T Computer Networks II. Transport Issues Contents. TCP and UDP. Congestion Prevention. Motivation for Congestion Control

Size: px
Start display at page:

Download "T Computer Networks II. Transport Issues Contents. TCP and UDP. Congestion Prevention. Motivation for Congestion Control"

Transcription

1 T Computer Networks II Transport Issues Contents Transport Layer Overview Congestion Control TCP, TCP improvements, TCP and wireless Stream Control Transmission Protocol (SCTP) Datagram Congestion Protocol (DCCP) TLS and DTLS Prof. Sasu Tarkoma Transport Layer Overview TCP and UDP TCP congestion control principles introduced in late 1980s Not part of the original transport layer functionality Important design factor in today s Internet protocol development Important issues Preventing congestion collapse Fairness Transmission Control Protocol Connection oriented RFC 793 User Datagram Protocol (UDP) Connectionless RFC 768 Motivation for Congestion Control Congestion Prevention UDP used instead of TCP by applications that prefer timeliness over reliability UDP does not have congestion control A problem with long-lived flows and traffic intensive flows (streaming video, audio, internet telephony) Greater use increases risk of congestion collapse Congestion control mechanisms refers to techniques and mechanisms that can either prevent congestion, before it happens, or remove congestion, after it has happened open-loop congestion control (prevention) and closed loop congestion control (removal) Transmission rate must be reduced when congestion is detected Responsibility of transport layer, i.e., the sending end host Packet loss is assumed to be congestion signal No deployed explicit congestion notification scheme At most one congestion action / round-trip time Burst of packet losses can be indication of same congestion situation 1

2 Fairness Solutions Transport implementations must be fair to other flows Transmission rate should be roughly similar to that of TCP Components of TCP-friendly congestion control Slow-start Additive Increase, Multiplicative Decrease (AIMD) Retransmission timers relative to round-trip time Implement congestion control below UDP: too low Above UDP: implement congestion control at application level Reinventing the wheel each time Complex, might not be done correctly New protocol more interoperable than a user-level library In transport layer: modification of TCP, UDP, RTP, SCTP More complex protocols Not general enough Introduces a fundamental change Current trend: new transport protocols, namely DCCP and SCTP TCP Reliable Cumulative acknowledgements Fast retransmit / fast recovery Reno [RFC 2581], NewReno [RFC 3782] Retransmission timeouts [RFC 2988] Stream-oriented no concept of datagram boundaries ideal for transferring files transferring series of structured messages more difficult TCP Services Reliable communication between pairs of processes Across variety of reliable and unreliable networks and internets Two labeling facilities Data stream push TCP user can require transmission of all data up to push flag Receiver will deliver in same manner Avoids waiting for full buffers Urgent data signal Indicates urgent data is upcoming in stream User decides how to handle it TCP Header Source: William Stallings, Data and Computer Communications, Chapter 17. TCP Mechanisms Connection establishment Between ports Three way handshake Data transfer service Stream of octets Octets numbered modulo 2 23 Flow control by credit allocation of number of octets Data buffered at sender and receiver Connection termination Graceful close Transport entity sets FIN flag on last segment sent Abrupt termination by ABORT primitive 2

3 Congestion Control Exponential RTO Backoff RFC 1122, Requirements for Internet hosts Retransmission timer management Estimate round trip delay by observing pattern of delay Set time to value somewhat greater than estimate Simple average Exponential average RTT Variance Estimation (Jacobson s algorithm) Since timeout is probably due to congestion (dropped packet or long round trip), constant RTO is not good idea RTO increased each time a segment is re-transmitted RTO = q*rto Commonly q=2 Binary exponential backoff Retransmission Mechanism TCP receiver acknowledges next sequence number it expects to receive If receiver gets packet out of order it acknowledges same sequence number than earlier When sender receives 3 duplicate acknowledgements it considers the first unacknowledged segment lost Congestion response: reduce the congestion window by half Retransmit the first unacknowledged segment If no acknowledgements arrive for time RTO, sender retransmits the first unacknowledged segment Reset window to one segment Karn s Algorithm If a segment is re-transmitted, the ACK arriving may be: For the first copy of the segment RTT longer than expected For second copy No way to tell Do not measure RTT for re-transmitted segments Calculate backoff when re-transmission occurs Use backoff RTO until ACK arrives for segment that has not been re-transmitted Window Management Slow start awnd = MIN[credit, cwnd] Start connection with cwnd=1 Increment cwnd at each ACK, to some max Dynamic windows sizing on congestion When a timeout occurs Set slow start threshold to half current congestion window ssthresh=cwnd/2 Set cwnd = 1 and slow start until cwnd=ssthresh Increasing cwnd by 1 for every ACK For cwnd >=ssthresh, increase cwnd by 1 for each RTT Congestion Example Source: 3

