35 2.3 Reliable delivery 35 2.4 Flow control 38 2.5 Connection Management

More information

Achilles: A High-Level Synthesis System. for Asynchronous Circuits. Jordi Cortadella, Rosa M. Badia, Enric Pastor, and Abelardo Pardo y

Achilles: A High-Level Synthesis System. for Asynchronous Circuits. Jordi Cortadella, Rosa M. Badia, Enric Pastor, and Abelardo Pardo y Achilles: A High-Level Synthesis System for Asynchronous Circuits Jordi Cortadella, Rosa M. Badia, Enric Pastor, and Abelardo Pardo y Dept. of Computer Architecture Universitat Politecnica de Catalunya

More information

V 1. volume. time. t 1

V 1. volume. time. t 1 On-line Trac Contract Renegotiation for Aggregated Trac R. Andreassen and M. Stoer a a Telenor AS, P.O.Box 83, 2007 Kjeller, Norway. Email: fragnar.andreassen, mechthild.stoerg@fou.telenor.no Consider

More information

UDP-Lite Enhancement Through Checksum Protection

UDP-Lite Enhancement Through Checksum Protection IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS UDP-Lite Enhancement Through Checksum Protection To cite this article: Suherman et al 2017 IOP Conf. Ser.: Mater. Sci. Eng. 180

More information

Adaptive Methods for Distributed Video Presentation. Oregon Graduate Institute of Science and Technology. fcrispin, scen, walpole,

Adaptive Methods for Distributed Video Presentation. Oregon Graduate Institute of Science and Technology. fcrispin, scen, walpole, Adaptive Methods for Distributed Video Presentation Crispin Cowan, Shanwei Cen, Jonathan Walpole, and Calton Pu Department of Computer Science and Engineering Oregon Graduate Institute of Science and Technology

More information

Networking Performance for Microkernels. Chris Maeda. Carnegie Mellon University. Pittsburgh, PA March 17, 1992

Networking Performance for Microkernels. Chris Maeda. Carnegie Mellon University. Pittsburgh, PA March 17, 1992 Networking Performance for Microkernels Chris Maeda Brian N. Bershad School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 March 17, 1992 Abstract Performance measurements of network

More information

Solve the Data Flow Problem

Solve the Data Flow Problem Gaining Condence in Distributed Systems Gleb Naumovich, Lori A. Clarke, and Leon J. Osterweil University of Massachusetts, Amherst Computer Science Department University of Massachusetts Amherst, Massachusetts

More information

Introduction to Protocols

Introduction to Protocols Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These

More information

OSI 95. Université de Liège. The OSI 95 Transport Service with Multimedia support *** The OSI95 Project. Esprit Project Systèmes et Automatique

OSI 95. Université de Liège. The OSI 95 Transport Service with Multimedia support *** The OSI95 Project. Esprit Project Systèmes et Automatique Université de Liège Faculté des Sciences Appliquées Systèmes et Automatique Esprit Project 5341 Institut d'electricité Montefiore, B28 Université de Liège au Sart Tilman B-4000 Liège 1 (Belgique) OSI 95

More information

Visualisation of ATM network connectivity and. topology.

Visualisation of ATM network connectivity and. topology. Visualisation of ATM network connectivity and topology O. Saal, J. Feng, A.E. Krzesinski y and E.H. Blake fosaal,jfeng,edwing@cs.uct.ac.za, aek1@cs.sun.ac.za Collaborative Visual Computing Laboratory Department

More information

Chapter 3. The Data Link Layer

Chapter 3. The Data Link Layer Chapter 3 The Data Link Layer 1 Data Link Layer Algorithms for achieving reliable, efficient communication between two adjacent machines. Adjacent means two machines are physically connected by a communication

More information

An Approach to Hardware-Supported Accounting Management in ATM-Networks

An Approach to Hardware-Supported Accounting Management in ATM-Networks 8th IEEE Workshop on Local and Metropolitan Area Networks, Berlin/Potsdam, August 25-28, 1996 An Approach to Hardware-Supported Accounting Management in -Networks Georg Carle, Günter Schäfer, Jochen Schiller

More information

2 Data Reduction Techniques The granularity of reducible information is one of the main criteria for classifying the reduction techniques. While the t

2 Data Reduction Techniques The granularity of reducible information is one of the main criteria for classifying the reduction techniques. While the t Data Reduction - an Adaptation Technique for Mobile Environments A. Heuer, A. Lubinski Computer Science Dept., University of Rostock, Germany Keywords. Reduction. Mobile Database Systems, Data Abstract.

