VoIP transmission mechanism based on TCP

Size: px
Start display at page:

Download "VoIP transmission mechanism based on TCP"

Transcription

1 December 2016, 23(6): The Journal of China Universities of Posts and Telecommunications VoIP transmission mechanism based on TCP Shuang Kai, Guan Zhe ( ), Meng Chunzhi State Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing , China Abstract As the widespread employment of firewalls on the Internet, user datagram protocol (UDP) based voice over Internet protocol (VoIP) system will be unable to transmit voice data. This paper proposed a novel method to transmit voice data based on transmission control protocol (TCP). The method adopts a disorder TCP transmission strategy, which allows discontinuous data packets in TCP queues read by application layer directly without waiting for the retransmission of lost data packets. A byte stream data boundary identification algorithm based on consistent overhead byte stuffing algorithm is designed to efficiently identify complete voice data packets from disordered TCP packets arrived so as to transmit the data to the audio processing module timely. Then, by implementing the prototype system and testing, we verified that the proposed algorithm can solve the high time delay, jitter and discontinuity problems in standard TCP protocol when transmitting voice data packets, which caused by its error control and retransmission mechanism. We proved that the method proposed in this paper is effective and practical. Keywords voice transmission, bypass firewall, disorder TCP transmission, byte date stream boundary identification 1 Introduction Multimedia communication on the Internet, anytime and anywhere, has become the universal demand of people. Live stream media based on real-time voice has become the main transfer object of the network. Voice transmission technology has become one of the hot points in current research. In the current network, because of the outstanding performance of the UDP in real-time transmission, it has become the main streaming data bearer protocol. As the widespread employment of firewalls on the Internet, which close the UDP port for security and other factors, the normal voice communications between clients are greatly limited. However, the firewall takes a more relaxed open rule for TCP. Hence, TCP can easily pass through the firewall and can be used to transmit voice. Because of the inherent flow control, such as congestion control and error control mechanism, using TCP to Received date: Corresponding author: Guan zhe, guanzhe@bupt.edu.cn DOI: /S (16) transport real-time voice data will cause following problems: 1) When packet loss occurs, the delay and disorder of packets caused by retransmission mechanism render the packets miss their normal playback time, which will cause voice pause, delay and other phenomena, significantly degrade the quality of voice communication. 2) When congestion occurs, TCP will halve the throughput rate by reducing the size of congestion window to accommodate this situation. But the voice data transmission rate is determined by frame rate, and it does not reduce the transmission rate. This will result in the data accumulation in data buffer and affect transmission and smooth playback of voice data, severely lower voice quality. To solve above problems, this paper proposed a TCP-based method to transmit voice data. This method adopts a disorder TCP transmission strategy. By allowing the receiver to read discrete packets, the data acceptance will not be affected by the lost and delayed packets. Accordingly, reduce the delay caused by retransmission. In addition, we also designs a boundary identification

2 Issue 6 Shuang Kai, et al. / VoIP transmission mechanism based on TCP 91 algorithm. It can efficiently identify the boundary of the disordered packets and enable the audio processing module to receive complete voice data. At last, test results from the prototype system conclude the efficiency and practicality of the method. 2 Related work Currently, the TCP-based transmission methods of voice data consist mainly two categories: network-based method and host-based method. The network-based methods mainly refine the performance of voice transmission by improving the quality of the network. In Ref. [1], Braden et al. proposed an extended comprehensive service on the Internet architecture and protocols. The extended service can meet the real-time requirement of various applications. In Refs. [2 3], Kompella et al. introduced the Internet resource reservation protocol with its extensions and supplements, providing QoS-guaranteed real-time voice transmission under routers support. In Ref. [4], Vishwanath et al. used routers with data buffers in them to improve the quality of voice data. In Ref. [5], Charny et al. defined an expedited forwarding per-hop behavior. By configuring the routing nodes on the network, it provides a virtual link with low packet loss rate, low delay and low jitter for real-time data transmission to ensure the performance of real-time voice data. Nevertheless, most of the network-based methods require switches or routers to support high QoS. But these kinds of switches or rooters are rarely used in current network. So their usefulness is limited. However, the host-based method, which can improve quality of voice transmission through the methods provided by host system, has no such limitation. So its universality and adaptability are much better. In Ref. [6], Cocker et al. came up with a strategy to improve the real-time performance of voice transmission by minimizing the data buffer. In Ref. [7], Wu et al. suggested an algorithm to adjust the data transmission rate: the sender can dynamically adjust the transmission rate according to the regular feedback of real-time network packet loss rate from the receiver. In Ref. [8], Park et al. claimed a method that only let the retransmission occur within a limited period to reduce the retransmission delay. In Ref. [9], Németh et al. introduced an optimized TCP-limit protocol which permits dynamical adjustment of congestion window under different situations to reduce the fluctuation of data flow and obliterate delay and jitter to some extent. In Ref. [10], Evensen et al. proposed an optimized TCP called thin-streaming to optimize the transmission strategy. It can improve data transmission performance by adjusting congestion window. Most of above methods rely on the modification of congestion control mechanism. It cannot avoid a significant change to the TCP. Therefore, these methods cannot guarantee the efficiency and stability of transmission. So they are still in the simulation and research stage. To our best knowledge, there is no mature solution to transmission of TCP based VoIP in industry. The most similar work to ours is SCPS-TP, which is a transport protocol for space telecommunication. The best effort mode of SCPS-TP also bears the out-of-sequence segment. However, it never receives the out-of-sequence segment. It just discards the data if the missing segment not appeared when out-of-sequence data queue reaches its size or the timer elapses, which is very different from our scheme. Although it is not the main purpose in this paper, we still compare the two different scheme in the last part of our paper. 3 Voice transmission based on TCP In a network with packet loss, the requirement of orderly data transmission and retransmission mechanism of TCP result in the application layer cannot read disorder packets. This will increase time delay and jitter of the voice data, lead to voice packets miss their normal play time, and cause the delay and pause of calls, dramatically affect the quality of communication. So a new transmission strategy which allows disordered TCP data transmission is badly needed to reduce the delay of retransmission and guarantee the quality of voice in the network with low loss packet rate. Moreover, because the TCP is a byte stream oriented protocol, it is impossible to distinguish the boundary information of the user media data packets. Thus, allowing disordered TCP transmission strategy may lead to packet boundary information lost and the receiver cannot restore the original voice date. This will make the decoder not work. Therefore, it is also desirable to design a byte stream data boundary identification algorithm to identify the received voice packets, and then, delivery them to the voice audio processing module timely.