4 Congestion avoidance TCP timers Source: Source: TCP Congestion Summary Source: TCP Summary and Improvements Concepts: Congestion window, round-trip time, retransmission timeout, duplicate acknowledgement (triggered by out of order segment) Congestion control Packet loss as a signal, reduce rate Fairness Transport implementations must be fair to other flows Retransmission mechanism Selective acknowledgements (SACK), RFC 2018 Additional information about holes in sequence number space Limited transmit & early retransmit, timestamps TCP Problems Minimal information from cumulative acknowledgements Problems in environments with frequent packet losses (wireless) Small window and packet retransmissions May prevent fast retransmit from working Retransmission ambiguity -- is ACK for original or retransmit? Hinders the round-trip time measurement Unnecessary retransmissions Unnecessary use of bandwidth (sometimes expensive in wireless) SACK Additional information about holes in sequence number space TCP option that reports discontinuous blocks of received data Sender gets better information about which segments are lost Allows more efficient retransmissions Without SACK sender can retransmit only one segment in round-trip time With SACK more retransmissions can be made in a round-trip time Allows more efficient tracking of number of outstanding segments SACK option specified in RFC 2018 SACK-based retransmission algorithm specified in RFC

5 Timestamps Specified in RFC 1323 TCP option for sender to include timestamp in every packet TCP receiver echoes the timestamp back to sender Retransmissions have different timestamp than original Allows round-trip time measurement for retransmitted segments Not allowed without timestamps Allows detection of spurious retransmissions [Ludwig00] Allows protection against wrapped sequence numbers Queue Management Simple router implementation drops packet when queue is full Lock-out: Sometimes few flows get to dominate most of queue space Queue delay: Long packet queues increase transmission delays Active Queue Management marks packets before queue is full Random Early Detection (RED) [Floyd93] Mark a packet at probability P when queue length is more than L Marks are distributed more evenly between flows Explicit Congestion Notification TCP Evolution Sender marks a bit in IP header if transport is ECN capable Routers to indicate congestion with a congestion bit in IP header Used with Active Queue Management Reduces the number of packet losses Transport layer receiver echoes congestion notification to sender In transport header When receiving notification, sender reduces its transmission rate Implemented in many end-hosts, but not too many routers Nagel s algorithm Three-way handshake to reduce overhead 1987 Raymond Tomlinson of small packets; Karn s algorithm In SIGCOMM 75 predicts congestion to better estimate collapse round-trip time 1983 BSD Unix supports TCP/IP Congestion Van Jacobson s TCP described by collapse algorithms Vint Cerf and Bob Kahn observed congestion avoidance and In IEEE Trans Comm 1982 congestion control TCP & IP (most implemented in RFC 793 & 791 BSD Tahoe) SYN Cookies Client sends SYN packet and ACK number to server waits for SYN-ACK from server w/ matching ACK number Server responds w/ SYN-ACK packet w/ initial SYN-cookie sequence number Sequence number is cryptographically generated value based on client address, port, and time. Client sends ACK to server w/ matching sequence number SYN ack-number SYN-ACK seq-number as SYN-cookie, ack-number NO BUFFER ALLOCATED ACK seq_number ack-number+data SYN-ACK seq-number, ack-number TCP BUFFER ALLOCATED Stream Control Transmission Protocol (SCTP) 5