More information

ETSF05/ETSF10 Internet Protocols Transport Layer Protocols

ETSF05/ETSF10 Internet Protocols Transport Layer Protocols ETSF05/ETSF10 Internet Protocols Transport Layer Protocols 2016 Jens Andersson Transport Layer Communication between applications Process-to-process delivery Client/server concept Local host Normally initialiser

More information

On Object Orientation as a Paradigm for General Purpose. Distributed Operating Systems

On Object Orientation as a Paradigm for General Purpose. Distributed Operating Systems On Object Orientation as a Paradigm for General Purpose Distributed Operating Systems Vinny Cahill, Sean Baker, Brendan Tangney, Chris Horn and Neville Harris Distributed Systems Group, Dept. of Computer

More information

MOBILE VIDEO COMMUNICATIONS IN WIRELESS ENVIRONMENTS. Jozsef Vass Shelley Zhuang Jia Yao Xinhua Zhuang. University of Missouri-Columbia

MOBILE VIDEO COMMUNICATIONS IN WIRELESS ENVIRONMENTS. Jozsef Vass Shelley Zhuang Jia Yao Xinhua Zhuang. University of Missouri-Columbia MOBILE VIDEO COMMUNICATIONS IN WIRELESS ENVIRONMENTS Jozsef Vass Shelley Zhuang Jia Yao Xinhua Zhuang Multimedia Communications and Visualization Laboratory Department of Computer Engineering & Computer

More information

Transport Layer. Gursharan Singh Tatla. Upendra Sharma. 1

Transport Layer. Gursharan Singh Tatla.   Upendra Sharma. 1 Transport Layer Gursharan Singh Tatla mailme@gursharansingh.in Upendra Sharma 1 Introduction The transport layer is the fourth layer from the bottom in the OSI reference model. It is responsible for message

More information

IPC. Communication. Layered Protocols. Layered Protocols (1) Data Link Layer. Layered Protocols (2)

IPC. Communication. Layered Protocols. Layered Protocols (1) Data Link Layer. Layered Protocols (2) IPC Communication Chapter 2 Inter-Process Communication is the heart of all DSs. Processes on different machines. Always based on low-level message passing. In this chapter: RPC RMI MOM (Message Oriented

More information

Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of RED gateways

Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of RED gateways INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS Int. J. Commun. Syst. 2002; 15:899 906 (DOI: 10.1002/dac.571) Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of

More information

signature i-1 signature i instruction j j+1 branch adjustment value "if - path" initial value signature i signature j instruction exit signature j+1

signature i-1 signature i instruction j j+1 branch adjustment value if - path initial value signature i signature j instruction exit signature j+1 CONTROL FLOW MONITORING FOR A TIME-TRIGGERED COMMUNICATION CONTROLLER Thomas M. Galla 1, Michael Sprachmann 2, Andreas Steininger 1 and Christopher Temple 1 Abstract A novel control ow monitoring scheme

More information

Time (seconds) Time (seconds) Time (seconds)

Time (seconds) Time (seconds) Time (seconds) AN EXPERIMENTAL STUDY OF POTENTIAL PARALLELISM IN AN IMPLEMENTATION OF MIL-STD 188-22 John Graham Lori L. Pollock Department of Computer and Information Sciences University of Delaware fgraham,pollockg@cis.udel.edu