3 92 The Journal of China Universities of Posts and Telecommunications Overview of the overall architecture The network architecture of TCP based voice transmission method proposed in this paper is shown in Fig. 1. The reformed voice terminals are behind the firewall, the server s firewall blocks UDP flows and allows TCP flows to get through. The system completes the call process by implementing the disorder TCP transmission strategy and byte stream data boundary identification algorithm. Fig. 1 Overall architecture The software architecture of voice terminal is shown in Fig. 2. The disordered TCP transmission strategy is implemented by modifying the TCP protocol stack. The intermediate layer unit contains data coding strategy, boundary identification strategy and data decoding strategy. The boundary identification of byte flow is based on consistent overhead byte stuffing algorithm. Fig. 2 Software architecture of voice terminal 3.2 Disorder TCP transmission strategy The disorder TCP transmission strategy enables the application layer to read latter data packets in a serial date sequence without having to receive the preorder data packets in the same sequence, so as to avoid pause and time delay in a call process. The strategy does not modify any interface of TCP. It only adds a new socket option: SO_UNORDERED, to open the disorder TCP transmission strategy. The TCP with such a strategy allows the application layer to read the data whenever new data packets arrive, skipping those not arrived packets. The application layer use the same read() function to read data, but the first byte of the data returned by read() function is not necessarily follows the last byte of date returned by the last call to read() function. However, the read() function will transfer all the data to the application layer at least once. And the disorder TCP transmission strategy will add a 4B header at the beginning of the data to identify the offset of the first byte of the data in original byte stream. With the header, the receiver can use the received data to restore the original data. Fig. 3 shows the comparison of receiving behaviors of standard TCP and disorder TCP transmission strategy. In Fig. 3, the first packet arrives in right order, the second arrives out of sequence and the third is the missing packet before the second packet. When using standard TCP to transfer data, the first packet can be read directly by the application layer, the second packet stays in the queue until the missing data the third packet arrives, then the second data and third data can be read by the application layer in sequence. But when using the disorder TCP transmission strategy, the first packet can be read directly, and the second packet also can be read immediately as disorder packet without waiting for the missing data. (a) Standard TCP transmission

4 Issue 6 Shuang Kai, et al. / VoIP transmission mechanism based on TCP 93 (b) Disorder TCP transmission Fig. 3 Receive behavior of disorder TCP transmission 3.3 Byte stream data boundary identification algorithm The byte stream data boundary identification algorithm is implemented by the intermediate layer unit, which contains data coding strategy, data decoding strategy and boundary identification strategy. When sending the data, the intermediate layer firstly uses consistent overhead byte stuffing algorithm to encode data, removing 0x00 B in the data sequence. Then, add a 0x00 B at the beginning and the end of each packet as boundary flag. When receiving data, the receiver can identify a complete voice packet by recognizing the continuous data segment starts and ends with 0x Data coding strategy Data coding strategy is used to encode voice data. It serves as the foundation of boundary identification. The strategy uses consistent overhead byte stuffing algorithm to encode data. The result of this strategy is that all 0x00 B are removed from the data sequence. After that, a 0x00 B is added to both the head and the end of the data sequence to represent a complete data packet. The specific steps of encoding are shown in Fig. 4. 1) Traverse the data packet and find out all positions that 0x00 B present. Then based on these 0x00 B, the original data packet is divided into several data blocks with a 0x00 B tail for each. The length of the data blocks depends on the positions of the 0x00 B in the packet. So a data block may contain only one byte or several bytes. 2) Use data coding strategy to encode data blocks above. 3) Assemble the coded data blocks and reconstruct a new data packet. 4) Add a 0x00 B respectively at the head and the end of the new data packet as identification of the packet. Fig. 4 Data coding steps Boundary identification strategy Boundary identification strategy is used to identify the boundary of the disorder TCP data packets. The strategy guarantees the received complete voice data packets can be delivered to audio processing module timely so as to improve the quality of voice calls. Fig. 5 shows all three possible situations that boundary identification strategy has to tackle with: 1) In situation 1, the sender sends 3 consecutive voice data packets which have been encoded by intermediate layer. There are no routers and other equipment in the