6 SCTP Stream Control Transmission Protocol (SCTP) Specified in RFC 2960 Additional features to TCP Preservation of message boundaries Support for multiple streams Support for multi-homing Packets consist of chunks: INIT, SACK, HEARBEAT, DATA, ABORT, SHUTDOWN, ERROR, and AUTH Partial reliability Retransmissions until abort Extended Socket API (bind(), context data with sendmsg()) Suitable for signalling traffic Challenges with middleboxes Motivation TCP, UDP do not satisfy all application needs SCTP evolved from work on IP telephony signaling Proposed IETF standard (RFC 2960) Like TCP, it provides reliable, full-duplex connections Unlike TCP and UDP, it offers new delivery options that are particularly desirable for telephony signaling and multimedia applications TCP + features Congestion control similar; some optional mechanisms mandatory Two basic types of enhancements: performance robustness Comparison Services/Features SCTP TCP UDP Full-duplex data transmission yes yes yes Connection-oriented yes yes no Reliable data transfer yes yes no Unreliable data transfer yes no yes Partially reliable data transfer yes no no Ordered data delivery yes yes no Unordered data delivery yes no yes Flow and Congestion Control yes yes no ECN support yes yes no Selective acks yes yes no Preservation of message boundaries yes no yes Application data fragmentation yes yes no Multistreaming yes no no Multihoming yes no no Protection agains SYN flooding attack yes no n/a Half-closed connections no yes n/a Packet format Unlike TCP, SCTP provides message-oriented data delivery service key enabler for performance enhancements Common header; three basic functions: Source and destination ports together with the IP addresses Verification tag Checksum: CRC-32 instead of Adler-32 followed by one or more chunks chunk header that identifies length, type, and any special flags concatenated building blocks containg either control or data information control chunks transfer information needed for association (connection) functionality and data chunks carry application layer data. Current spec: 14 different Control s for association establishment, termination, ACK, destination failure recovery, ECN, and error reporting Packet can contain several different chunk types Decoupling of reliable and ordered delivery Unordered delivery: eliminate head-of-line blocking delay TCP receiver buffer Performance App waits 1 Application Level Framing Support for multiple data streams (per-stream ordered delivery) - Stream sequence number (SSN) preserves order within streams - no order preserved between streams - per-stream flow control, per-association congestion control Multiple Data Streams Application may use multiple logical data streams e.g. pictures in a web browser Common solution: multiple TCP connections separate flow / congestion control, overhead (connection setup/teardown,..) App stream 1 TCP sender TCP receiver App 1 waits App stream

7 Multihoming TCP connection is equivalent to SCTP association 2 IP addresses, 2 port numbers 2 sets of IP addresses, 2 port numbers Goal: robustness automatically switch hosts upon failure eliminates effect of long routing reconvergence time TCP: no guarantee for keepalive messages when connection idle SCTP monitors each destination's reachability via ACKs of data chunks and heartbeat chunks SCTP uses multihoming for redundancy, not for load balancing Association phases Association establishment: 4-way handshake Host A sends INIT chunk to Host B Host B returns INIT-ACK containing a cookie information that only Host B can verify No memory is allocated at this point (prevents DoS) Host A replies with COOKIE-ECHO chunk; may contain A's first data. Host B checks validity of cookie; association is established Data transfer SCTP assigns each chunk a unique Transmission Sequence Number (TSN) SCTP peers exchange starting TSN values during association establishment phase Message oriented data delivery; fragmented if larger than destination path MTU Reliability through acks, retransmissions, and end-to-end checksum Association shutdown: 3-way handshake SHUTDOWN SHUTDOWN-ACK SHUTDOWN-COMPLETE Does not allow half-closed connections Motivation Datagram Congestion Control Protocol (DCCP) Some apps want unreliable, timely delivery For example: VoIP UDP: no congestion control Unresponsive long-lived applications endanger others (congestion collapse) may hinder themselves (queuing delay, loss,..) Implementing congestion control is difficult may require precise timers; should be placed in kernel DCCP Datagram Congestion Control Protocol (DCCP) Unreliable datagram-oriented protocol (RFC 4340) UDP with congestion control Connection-oriented, requires connection state machine Congestion control requires ack mechanism and sequence numbers Negotiable features and options Checksums, congestion control parameters Some features: partial checksums, service codes Suitable for long-lived non-reliable flows Challenges with middleboxes DCCP Requirements DCCP was designed for time-sensitive applications Application requirements: Choice of congestion control mechanism: TFRC vs. TCP-like Buffering control: do not deliver old data Low per-packet overhead Additional features Explicit Congestion Notification (ECN): mark congested packets NAT and firewall support: TCP-style explicit connection setup and teardown 7