More information

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A 5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI 635 854. NAME OF THE STAFF : R.ANBARASAN DESIGNATION & DEPARTMENT : AP/CSE SUBJECT CODE : CS 6551 SUBJECT NAME : COMPUTER NETWORKS UNIT I FUNDAMENTALS

More information

Model-Driven Architecture, the revolution of software engineering

Model-Driven Architecture, the revolution of software engineering Model-Driven Architecture, the revolution of software engineering Giovanni Piemontese, Guido Diodato {gpe08001, gdo08001}@student.mdh.se Università degli Studi dell'aquila October 30, 2008 Abstract Nowadays,

More information

The Cambridge Backbone Network. An Overview and Preliminary Performance. David J. Greaves. Olivetti Research Ltd. Krzysztof Zielinski

The Cambridge Backbone Network. An Overview and Preliminary Performance. David J. Greaves. Olivetti Research Ltd. Krzysztof Zielinski The Cambridge Backbone Network An Overview and Preliminary Performance David J. Greaves Olivetti Research Ltd. University of Cambridge, Computer Laboratory Krzysztof Zielinski Institute of Computer Science

More information

Database Systems Concepts *

Database Systems Concepts * OpenStax-CNX module: m28156 1 Database Systems Concepts * Nguyen Kim Anh This work is produced by OpenStax-CNX and licensed under the Creative Commons Attribution License 3.0 Abstract This module introduces

More information

Fore ATM Switch ASX1000 D/E Box (0 to 20000km) ACTS (36000km)

Fore ATM Switch ASX1000 D/E Box (0 to 20000km) ACTS (36000km) Performance of TCP extensions on noisy high BDP networks Charalambous P. Charalambos, Victor S. Frost, Joseph B. Evans August 26, 1998 Abstract Practical experiments in a high bandwidth delay product (BDP)

More information

City Research Online. Permanent City Research Online URL:

City Research Online. Permanent City Research Online URL: Kloukinas, C., Saridakis, T. & Issarny, V. (1999). Fault Tolerant Access to Dynamically Located Services for CORBA Applications. Paper presented at the Computer Applications in Industry and Engineering

More information

FB(9,3) Figure 1(a). A 4-by-4 Benes network. Figure 1(b). An FB(4, 2) network. Figure 2. An FB(27, 3) network

FB(9,3) Figure 1(a). A 4-by-4 Benes network. Figure 1(b). An FB(4, 2) network. Figure 2. An FB(27, 3) network Congestion-free Routing of Streaming Multimedia Content in BMIN-based Parallel Systems Harish Sethu Department of Electrical and Computer Engineering Drexel University Philadelphia, PA 19104, USA sethu@ece.drexel.edu

More information

TSIN02 - Internetworking

TSIN02 - Internetworking TSIN02 - Internetworking Literature: Lecture 4: Transport Layer Forouzan: ch 11-12 Transport layer responsibilities UDP TCP 2004 Image Coding Group, Linköpings Universitet 2 Transport layer in OSI model

More information

RED behavior with different packet sizes

RED behavior with different packet sizes RED behavior with different packet sizes Stefaan De Cnodder, Omar Elloumi *, Kenny Pauwels Traffic and Routing Technologies project Alcatel Corporate Research Center, Francis Wellesplein, 1-18 Antwerp,

More information

A practical and modular implementation of extended transaction models

A practical and modular implementation of extended transaction models Oregon Health & Science University OHSU Digital Commons CSETech January 1995 A practical and modular implementation of extended transaction models Roger Barga Calton Pu Follow this and additional works

More information

SATELLITE NETWORK REGULAR CONNECTIONS

SATELLITE NETWORK REGULAR CONNECTIONS Supporting unidirectional links in the Internet Emmanuel Duros eduros@sophia.inria.fr I.N.R.I.A. Sophia Antipolis http://www.inria.fr/rodeo/personnel/eduros/ Walid Dabbous dabbous@sophia.inria.fr I.N.R.I.A.