5 94 The Journal of China Universities of Posts and Telecommunications 2016 network, and the packet 2 is lost in transmission. Thus, only packet 1 and packet 3 can be received by intermediate layer under this circumstance. By identifying the 0x00 B, the receiver gets two packets with 0x00 B header and 0x00 B tail. Then the two packets are decoded and delivered to audio processing module to play, without waiting for the missing packet. As a result, the time delay and pause in voice calls can be avoided and the loss of a small amount of voice data will not significantly affect the quality of calls. 2) In situation 2, the sender sends three consecutive data packets as well. But what different from situation 1 is that the three packets are fragmented and reassembled by routers and other network equipment and are transformed into two packets. One of the new packets consists of packet 1 and the front part of packet 2, the other consists of packet 3 and the remaining part of packet 2. When receiver receives the first reassembled packet, it can restore the original data segment by identifying the 0x00 B boundary and decoding the consecutive data sequence through intermediate layer. Then, the remainder of the first packets is attached to the next packet. Repeat the process above, we can get all three original packets. 3) Situation 3 is similar to situation 2, but the first reassembled packet is lost. The receiver only received the second reassembled packet. As a result, only packet 3 is restored after boundary identification and decoding. Therefore, only packet 3 is passed to the application layer. This ensures the voice will be played continuously without pause and high time delay. Fig. 5 Situations in boundary identification Data decoding strategy The data decoding strategy takes the output of the boundary identification strategy as input. The complete original voice packet can be restored by removing the marker byte data at the head and the end of the data sequence. The process of the decoding is the inverse of coding. So it is not necessary to discuss any detail here. 4 Prototype system and test results 4.1 The prototype system This paper modifies the TCP protocol stack of Linux system to implement the intermediate layer unit. At the same time, the paper also modifies the Java-based scientific instruction processor (SIP) terminal. By replacing UDP with TCP as its lower media transmission protocol, the terminal now includes the intermediate layer we have described above. The network architecture of test system is shown in Fig. 1. In the network, two voice terminals are running on two Linux servers, the firewalls of which are set to block UDP flow and enable TCP flow to get through. We use dummynet to control the network latency and packet loss rate and set up a network environment with low packet loss rate (0~2%). To evaluate the validity of the method, we analyze the time delay from one terminal to another and the data processing performance of the terminal. 4.2 Voice quality analysis For the quality of the VoIP system, an import factor is whether the voice packets can be played at their right playing time. In VoIP calls, the voice data has certain tolerance on packet loss. When 90% or more voice packets can be played normally, the users communication will not be influenced. But when less than 80% of the voice packets can be played normally, the communication will not be carried out. That means 80% of the voice data must be received and discerned by the voice terminal before the right playback time. The experiment tests the voice quality under various

6 Issue 6 Shuang Kai, et al. / VoIP transmission mechanism based on TCP 95 conditions where voice is carried by UDP, standard TCP and modified TCP, which allows disorder transmission, under different packet loss rate. The test result is shown in Fig. 6. environment, we compared the performance of the two models under different package loss rate. The result of the experiment is showed in Fig. 7. It suggests that disorder TCP outperforms the best effort mode of SCPS-TP. When the package loss reaches 2%, the SCPS-TP missed near 5% of the voice package, while disorder TCP can normally paly 98% of the VoIP package. The result really makes sense because SCPS-TP does not deliver the voice package to application layer if the missing data never reaches the receiver. On the contrary, our disorder TCP model passes the out-of-sequence packages to application layer immediately without waiting for the missing data. Fig. 6 Proportion of normally played voice packets The result suggests that when voice is carried by UDP, because UDP is not required to guarantee the reliability and real-time of the data, the vast majority of voice packets can be played at their playing time. Only the lost packets cannot be sent to opposite terminal to play due to the UDP does not provide retransmission mechanism, but this will not significantly impact the quality of voice calls. And when packet loss rate rises to 2%, although the proportion of correctly played voice packets has a bit decline, 95% of the voice packets are still can be played at right time and this will not affect voice quality. When voice is carried by standard TCP, because the TCP is required to guarantee the reliability of voice data, retransmission mechanism will be used to resolve the packet loss problem. So, it will introduce more extra time. Moreover, with the increasing of packet loss rate, the proportion of normally received and played voice packets rapidly decrease. When the packet loss rate is 0.7%, there are only less than 90% of the voice packets can be played normally. When the rate increases to 1%, it is almost unable to complete communication. The method proposed in this paper is based on TCP protocol and allows application layer to read data directly from the disorder TCP data sequence and timely deliver the received integrated packets to upper processing module. When packet loss rate is lower than 1%, the effect of the method is close to that of UDP. And when the rate increases to 2%, there are more than 90% of the voice packets still can be played normally. This guarantees the normal communication between two clients. To compare with SCPS-TP, we performed another comparative experiment. Giving the same network Fig. 7 Contrast between SCPS-TP and disorder TCP 4.3 Performance of voice terminal The method proposed in this paper will increase time cost because disorder TCP transmission strategy and boundary identification strategy have to spend extra time in data processing. In Fig. 8, we compare the CUP processing time of standard TCP transmission and disorder TCP transmission proposed in this paper. Each column of the histogram has a dark part and light part, the dark part represents the processing time of the kernel of TCP protocol, the light part is the time used to process voice data in voice terminal. The processing time of traditional TCP is used as unit time in Fig. 8. We can see that in the process of using the method proposed in this paper, the kernel s overhead of disorder TCP protocol stack is basically consistent with that of the standard TCP transmission, the disorder TCP transmission strategy nearly does not affect the kernel s processing time of protocol stack. However, due to the series process of data coding, boundary identification and data decoding in intermediate layer unit, the processing time of voice terminal will increase (2~5 times more than the time cost