8 DCCP Requirements Half connections Well-known features from TCP and UDP: Port numbers, checksums, sequence numbers (with difficulty), acks (congestion and ECN info), piggybacked acks Three-way handshake to set up, two-way with wait to tear down New features: Negotiate congestion control mechanism and parameters on setup Two half-connections (A B, B A) Based on observation that traffic is typically asymmetric It follows that separation is useful Different routes implies different congestion issues Each half connection has own congestion control mechanism and parameters Better than two one-way connections Works better with firewalls and NAT Can piggyback acks with data DCCP Feature Selection Issues with Acknowledgements (ACKs) Reliable feature selection: A: change(f, α) B: confirm(f, α) / prefer(f, β) [A: confirm(f, β) ] Selection for both half-connections done in parallel at startup Generic, extensible Acks must be at least partially reliable TCP-style cumulative acks won t work, so must ack everything (ack vector) But ack state at receiver may grow without bound! So sender occasionally acks the receiver s acks Receiver can throw away state for that ack Acks take up sequence number space Useful: can be used to detect reverse-path congestion Packet Structure Plug n n Play Congestion Control Basic packet similar to UDP Small (12 bytes) Extensible for additional features instead of using a fixedlength flag field CC mechanism and parameters (both ways) chosen during connection setup Currently two mechanisms: TFRC (control equation) TCP-like (TCP with tweaked parameters) Can add more later Source Port Dest Port Data Offset CCVal CsCov Checksum Type X # NDP Sequence Number

9 Partial checksums Checksum covers DCCP header and (optionally) any number of bytes into payload Allows delivery of some damaged data May be useful on error-prone links (eg. wireless) Drawbacks: Might conflict with IP-level authentication (eg. IPSec s AH) When is a packet received? TCP: acked packets must be delivered to application DCCP: acked packet might be dropped from application s queue (apps might favour new data over old) Ack means received and placed into application queue Security TLS and DTLS Assumption: hijacker cannot snoop packets Start session at random sequence number Sliding valid sequence number window, hijacker cannot throw in random packet If out-of-window packet received, ask sender if it s correct and tell them what receiver s window is This allows windows to be resynchronised ECN nonce in packets to prevent misbehaving receiver DOS attacks TCP-style init cookies, avoid saving state at the server Motivation History Why not use IPsec? Better suited for host-host security, than application-application security Runs in the kernel Non-uniform IPsec API s Complicated, inter-operability issues Key exchange complicated TLS is the de facto transport layer security protocol Datagram TLS SSL 1.0 Internal Netscape design, early 1994? SSL 2.0 Published by Netscape, November 1994 SSL 3.0 Designed by Netscape and Paul Kocher, November 1996 TLS 1.0 Internet standard based on SSL 3.0, January 1999 Not interoperable with SSL 3.0 9

10 TLS Basics TLS Handshake Protocol TLS consists of two protocols Handshake protocol Use public-key cryptography to establish a shared secret key between the client and the server Record protocol Use the secret key established in the handshake protocol to protect communication between the client and the server Two parties: client and server Negotiate version of the protocol and the set of cryptographic algorithms to be used Interoperability between different implementations of the protocol Authenticate client and server (optional) Use digital certificates to learn each other s public keys and verify each other s identity Use public keys to establish a shared secret Handshake Protocol Structure Abbreviated Handshake Client Client ClientHello [Certificate], ClientKeyExchange, [CertificateVerify] ServerHello, [Certificate], [ServerKeyExchange], [CertificateRequest], ServerHelloDone Server Server The handshake protocol may be executed in an abbreviated form to resume a previously established session No authentication, key material not exchanged Session resumed from an old state switch to negotiated cipher Finished switch to negotiated cipher Finished Datagram Transport Layer Security (DTLS) Datagram TLS (DTLS) is a new protocol defined in RFC4347 Can be used on top of unreliable transport protocols such as UDP OpenSSL RFC4347 refers to the TLS specification and specifies only the differences to TLS Replay protection with an explicit sequence number that is included in the record header, since message reordering, message duplication and message loss are possible Protection against Denial-of-Service attacks DTLS supports protection against DoS attacks with cookies similar to IKEv2 Comparison Scope of the protection TLS operates end-to-end between two applications IPSec can operate end-to-end between two hosts, middle-to-middle TLS protects only the payload of the application. It does not protect the transport header. It does not protect the IP header. IPSec protects the application payload, the transport header and the IP header TLS is used to establish a secure channel, which can protect several subsequent TCP connections IPSec can be used to protect several data flows between two hosts A and B. 10