More information

Protocol Architecture for Multimedia Applications over ATM. Networks. IBM Thomas J. Watson Research Center. Yorktown Heights, NY 10598

Protocol Architecture for Multimedia Applications over ATM. Networks. IBM Thomas J. Watson Research Center. Yorktown Heights, NY 10598 Protocol Architecture for Multimedia Applications over ATM Networks Dilip D. Kandlur Debanjan Saha Marc Willebeek-LeMair IBM Thomas J. Watson Research Center Yorktown Heights, NY 10598 email:fkandlur,debanjan,mwlmg@watson.ibm.com

More information

Automatic Configuration of Communication Subsystems - A Survey - B. Geppert and F. Rößler SFB 501 Report 17/96

Automatic Configuration of Communication Subsystems - A Survey - B. Geppert and F. Rößler SFB 501 Report 17/96 Automatic Configuration of Communication Subsystems - A Survey - B. Geppert and F. Rößler SFB 501 Report 17/96 Automatic Configuration of Communication Subsystems - A Survey - B. Geppert and F. Rößler

More information

Tailored Protocol Development Using ESTEREL

Tailored Protocol Development Using ESTEREL Tailored Protocol Development Using ESTEREL Claude Castelluccia, Isabelle Chrisment, Walid Dabbous, Christophe Diot, Christian Huitema, E. Siegel, Robert De Simone To cite this version: Claude Castelluccia,

More information

A Hierarchical Approach to Workload. M. Calzarossa 1, G. Haring 2, G. Kotsis 2,A.Merlo 1,D.Tessera 1

A Hierarchical Approach to Workload. M. Calzarossa 1, G. Haring 2, G. Kotsis 2,A.Merlo 1,D.Tessera 1 A Hierarchical Approach to Workload Characterization for Parallel Systems? M. Calzarossa 1, G. Haring 2, G. Kotsis 2,A.Merlo 1,D.Tessera 1 1 Dipartimento di Informatica e Sistemistica, Universita dipavia,

More information

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking

More information

Part VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD

Part VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD Part VI Appendixes Appendix A OSI Model and Internet Protocols Appendix B About the CD OSI Model and Internet Protocols APPENDIX A In this appendix, you will Learn about the OSI model Review the network

More information

ETSF10 Internet Protocols Transport Layer Protocols

ETSF10 Internet Protocols Transport Layer Protocols ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.1 Kaan Bür, Jens Andersson Transport Layer Protocols Process-to-process delivery [ed.4 ch.23.1] [ed.5 ch.24.1] Transmission Control

More information

residual residual program final result

residual residual program final result C-Mix: Making Easily Maintainable C-Programs run FAST The C-Mix Group, DIKU, University of Copenhagen Abstract C-Mix is a tool based on state-of-the-art technology that solves the dilemma of whether to

More information

Page 1. Review: Internet Protocol Stack. Transport Layer Services. Design Issue EEC173B/ECS152C. Review: TCP

Page 1. Review: Internet Protocol Stack. Transport Layer Services. Design Issue EEC173B/ECS152C. Review: TCP EEC7B/ECS5C Review: Internet Protocol Stack Review: TCP Application Telnet FTP HTTP Transport Network Link Physical bits on wire TCP LAN IP UDP Packet radio Transport Layer Services Design Issue Underlying

More information

Quality-of-Service Testing. Specifying Functional QoS Testing Requirements by using Message. Sequence Charts and TTCN

Quality-of-Service Testing. Specifying Functional QoS Testing Requirements by using Message. Sequence Charts and TTCN Quality-of-Service Testing Specifying Functional QoS Testing Requirements by using Message Sequence Charts and TTCN Jens Grabowski a and Thomas Walter b a Medizinische Universitat zu Lubeck, Institut fur

More information

An Efficient DECT-Mobile IP Interworking for Mobile Computing

An Efficient DECT-Mobile IP Interworking for Mobile Computing An Efficient DECT-Mobile IP Interworking for Mobile Computing Anthony Lo *, Winston Seah * and Edwin Schreuder + * Centre for Wireless Communications 1, National University of Singapore, 20 Science Park