7 96 The Journal of China Universities of Posts and Telecommunications 2016 of standard TCP). But the additional time cost will not change a lot in different packet loss rate, and the cost is within reasonable range when compared with the overhead of timeout retransmission mechanism (almost hundreds times more than the processing time of TCP protocol stack). So the method has a very high availability. more convincing. Actually, our method has been accepted by a known communication operator and is under network test now. Acknowledgements This work was supported by the National Natural Science Foundation of China: Research on Differentially Private Frequent Pattern Mining, the National Natural Science Foundation of China: Research on Optical Transport Network Integrated Protection Strategy and Method for High-Speed Railway References Fig. 8 Contrast between standard TCP transmission and disorder TCP transmission on CPU time cost 5 Conclusions In the current Internet environment, the voice packets carried by UDP always encounters such situations, like abandoned by routers and cannot pass through the firewall, which affect the normal communication in UDP-based VoIP system. In this paper, we analyzed the characteristics of voice transmission based on TCP and proposed a novel method to transport voice data using modified TCP. In the method, we presented a disorder TCP transmission strategy and designed a byte stream data boundary identification algorithm to solve the high time delay, jitter and discontinuity problems which introduced by the error control and retransmission mechanism in standard TCP when transmitting voice data. The verification through prototype system demonstrates the method proposed in this paper is effective and practical. Moreover, the comparative experiment with SCPS-TP makes our method 1. Braden R, Clark D, Shenker S. Integrated services in the Internet architecture: an overview. IETF RFC 1633, Kompella K, Lang J P. Procedures for modifying the resource reservation protocol (RSVP). IETF RFC 3936, Yoo H, Yoon J, Lee S, et al. A mobile reservation protocol for video streaming. Proceedings of the 10th International Conference on Advanced Communication Technology (ICACT 08): Vol 3, Feb 17 20, 2008, Phoenix Park, Republic of Korea. Piscataway, NJ, USA: IEEE, 2008: Vishwanath A, Sivaraman V, Rouskas G N. Anomalous loss performance for mixed real-time and TCP traffic in routers with very small buffers. IEEE/ACM Transactions on Networking, 2011, 19(4): Charny A, Bennet J C R, Benson K, et al. Supplemental information for the new definition of the EF PHB (expedited forwarding per-hop behavior). IETF RFC 3247, Cocker E, Ghazzi F, Speidel U, et al. Measurement of buffer requirement trends for real time traffic over TCP. Proceedings of the IEEE 15th International Conference on High Performance Switching and Routing (HPSR 14), Jul 1 4, 2014, Vancouver, Canada. Piscataway, NJ, USA: IEEE, 2014: Wu D, Hou Y T, Zhu W, et al. On end-to-end architecture for transporting MPEG-4 video over the Internet. IEEE Transactions on Circuits and Systems for Video Technology, 2000, 10(6): Park C, Kim H. Short-term reliable protocol for low latency video transmission. Proceedings of the 2014 International Conference on Computational Science and Computational Intelligence (CSCI 14): Vol 2, Mar 10 13, 2014, Las Vegas, NV, USA. Piscataway, NJ, USA: IEEE, 2014, 2: Németh F, Molnár S, Tarján P, et al. TCP limit: a streaming friendly transport protocol. Proceedings of the 4th EURO-NGI Conference on Next Generation Internet Networks (NGI 08), Apr 28 30, 2008, Krakow, Poland. Piscataway, NJ, USA: IEEE, 2008: Evensen K, Petlund A, Griwodz C, et al. Redundant bundling in TCP to reduce perceived latency for time-dependent thin streams. IEEE Communications Letters, 2008, 12(4): (Editor: Wang Xuying)

Network-Adaptive Video Coding and Transmission

Network-Adaptive Video Coding and Transmission Header for SPIE use Network-Adaptive Video Coding and Transmission Kay Sripanidkulchai and Tsuhan Chen Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA 15213

More information

Lecture 13: Transportation layer

Lecture 13: Transportation layer Lecture 13: Transportation layer Contents Goals of transportation layer UDP TCP Port vs. Socket QoS AE4B33OSS Lecture 12 / Page 2 Goals of transportation layer End-to-end communication Distinguish different

More information

Digital Asset Management 5. Streaming multimedia

Digital Asset Management 5. Streaming multimedia Digital Asset Management 5. Streaming multimedia 2015-10-29 Keys of Streaming Media Algorithms (**) Standards (*****) Complete End-to-End systems (***) Research Frontiers(*) Streaming... Progressive streaming

More information

Chapter 5 OSI Network Layer

Chapter 5 OSI Network Layer Chapter 5 OSI Network Layer The protocols of the OSI model Network layer specify addressing and processes that enable Transport layer data to be packaged and transported. The Network layer encapsulation

More information

Delay Constrained ARQ Mechanism for MPEG Media Transport Protocol Based Video Streaming over Internet

Delay Constrained ARQ Mechanism for MPEG Media Transport Protocol Based Video Streaming over Internet Delay Constrained ARQ Mechanism for MPEG Media Transport Protocol Based Video Streaming over Internet Hong-rae Lee, Tae-jun Jung, Kwang-deok Seo Division of Computer and Telecommunications Engineering

More information

A common issue that affects the QoS of packetized audio is jitter. Voice data requires a constant packet interarrival rate at receivers to convert

A common issue that affects the QoS of packetized audio is jitter. Voice data requires a constant packet interarrival rate at receivers to convert A common issue that affects the QoS of packetized audio is jitter. Voice data requires a constant packet interarrival rate at receivers to convert data into a proper analog signal for playback. The variations

More information

Adaptive Data Burst Assembly in OBS Networks

Adaptive Data Burst Assembly in OBS Networks Adaptive Data Burst Assembly in OBS Networks Mohamed A.Dawood 1, Mohamed Mahmoud 1, Moustafa H.Aly 1,2 1 Arab Academy for Science, Technology and Maritime Transport, Alexandria, Egypt 2 OSA Member muhamed.dawood@aast.edu,

More information

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted

More information

Quality of Service in the Internet

Quality of Service in the Internet Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Basics (cont.) Characteristics of data communication technologies OSI-Model

Basics (cont.) Characteristics of data communication technologies OSI-Model 48 Basics (cont.) Characteristics of data communication technologies OSI-Model Topologies Packet switching / Circuit switching Medium Access Control (MAC) mechanisms Coding Quality of Service (QoS) 49

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

Multimedia Networking

Multimedia Networking CMPT765/408 08-1 Multimedia Networking 1 Overview Multimedia Networking The note is mainly based on Chapter 7, Computer Networking, A Top-Down Approach Featuring the Internet (4th edition), by J.F. Kurose

More information

Resource Reservation Protocol

Resource Reservation Protocol 48 CHAPTER Chapter Goals Explain the difference between and routing protocols. Name the three traffic types supported by. Understand s different filter and style types. Explain the purpose of tunneling.