11 Comparison II Sequence numbers for replay protection Both protocols provide replay protection In TLS the sequence number is not carried explicitly, since a reliable transport is assumed with TCP. In AH/ESP the sequence number is carried explicitly in the AH/ESP header In DTLS, the sequence number is carried explicitly as well, since no reliable transport is assumed Protection against DoS attacks IKEv2 provides protection against DoS attacks using cookies TLS does not provide protection against DoS attacks, since it runs on top of TCP DTLS provides DoS protection using cookies, similar to IKEv2 Comparison III Administrative issues The configuration of IPSec policies on a host or a router requires administrative access (e.g. root) TLS on the contrary can be used by any application and does not require administrative access Administrative issues: Issues with firewalls and NATs IPSec has incompatibility issues with middleboxes such as firewalls and NATs, since such devices examine and possibly manipulate the IP header and the transport header TLS can operate well in the presence of firewalls and NATs (as long as the port numbers used by the application are not blocked by the firewall), since the IP header and the transport header are not modified by TLS 11

Chapter 24. Transport-Layer Protocols

Chapter 24. Transport-Layer Protocols Chapter 24. Transport-Layer Protocols 23.1 Introduction 23.2 User Datagram Protocol 23.3 Transmission Control Protocol 23.4 SCTP Computer Networks 24-1 Position of Transport-Layer Protocols UDP is an unreliable

More information

TCP/IP Protocol Suite 1

TCP/IP Protocol Suite 1 TCP/IP Protocol Suite 1 Stream Control Transmission Protocol (SCTP) TCP/IP Protocol Suite 2 OBJECTIVES: To introduce SCTP as a new transport-layer protocol. To discuss SCTP services and compare them with

More information

Transport Protocols and TCP

Transport Protocols and TCP Transport Protocols and TCP Functions Connection establishment and termination Breaking message into packets Error recovery ARQ Flow control Multiplexing, de-multiplexing Transport service is end to end

More information

Announcements Computer Networking. Outline. Transport Protocols. Transport introduction. Error recovery & flow control. Mid-semester grades

Announcements Computer Networking. Outline. Transport Protocols. Transport introduction. Error recovery & flow control. Mid-semester grades Announcements 15-441 Computer Networking Lecture 16 Transport Protocols Mid-semester grades Based on project1 + midterm + HW1 + HW2 42.5% of class If you got a D+,D, D- or F! must meet with Dave or me

More information

Stream Control Transmission Protocol

Stream Control Transmission Protocol Chapter 13 Stream Control Transmission Protocol Objectives Upon completion you will be able to: Be able to name and understand the services offered by SCTP Understand SCTP s flow and error control and

More information

Transport Protocols & TCP TCP

Transport Protocols & TCP TCP Transport Protocols & TCP CSE 3213 Fall 2007 13 November 2007 1 TCP Services Flow control Connection establishment and termination Congestion control 2 1 TCP Services Transmission Control Protocol (RFC

More information

CE693 Advanced Computer Networks

CE693 Advanced Computer Networks CE693 Advanced Computer Networks Review 2 Transport Protocols Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are obtained

More information

Lecture 3: The Transport Layer: UDP and TCP

Lecture 3: The Transport Layer: UDP and TCP Lecture 3: The Transport Layer: UDP and TCP Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 3-1 The Transport Layer Provides efficient and robust end-to-end

More information

Outline Computer Networking. Functionality Split. Transport Protocols

Outline Computer Networking. Functionality Split. Transport Protocols Outline 15-441 15 441 Computer Networking 15-641 Lecture 10: Transport Protocols Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15 441 F17 Transport introduction TCP connection establishment

More information

Transport Protocols and TCP: Review

Transport Protocols and TCP: Review Transport Protocols and TCP: Review CSE 6590 Fall 2010 Department of Computer Science & Engineering York University 1 19 September 2010 1 Connection Establishment and Termination 2 2 1 Connection Establishment

More information

Announcements Computer Networking. What was hard. Midterm. Lecture 16 Transport Protocols. Avg: 62 Med: 67 STD: 13.