More information

A Lost Cycles Analysis for Performance Prediction using High-Level Synthesis

A Lost Cycles Analysis for Performance Prediction using High-Level Synthesis A Lost Cycles Analysis for Performance Prediction using High-Level Synthesis Bruno da Silva, Jan Lemeire, An Braeken, and Abdellah Touhafi Vrije Universiteit Brussel (VUB), INDI and ETRO department, Brussels,

More information

UNIVERSITÄT PADERBORN. ComponentTools

UNIVERSITÄT PADERBORN. ComponentTools UNIVERSITÄT PADERBORN ComponentTools Component Library Concept Project Group ComponentTools pg-components@uni-paderborn.de Alexander Gepting, Joel Greenyer, Andreas Maas, Sebastian Munkelt, Csaba Pales,

More information

perform well on paths including satellite links. It is important to verify how the two ATM data services perform on satellite links. TCP is the most p

perform well on paths including satellite links. It is important to verify how the two ATM data services perform on satellite links. TCP is the most p Performance of TCP/IP Using ATM ABR and UBR Services over Satellite Networks 1 Shiv Kalyanaraman, Raj Jain, Rohit Goyal, Sonia Fahmy Department of Computer and Information Science The Ohio State University

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 4: Transport Layer Literature: Forouzan: ch 11-12 2004 Image Coding Group, Linköpings Universitet Lecture 4: Outline Transport layer responsibilities UDP TCP 2 Transport layer in OSI model Figure

More information

Simulation of TCP Layer

Simulation of TCP Layer 39 Simulation of TCP Layer Preeti Grover, M.Tech, Computer Science, Uttrakhand Technical University, Dehradun ABSTRACT The Transmission Control Protocol (TCP) represents the most deployed transport protocol

More information

Coping with Conflicts in an Optimistically Replicated File System

Coping with Conflicts in an Optimistically Replicated File System Coping with Conflicts in an Optimistically Replicated File System Puneet Kumar School of Computer Science Carnegie Mellon University 1. Introduction Coda is a scalable distributed Unix file system that

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 4: Transport Layer Literature: Forouzan: ch 11-12 2004 Image Coding Group, Linköpings Universitet Lecture 4: Outline Transport layer responsibilities UDP TCP 2 Transport layer in OSI model Figure

More information

Frank Miller, George Apostolopoulos, and Satish Tripathi. University of Maryland. College Park, MD ffwmiller, georgeap,

Frank Miller, George Apostolopoulos, and Satish Tripathi. University of Maryland. College Park, MD ffwmiller, georgeap, Simple Input/Output Streaming in the Operating System Frank Miller, George Apostolopoulos, and Satish Tripathi Mobile Computing and Multimedia Laboratory Department of Computer Science University of Maryland

More information

Distributed Scheduling for the Sombrero Single Address Space Distributed Operating System

Distributed Scheduling for the Sombrero Single Address Space Distributed Operating System Distributed Scheduling for the Sombrero Single Address Space Distributed Operating System Donald S. Miller Department of Computer Science and Engineering Arizona State University Tempe, AZ, USA Alan C.

More information

QUESTION BANK UNIT-I

QUESTION BANK UNIT-I DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK Subject Code: CS1302 Subject Name: Computer Networks Year/ Sem: III / V UNIT-I 1. What is multicast? What is the difference between unicast and multicast?

More information

A Freely Congurable Audio-Mixing Engine. M. Rosenthal, M. Klebl, A. Gunzinger, G. Troster

A Freely Congurable Audio-Mixing Engine. M. Rosenthal, M. Klebl, A. Gunzinger, G. Troster A Freely Congurable Audio-Mixing Engine with Automatic Loadbalancing M. Rosenthal, M. Klebl, A. Gunzinger, G. Troster Electronics Laboratory, Swiss Federal Institute of Technology CH-8092 Zurich, Switzerland

More information

Server A Server B. Sequence Number (MB) Time (seconds)