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Quality of Service in the Internet

Quality of Service in the Internet Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Position of IP and other network-layer protocols in TCP/IP protocol suite

Position of IP and other network-layer protocols in TCP/IP protocol suite Position of IP and other network-layer protocols in TCP/IP protocol suite IPv4 is an unreliable datagram protocol a best-effort delivery service. The term best-effort means that IPv4 packets can be corrupted,

More information

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

Transmission Control Protocol. ITS 413 Internet Technologies and Applications Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion

More information

Multimedia Networking

Multimedia Networking Multimedia Networking 1 Multimedia, Quality of Service (QoS): What is it? Multimedia applications: Network audio and video ( continuous media ) QoS Network provides application with level of performance

More information

UNIT 2 TRANSPORT LAYER

UNIT 2 TRANSPORT LAYER Network, Transport and Application UNIT 2 TRANSPORT LAYER Structure Page No. 2.0 Introduction 34 2.1 Objective 34 2.2 Addressing 35 2.3 Reliable delivery 35 2.4 Flow control 38 2.5 Connection Management

More information

Real-Time Protocol (RTP)

Real-Time Protocol (RTP) Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of

More information

A transport-layer approach for achieving predictable throughput for Internet applications

A transport-layer approach for achieving predictable throughput for Internet applications Seventh International Conference on Networking A transport-layer approach for achieving predictable throughput for Internet applications Go Hasegawa, Kana Yamanegi and Masayuki Murata Graduate School of

More information

Performance of Multicast Traffic Coordinator Framework for Bandwidth Management of Real-Time Multimedia over Intranets

Performance of Multicast Traffic Coordinator Framework for Bandwidth Management of Real-Time Multimedia over Intranets Performance of Coordinator Framework for Bandwidth Management of Real-Time Multimedia over Intranets Chin Hooi Tang, and Tat Chee Wan, Member, IEEE ComSoc. Abstract Quality of Service (QoS) schemes such

More information

ETSF10 Internet Protocols Transport Layer Protocols

ETSF10 Internet Protocols Transport Layer Protocols ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.2 Kaan Bür, Jens Andersson Transport Layer Protocols Special Topic: Quality of Service (QoS) [ed.4 ch.24.1+5-6] [ed.5 ch.30.1-2]

More information

Lecture 13: Application layer

Lecture 13: Application layer Lecture 13: Application layer Contents Goals of transportation layer UDP TCP Port vs. Socket QoS AE4B33OSS Lecture 12 / Page 2 Goals of transportation layer End to end communication Distinguish different

More information

QoS in IPv6. Madrid Global IPv6 Summit 2002 March Alberto López Toledo.

QoS in IPv6. Madrid Global IPv6 Summit 2002 March Alberto López Toledo. QoS in IPv6 Madrid Global IPv6 Summit 2002 March 2002 Alberto López Toledo alberto@dit.upm.es, alberto@dif.um.es Madrid Global IPv6 Summit What is Quality of Service? Quality: reliable delivery of data

More information

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK I.J.E.M.S., VOL.2 (3) 211: 163-171 ISSN 2229-6X PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK UTILISATION BY SIMULATION Jai Kumar and U.C. Jaiswal Department of Computer Science and Engineering, Madan

More information

MaVIS: Media-aware Video Streaming Mechanism

MaVIS: Media-aware Video Streaming Mechanism MaVIS: Media-aware Video Streaming Mechanism Sunhun Lee and Kwangsue Chung School of Electronics Engineering, Kwangwoon University, Korea sunlee@adamskwackr and kchung@kwackr Abstract Existing streaming

More information

CS 218 F Nov 3 lecture: Streaming video/audio Adaptive encoding (eg, layered encoding) TCP friendliness. References:

CS 218 F Nov 3 lecture: Streaming video/audio Adaptive encoding (eg, layered encoding) TCP friendliness. References: CS 218 F 2003 Nov 3 lecture: Streaming video/audio Adaptive encoding (eg, layered encoding) TCP friendliness References: J. Padhye, V.Firoiu, D. Towsley, J. Kurose Modeling TCP Throughput: a Simple Model

More information

over the Internet Tihao Chiang { Ya-Qin Zhang k enormous interests from both industry and academia.

over the Internet Tihao Chiang { Ya-Qin Zhang k enormous interests from both industry and academia. An End-to-End Architecture for MPEG-4 Video Streaming over the Internet Y. Thomas Hou Dapeng Wu y Wenwu Zhu z Hung-Ju Lee x Tihao Chiang { Ya-Qin Zhang k Abstract It is a challenging problem to design

More information

Performance of Optical Burst Switching Techniques in Multi-Hop Networks

Performance of Optical Burst Switching Techniques in Multi-Hop Networks Performance of Optical Switching Techniques in Multi-Hop Networks Byung-Chul Kim *, You-Ze Cho *, Jong-Hyup Lee **, Young-Soo Choi **, and oug Montgomery * * National Institute of Standards and Technology,

More information

Advantages and disadvantages

Advantages and disadvantages Advantages and disadvantages Advantages Disadvantages Asynchronous transmission Simple, doesn't require synchronization of both communication sides Cheap, timing is not as critical as for synchronous transmission,

More information

DiffServ Architecture: Impact of scheduling on QoS

DiffServ Architecture: Impact of scheduling on QoS DiffServ Architecture: Impact of scheduling on QoS Abstract: Scheduling is one of the most important components in providing a differentiated service at the routers. Due to the varying traffic characteristics

More information

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Transport Layer Network Fundamentals Chapter 4 Version 4.0 1 Transport Layer Role and Services Transport layer is responsible for overall end-to-end transfer of application data 2 Transport Layer Role

More information

Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on

Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on IP Version 4 (IPv4) Header (Continued) Identification (16 bits): One of the parameters of any network is the maximum transmission unit (MTU) parameter. This parameter specifies the maximum size of the