Announcements Computer Networking. What was hard. Midterm. Lecture 16 Transport Protocols. Avg: 62 Med: 67 STD: 13. Announcements 15-441 Computer Networking Lecture 16 Transport Protocols Mid-semester grades Based on (ckpt 1 & ckpt2) + midterm + HW1 + HW2 NOTE: GRADES DO NOT REFLECT LATE PENALTIES! 25.4% of class If

More information

Transport layer. UDP: User Datagram Protocol [RFC 768] Review principles: Instantiation in the Internet UDP TCP

Transport layer. UDP: User Datagram Protocol [RFC 768] Review principles: Instantiation in the Internet UDP TCP Transport layer Review principles: Reliable data transfer Flow control Congestion control Instantiation in the Internet UDP TCP 1 UDP: User Datagram Protocol [RFC 768] No frills, bare bones Internet transport

More information

Transport layer. Review principles: Instantiation in the Internet UDP TCP. Reliable data transfer Flow control Congestion control

Transport layer. Review principles: Instantiation in the Internet UDP TCP. Reliable data transfer Flow control Congestion control Transport layer Review principles: Reliable data transfer Flow control Congestion control Instantiation in the Internet UDP TCP 1 UDP: User Datagram Protocol [RFC 768] No frills, bare bones Internet transport

More information

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

Transmission Control Protocol. ITS 413 Internet Technologies and Applications Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Datagram Congestion Control Protocol (DCCP)

Datagram Congestion Control Protocol (DCCP) Datagram Congestion Control Protocol (DCCP) Chung, Kwangsue kchung@kw.ac.kr June, 2003 1 Contents Introduction & Motivation DCCP Mechanisms Current Issues & Implementations 2 DCCP: Introduction & Motivation

More information

TCP Basics : Computer Networking. Overview. What s Different From Link Layers? Introduction to TCP. TCP reliability Assigned reading

TCP Basics : Computer Networking. Overview. What s Different From Link Layers? Introduction to TCP. TCP reliability Assigned reading TCP Basics 15-744: Computer Networking TCP reliability Assigned reading [FF96] Simulation-based Comparisons of Tahoe, Reno, and SACK TCP L-9 TCP Basics 2 Key Things You Should Know Already Port numbers

More information

ETSF05/ETSF10 Internet Protocols Transport Layer Protocols

ETSF05/ETSF10 Internet Protocols Transport Layer Protocols ETSF05/ETSF10 Internet Protocols Transport Layer Protocols 2016 Jens Andersson Transport Layer Communication between applications Process-to-process delivery Client/server concept Local host Normally initialiser

More information

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 25, 2018

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 25, 2018 CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet IP

More information

Outline. History Introduction Packets Association/ Termination Data Transmission concepts Multihoming Streams

Outline. History Introduction Packets Association/ Termination Data Transmission concepts Multihoming Streams Outline History Introduction Packets Association/ Termination Data Transmission concepts Multihoming Streams 1 History Developed by IETF SIGTRAN working group (Internet Engineering Task Force) (SIGnaling

More information

ECE 435 Network Engineering Lecture 10

ECE 435 Network Engineering Lecture 10 ECE 435 Network Engineering Lecture 10 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 28 September 2017 Announcements HW#4 was due HW#5 will be posted. midterm/fall break You

More information

Transport Over IP. CSCI 690 Michael Hutt New York Institute of Technology

Transport Over IP. CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP What is a transport protocol? Choosing to use a transport protocol Ports and Addresses Datagrams UDP What is a

More information

Stream Control Transmission Protocol (SCTP)