Server A Server B. Sequence Number (MB) Time (seconds) IMPROVING THE PERFORMANCE OF COOPERATING TCP CONNECTIONS Dorgival Guedes Computer Science Department Universidade Federal de Minas Gerais dorgival@dcc.ufmg.br Larry Peterson Computer Science Department

More information

Cover Page. The handle holds various files of this Leiden University dissertation

Cover Page. The handle   holds various files of this Leiden University dissertation Cover Page The handle http://hdl.handle.net/1887/22891 holds various files of this Leiden University dissertation Author: Gouw, Stijn de Title: Combining monitoring with run-time assertion checking Issue

More information

EEC-682/782 Computer Networks I

EEC-682/782 Computer Networks I EEC-682/782 Computer Networks I Lecture 16 Wenbing Zhao w.zhao1@csuohio.edu http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser at

More information

Unreliable NET. Application Layer. Transport Layer. packet flow. ack flow. Network Layer. Unreliable Net. Actual Loss Rate λ loss.

Unreliable NET. Application Layer. Transport Layer. packet flow. ack flow. Network Layer. Unreliable Net. Actual Loss Rate λ loss. Partially Reliable Transport Service Rahmi Marasli Paul D. Amer Phillip T. Conrad Computer and Information Sciences Department University of Delaware, Newark, DE 976 USA Email: fmarasli,amer,pconradg@cis.udel.edu

More information

Network Level Framing in INSTANCE

Network Level Framing in INSTANCE Network Level Framing in INSTANCE Pål Halvorsen, Thomas Plagemann UniK, University of Oslo P.O. Box 70, N-2027 KJELLER, Norway {paalh, plageman}@unik.no Vera Goebel Department of Informatics, University

More information

Computer Networks (Unit wise Questions)

Computer Networks (Unit wise Questions) Unit I Unit II 1. What are different transmission modes?[4] 2. Encode the following binary data stream into Manchester and differential Manchester codes 1 1 0 0 1 0 1 0 [8] 3. What are different topologies

More information

Software Component Relationships. Stephen H. Edwards. Department of Computer Science. Virginia Polytechnic Institute and State University

Software Component Relationships. Stephen H. Edwards. Department of Computer Science. Virginia Polytechnic Institute and State University Software Component Relationships Stephen H. Edwards Department of Computer Science Virginia Polytechnic Institute and State University 660 McBryde Hall Blacksburg, VA 24061-0106 Tel: (540)-231-7537 Email:

More information

Quality of Service (QoS) Whitepaper

Quality of Service (QoS) Whitepaper Quality of Service (QoS) Whitepaper PCS-Series Videoconferencing White Paper www.sonybiz.net/vc Introduction Currently, an estimated 5% of data packets sent over the Internet are lost. In a videoconferencing

More information

TCP over Wireless Networks Using Multiple. Saad Biaz Miten Mehta Steve West Nitin H. Vaidya. Texas A&M University. College Station, TX , USA

TCP over Wireless Networks Using Multiple. Saad Biaz Miten Mehta Steve West Nitin H. Vaidya. Texas A&M University. College Station, TX , USA TCP over Wireless Networks Using Multiple Acknowledgements (Preliminary Version) Saad Biaz Miten Mehta Steve West Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, TX

More information

Multicast Transport Protocol Analysis: Self-Similar Sources *

Multicast Transport Protocol Analysis: Self-Similar Sources * Multicast Transport Protocol Analysis: Self-Similar Sources * Mine Çağlar 1 Öznur Özkasap 2 1 Koç University, Department of Mathematics, Istanbul, Turkey 2 Koç University, Department of Computer Engineering,

More information

12th European Simulation Multiconference, Manchester, Uk, Discrete Event Simulation in Interactive Scientic and

12th European Simulation Multiconference, Manchester, Uk, Discrete Event Simulation in Interactive Scientic and 12th European Simulation Multiconference, Manchester, Uk, 1998 1 Discrete Event Simulation in Interactive Scientic and Technical Computing Environments T. Pawletta, Wismar University, Germany W. Drewelow,

More information

Exploring the Performance Impact of. QoS Support in TCP/IP Protocol Stacks. Robert Engely, Dilip Kandlury, Ashish Mehraz, and Debanjan Sahay.