More information

Continuous Real Time Data Transfer with UDP/IP

Continuous Real Time Data Transfer with UDP/IP Continuous Real Time Data Transfer with UDP/IP 1 Emil Farkas and 2 Iuliu Szekely 1 Wiener Strasse 27 Leopoldsdorf I. M., A-2285, Austria, farkas_emil@yahoo.com 2 Transilvania University of Brasov, Eroilor

More information

CS 457 Multimedia Applications. Fall 2014

CS 457 Multimedia Applications. Fall 2014 CS 457 Multimedia Applications Fall 2014 Topics Digital audio and video Sampling, quantizing, and compressing Multimedia applications Streaming audio and video for playback Live, interactive audio and

More information

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ 1 Lecture 5: Network Layer (cont ) Reference: Chapter 5 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice Hall, 2003. 2

More information

Principles. IP QoS DiffServ. Agenda. Principles. L74 - IP QoS Differentiated Services Model. L74 - IP QoS Differentiated Services Model

Principles. IP QoS DiffServ. Agenda. Principles. L74 - IP QoS Differentiated Services Model. L74 - IP QoS Differentiated Services Model Principles IP QoS DiffServ Differentiated Services Architecture DSCP, CAR Integrated Services Model does not scale well flow based traffic overhead (RSVP messages) routers must maintain state information

More information

ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3

ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3 Research Article ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3 Address for Correspondence 1 Asst. Professor, Department of Electronics

More information

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control Chapter 12 Congestion in Data Networks Effect of Congestion Control Ideal Performance Practical Performance Congestion Control Mechanisms Backpressure Choke Packet Implicit Congestion Signaling Explicit

More information

Network Layer (1) Networked Systems 3 Lecture 8

Network Layer (1) Networked Systems 3 Lecture 8 Network Layer (1) Networked Systems 3 Lecture 8 Role of the Network Layer Application Application The network layer is the first end-to-end layer in the OSI reference model Presentation Session Transport

More information

Internetwork Protocols

Internetwork Protocols Internetwork Protocols Background to IP IP, and related protocols Internetworking Terms (1) Communications Network Facility that provides data transfer service An internet Collection of communications

More information

Square Pegs in a Round Pipe: Wire-Compatible Unordered Delivery In TCP and TLS

Square Pegs in a Round Pipe: Wire-Compatible Unordered Delivery In TCP and TLS Square Pegs in a Round Pipe: Wire-Compatible Unordered Delivery In TCP and TLS Jana Iyengar*, Bryan Ford + Syed Obaid Amin* +, Michael F. Nowlan +, Nabin Tiwari* *Franklin & Marshall College + Yale University

More information

ABSTRACT. that it avoids the tolls charged by ordinary telephone service

ABSTRACT. that it avoids the tolls charged by ordinary telephone service ABSTRACT VoIP (voice over IP - that is, voice delivered using the Internet Protocol) is a term used in IP telephony for a set of facilities for managing the delivery of voice information using the Internet

More information

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK UTILISATION BY SIMULATION WITH DROP-TAIL

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK UTILISATION BY SIMULATION WITH DROP-TAIL I.J.E.M.S., VOL.2 (4) 2011: 221-228 ISSN 2229-600X PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK UTILISATION BY SIMULATION WITH DROP-TAIL Jai Kumar, Jaiswal Umesh Chandra Department of Computer Science

More information

Achieving QOS Guarantee s over IP Networks Using Differentiated Services

Achieving QOS Guarantee s over IP Networks Using Differentiated Services Achieving QOS Guarantee s over IP Networks Using Differentiated Services NagamaniKorada¹, Tatarao vana² ¹M.Tech Student, CSE Department, Raghu Engineering College ² Assistant Professor, CSE Department,

More information

MULTIMEDIA I CSC 249 APRIL 26, Multimedia Classes of Applications Services Evolution of protocols

MULTIMEDIA I CSC 249 APRIL 26, Multimedia Classes of Applications Services Evolution of protocols MULTIMEDIA I CSC 249 APRIL 26, 2018 Multimedia Classes of Applications Services Evolution of protocols Streaming from web server Content distribution networks VoIP Real time streaming protocol 1 video

More information

Data Link Layer Lecture 7

Data Link Layer Lecture 7 Data Link Layer Lecture 7 Recap Physical layer function in a nutshell: Position of the physical layer in TCP/IP Model Services (function) offered by Physical layer Position of the Data-Link Layer in TCP/IP

More information

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Network Layer Network Fundamentals Chapter 5 Version 4.0 1 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most

More information

Network management and QoS provisioning - revise. When someone have to share the same resources is possible to consider two particular problems:

Network management and QoS provisioning - revise. When someone have to share the same resources is possible to consider two particular problems: Revise notes Multiplexing & Multiple Access When someone have to share the same resources is possible to consider two particular problems:. multiplexing;. multiple access. The first one is a centralized

More information

Network Management & Monitoring

Network Management & Monitoring Network Management & Monitoring Network Delay These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) End-to-end

More information

Multimedia! 23/03/18. Part 3: Lecture 3! Content and multimedia! Internet traffic!

Multimedia! 23/03/18. Part 3: Lecture 3! Content and multimedia! Internet traffic! Part 3: Lecture 3 Content and multimedia Internet traffic Multimedia How can multimedia be transmitted? Interactive/real-time Streaming 1 Voice over IP Interactive multimedia Voice and multimedia sessions

More information

Part 3: Lecture 3! Content and multimedia!

Part 3: Lecture 3! Content and multimedia! Part 3: Lecture 3! Content and multimedia! Internet traffic! Multimedia! How can multimedia be transmitted?! Interactive/real-time! Streaming! Interactive multimedia! Voice over IP! Voice and multimedia

More information

INSE 7110 Winter 2009 Value Added Services Engineering in Next Generation Networks Week #2. Roch H. Glitho- Ericsson/Concordia University

INSE 7110 Winter 2009 Value Added Services Engineering in Next Generation Networks Week #2. Roch H. Glitho- Ericsson/Concordia University INSE 7110 Winter 2009 Value Added Services Engineering in Next Generation Networks Week #2 1 Outline 1. Basics 2. Media Handling 3. Quality of Service (QoS) 2 Basics - Definitions - History - Standards.

More information

MIDTERM EXAMINATION #2 OPERATING SYSTEM CONCEPTS U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E

MIDTERM EXAMINATION #2 OPERATING SYSTEM CONCEPTS U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E MIDTERM EXAMINATION #2 OPERATING SYSTEM CONCEPTS 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Intersession 2008 Last Name: First Name: Student ID: PLEASE

More information

Chapter 9. Multimedia Networking. Computer Networking: A Top Down Approach

Chapter 9. Multimedia Networking. Computer Networking: A Top Down Approach Chapter 9 Multimedia Networking A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

Multimedia Networking

Multimedia Networking CE443 Computer Networks Multimedia Networking Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought by

More information

Internet Services & Protocols. Quality of Service Architecture

Internet Services & Protocols. Quality of Service Architecture Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Quality of Service Architecture Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail:

More information

Week-12 (Multimedia Networking)

Week-12 (Multimedia Networking) Computer Networks and Applications COMP 3331/COMP 9331 Week-12 (Multimedia Networking) 1 Multimedia: audio analog audio signal sampled at constant rate telephone: 8,000 samples/sec CD music: 44,100 samples/sec

More information

Multimedia in the Internet

Multimedia in the Internet Protocols for multimedia in the Internet Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ > 4 4 3 < 2 Applications and protocol stack DNS Telnet

More information

Tutorial 2 : Networking

Tutorial 2 : Networking Lund University ETSN01 Advanced Telecommunication Tutorial 2 : Networking Author: Emma Fitzgerald Tutor: Farnaz Moradi November 26, 2015 Contents I Before you start 3 II Whole Class Exercise: Networking

More information

Information Network Systems The network layer. Stephan Sigg

Information Network Systems The network layer. Stephan Sigg Information Network Systems The network layer Stephan Sigg Tokyo, November 1, 2012 Error-detection and correction Decoding of Reed-Muller codes Assume a second order (16, 11) code for m = 4. The r-th order

More information

Comparison Study of Transmission Control Protocol and User Datagram Protocol Behavior over Multi-Protocol Label Switching Networks in Case of Failures

Comparison Study of Transmission Control Protocol and User Datagram Protocol Behavior over Multi-Protocol Label Switching Networks in Case of Failures Journal of Computer Science 5 (12): 1042-1047, 2009 ISSN 1549-3636 2009 Science Publications Comparison Study of Transmission Control Protocol and User Datagram Protocol Behavior over Multi-Protocol Label

More information

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6. Transport Layer 6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6.1 Internet Transport Layer Architecture The

More information

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University

More information

Seamless Traffic Migration between the Mobile and Fixed Networks

Seamless Traffic Migration between the Mobile and Fixed Networks Data Traffic Migration Seamless Traffic Migration between the Mobile and Fixed Networks We have developed traffic migration technology for distributing communication traffic from mobile networks to fixed

More information

RECOMMENDATION ITU-R BT.1720 *

RECOMMENDATION ITU-R BT.1720 * Rec. ITU-R BT.1720 1 RECOMMENDATION ITU-R BT.1720 * Quality of service ranking and measurement methods for digital video broadcasting services delivered over broadband Internet protocol networks (Question

More information

Understanding SROS Priority Queuing, Class-Based WFQ, and QoS Maps

Understanding SROS Priority Queuing, Class-Based WFQ, and QoS Maps Configuration Guide 5991-2121 May 2006 Understanding SROS Priority Queuing, Class-Based WFQ, and QoS Maps This Configuration Guide explains the concepts behind configuring your Secure Router Operating

More information

RD-TCP: Reorder Detecting TCP

RD-TCP: Reorder Detecting TCP RD-TCP: Reorder Detecting TCP Arjuna Sathiaseelan and Tomasz Radzik Department of Computer Science, King s College London, Strand, London WC2R 2LS {arjuna,radzik}@dcs.kcl.ac.uk Abstract. Numerous studies

More information

Lixia Zhang M. I. T. Laboratory for Computer Science December 1985

Lixia Zhang M. I. T. Laboratory for Computer Science December 1985 Network Working Group Request for Comments: 969 David D. Clark Mark L. Lambert Lixia Zhang M. I. T. Laboratory for Computer Science December 1985 1. STATUS OF THIS MEMO This RFC suggests a proposed protocol

More information

Quality of Service II

Quality of Service II Quality of Service II Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline Common QoS Approaches Best Effort Integrated Services Differentiated Services Integrated Services Integrated

More information

Part1: Lecture 4 QoS

Part1: Lecture 4 QoS Part1: Lecture 4 QoS Last time Multi stream TCP: SCTP Multi path TCP RTP and RTCP SIP H.323 VoIP Router architectures Overview two key router functions: run routing algorithms/protocol (RIP, OSPF, BGP)

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Network Management & Monitoring Network Delay

Network Management & Monitoring Network Delay Network Management & Monitoring Network Delay These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) End-to-end

More information

On Network Dimensioning Approach for the Internet

On Network Dimensioning Approach for the Internet On Dimensioning Approach for the Internet Masayuki Murata ed Environment Division Cybermedia Center, (also, Graduate School of Engineering Science, ) e-mail: murata@ics.es.osaka-u.ac.jp http://www-ana.ics.es.osaka-u.ac.jp/