Exploring the Performance Impact of. QoS Support in TCP/IP Protocol Stacks. Robert Engely, Dilip Kandlury, Ashish Mehraz, and Debanjan Sahay. Exploring the Performance Impact of QoS Support in TCP/IP Protocol Stacks Robert Engely, Dilip Kandlury, Ashish Mehraz, and Debanjan Sahay yibm T.J. Watson Research Center 30 Saw Mill River Rd Hawthorne,

More information

Extensions to RTP to support Mobile Networking: Brown, Singh 2 within the cell. In our proposed architecture [3], we add a third level to this hierarc

Extensions to RTP to support Mobile Networking: Brown, Singh 2 within the cell. In our proposed architecture [3], we add a third level to this hierarc Extensions to RTP to support Mobile Networking Kevin Brown Suresh Singh Department of Computer Science Department of Computer Science University of South Carolina Department of South Carolina Columbia,

More information

An analysis of retransmission strategies for reliable multicast protocols

An analysis of retransmission strategies for reliable multicast protocols An analysis of retransmission strategies for reliable multicast protocols M. Schuba, P. Reichl Informatik 4, Aachen University of Technology 52056 Aachen, Germany email: marko peter@i4.informatik.rwth-aachen.de

More information

Data Link Layer (1) Networked Systems 3 Lecture 6

Data Link Layer (1) Networked Systems 3 Lecture 6 Data Link Layer (1) Networked Systems 3 Lecture 6 Purpose of Data Link Layer Arbitrate access to the physical layer Structure and frame the raw bits Provide flow control Detect and correct bit errors Perform

More information

DHCP for IPv6. Palo Alto, CA Digital Equipment Company. Nashua, NH mentions a few directions about the future of DHCPv6.

DHCP for IPv6. Palo Alto, CA Digital Equipment Company. Nashua, NH mentions a few directions about the future of DHCPv6. DHCP for IPv6 Charles E. Perkins and Jim Bound Sun Microsystems, Inc. Palo Alto, CA 94303 Digital Equipment Company Nashua, NH 03062 Abstract The Dynamic Host Conguration Protocol (DHCPv6) provides a framework

More information

100 Mbps DEC FDDI Gigaswitch

100 Mbps DEC FDDI Gigaswitch PVM Communication Performance in a Switched FDDI Heterogeneous Distributed Computing Environment Michael J. Lewis Raymond E. Cline, Jr. Distributed Computing Department Distributed Computing Department

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

SHARED WORKSPACE AUDIO & VIDEO COMMUNICATION

SHARED WORKSPACE AUDIO & VIDEO COMMUNICATION ing Quality-of-Service Aspects in Multimedia Applications Jens Grabowski a and Thomas Walter b a University of Berne, Computer Science Department, Neubruckstrasse 10, 3012 Bern, Switzerland, e-mail: grabowsk@iam.unibe.ch

More information

Communication. Distributed Systems Santa Clara University 2016

Communication. Distributed Systems Santa Clara University 2016 Communication Distributed Systems Santa Clara University 2016 Protocol Stack Each layer has its own protocol Can make changes at one layer without changing layers above or below Use well defined interfaces

More information

Introduction to Open System Interconnection Reference Model

Introduction to Open System Interconnection Reference Model Chapter 5 Introduction to OSI Reference Model 1 Chapter 5 Introduction to Open System Interconnection Reference Model Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding

More information

Abstract. provide substantial improvements in performance on a per application basis. We have used architectural customization

Abstract. provide substantial improvements in performance on a per application basis. We have used architectural customization Architectural Adaptation in MORPH Rajesh K. Gupta a Andrew Chien b a Information and Computer Science, University of California, Irvine, CA 92697. b Computer Science and Engg., University of California,

More information