More information

2 RTP Encapsulation and its Application in NS-2 Simulation

2 RTP Encapsulation and its Application in NS-2 Simulation 3rd International Conference on Multimedia Technology(ICMT 2013) RTP Encapsulation for Scalable Video Stream and its Application in NS-2 Simulation Zhou Ying, Zhang Jihong, Liu Wei Abstract. Real-time

More information

Transport Over IP. CSCI 690 Michael Hutt New York Institute of Technology

Transport Over IP. CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP What is a transport protocol? Choosing to use a transport protocol Ports and Addresses Datagrams UDP What is a

More information

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols Integrated services Reading: S. Keshav, An Engineering Approach to Computer Networking, chapters 6, 9 and 4 Module objectives Learn and understand about: Support for real-time applications: network-layer

More information

Quality of Service (QoS) Whitepaper

Quality of Service (QoS) Whitepaper Quality of Service (QoS) Whitepaper PCS-Series Videoconferencing White Paper www.sonybiz.net/vc Introduction Currently, an estimated 5% of data packets sent over the Internet are lost. In a videoconferencing

More information

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

CCNA 1 Chapter 7 v5.0 Exam Answers 2013 CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the

More information

Stream Control Transmission Protocol

Stream Control Transmission Protocol Chapter 13 Stream Control Transmission Protocol Objectives Upon completion you will be able to: Be able to name and understand the services offered by SCTP Understand SCTP s flow and error control and

More information

The aim of this unit is to review the main concepts related to TCP and UDP transport protocols, as well as application protocols. These concepts are

The aim of this unit is to review the main concepts related to TCP and UDP transport protocols, as well as application protocols. These concepts are The aim of this unit is to review the main concepts related to TCP and UDP transport protocols, as well as application protocols. These concepts are important requirements for developing programs that

More information

Transport layer issues

Transport layer issues Transport layer issues Dmitrij Lagutin, dlagutin@cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks, 28.3.2007 Contents Issues in designing a transport layer protocol for ad hoc

More information

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print, ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure

More information

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Leaky Bucket Algorithm

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Leaky Bucket Algorithm Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

CS519: Computer Networks. Lecture 2: Feb 2, 2004 IP (Internet Protocol)

CS519: Computer Networks. Lecture 2: Feb 2, 2004 IP (Internet Protocol) : Computer Networks Lecture 2: Feb 2, 2004 IP (Internet Protocol) A hypothetical service You want a mail delivery service You have two choices: Acme Guaranteed Mail Delivery Service We never fail Rocko

More information

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control Chapter 6 What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control OSI Model Hybrid Model Software outside the operating system Software inside

More information

Reliable Mobile IP Multicast Based on Hierarchical Local Registration

Reliable Mobile IP Multicast Based on Hierarchical Local Registration Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Reliable Mobile IP Multicast Based on Hierarchical Local Registration Huanming ZHANG, * Quanlong GUAN, Zi Zhao ZHU, Weiqi

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

CSCI-GA Operating Systems. Networking. Hubertus Franke

CSCI-GA Operating Systems. Networking. Hubertus Franke CSCI-GA.2250-001 Operating Systems Networking Hubertus Franke frankeh@cs.nyu.edu Source: Ganesh Sittampalam NYU TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute

More information

4.0.1 CHAPTER INTRODUCTION

4.0.1 CHAPTER INTRODUCTION 4.0.1 CHAPTER INTRODUCTION Data networks and the Internet support the human network by supplying seamless, reliable communication between people - both locally and around the globe. On a single device,

More information

Double Feedback Streaming Agent for Real-time Delivery of Media over 3G Wireless Networks

Double Feedback Streaming Agent for Real-time Delivery of Media over 3G Wireless Networks Double Feedback Streaming Agent for Real-time Delivery of Media over 3G Wireless Networks Gene Cheung, Wai-Tian Tan Hewlett-Packard Laboratories Takeshi Yoshimura NTT DoCoMo, Inc. Abstract A network agent

More information

CSC 4900 Computer Networks: Multimedia Applications

CSC 4900 Computer Networks: Multimedia Applications CSC 4900 Computer Networks: Multimedia Applications Professor Henry Carter Fall 2017 Last Time What is a VPN? What technology/protocol suite is generally used to implement them? How much protection does

More information

Robust Header Compression (RoHC) over Multiprotocol Label Switching (MPLS) Networks

Robust Header Compression (RoHC) over Multiprotocol Label Switching (MPLS) Networks Computer Science Mohammad Ahsan Chishti / Shaima Quershi / Ajaz Hussain Mir Robust Header Compression (RoHC) over Multiprotocol Label Switching (MPLS) Networks Bibliographic information published by the

More information

Congestion Control and Resource Allocation

Congestion Control and Resource Allocation Problem: allocating resources Congestion control Quality of service Congestion Control and Resource Allocation Hongwei Zhang http://www.cs.wayne.edu/~hzhang The hand that hath made you fair hath made you

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAGE COMPRESSION STANDARDS Lesson 19 JPEG-2000 Error Resiliency Instructional Objectives At the end of this lesson, the students should be able to: 1. Name two different types of lossy

More information

Effect of TCP and UDP Parameters on the quality of Video streaming delivery over The Internet

Effect of TCP and UDP Parameters on the quality of Video streaming delivery over The Internet Effect of TCP and UDP Parameters on the quality of Video streaming delivery over The Internet MAZHAR B. TAYEL 1, ASHRAF A. TAHA 2 1 Electrical Engineering Department, Faculty of Engineering 1 Alexandria

More information

Analyzing the Receiver Window Modification Scheme of TCP Queues

Analyzing the Receiver Window Modification Scheme of TCP Queues Analyzing the Receiver Window Modification Scheme of TCP Queues Visvasuresh Victor Govindaswamy University of Texas at Arlington Texas, USA victor@uta.edu Gergely Záruba University of Texas at Arlington

More information