Stream Control Transmission Protocol (SCTP) Stream Control Transmission Protocol (SCTP) Definition Stream control transmission protocol (SCTP) is an end-to-end, connectionoriented protocol that transports data in independent sequenced streams. SCTP

More information

Lecture 4: Congestion Control

Lecture 4: Congestion Control Lecture 4: Congestion Control Overview Internet is a network of networks Narrow waist of IP: unreliable, best-effort datagram delivery Packet forwarding: input port to output port Routing protocols: computing

More information

User Datagram Protocol (UDP):

User Datagram Protocol (UDP): SFWR 4C03: Computer Networks and Computer Security Feb 2-5 2004 Lecturer: Kartik Krishnan Lectures 13-15 User Datagram Protocol (UDP): UDP is a connectionless transport layer protocol: each output operation

More information

Outline. User Datagram Protocol (UDP) Transmission Control Protocol (TCP) Transport layer (cont.) Transport layer. Background UDP.

Outline. User Datagram Protocol (UDP) Transmission Control Protocol (TCP) Transport layer (cont.) Transport layer. Background UDP. Outline User Datagram Protocol (UDP) Transmission Control Protocol (TCP) Matti Siekkinen 22.09.2009 Background UDP Role and Functioning TCP Basics Error control Flow control Congestion control Transport

More information

Transport Layer. The transport layer is responsible for the delivery of a message from one process to another. RSManiaol

Transport Layer. The transport layer is responsible for the delivery of a message from one process to another. RSManiaol Transport Layer Transport Layer The transport layer is responsible for the delivery of a message from one process to another Types of Data Deliveries Client/Server Paradigm An application program on the

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

Transport Layer (Congestion Control)

Transport Layer (Congestion Control) Transport Layer (Congestion Control) Where we are in the Course Moving on up to the Transport Layer! Application Transport Network Link Physical CSE 461 University of Washington 2 Congestion Collapse Congestion

More information

Chapter 3 outline. 3.5 Connection-oriented transport: TCP. 3.6 Principles of congestion control 3.7 TCP congestion control

Chapter 3 outline. 3.5 Connection-oriented transport: TCP. 3.6 Principles of congestion control 3.7 TCP congestion control Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer 3.5 Connection-oriented transport: TCP segment

More information

COMP/ELEC 429/556 Introduction to Computer Networks

COMP/ELEC 429/556 Introduction to Computer Networks COMP/ELEC 429/556 Introduction to Computer Networks The TCP Protocol Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng at cs.rice.edu

More information

Congestion Collapse in the 1980s

Congestion Collapse in the 1980s Congestion Collapse Congestion Collapse in the 1980s Early TCP used fixed size window (e.g., 8 packets) Initially fine for reliability But something happened as the ARPANET grew Links stayed busy but transfer

More information

image 3.8 KB Figure 1.6: Example Web Page

image 3.8 KB Figure 1.6: Example Web Page image. KB image 1 KB Figure 1.: Example Web Page and is buffered at a router, it must wait for all previously queued packets to be transmitted first. The longer the queue (i.e., the more packets in the

More information

Functionality Split Computer Networking. Transport Protocols. Overview. Multiplexing & Demultiplexing

Functionality Split Computer Networking. Transport Protocols. Overview. Multiplexing & Demultiplexing Functionality Split 15-441 Computer Networking Transport Layer Network provides best-effort delivery End-systems implement many functions Reliability In-order delivery Demultiplexing Message boundaries

More information

Computer Networks. Wenzhong Li. Nanjing University

Computer Networks. Wenzhong Li. Nanjing University Computer Networks Wenzhong Li Nanjing University 1 Chapter 5. End-to-End Protocols Transport Services and Mechanisms User Datagram Protocol (UDP) Transmission Control Protocol (TCP) TCP Congestion Control

More information

User Datagram Protocol

User Datagram Protocol Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram

More information

Outline Computer Networking. Transport Protocols. Functionality Split. Review 2 Transport Protocols

Outline Computer Networking. Transport Protocols. Functionality Split. Review 2 Transport Protocols Outline Transport introduction 15-744 Computer Networking Review 2 Transport Protocols Error recovery & flow control TCP flow control/connection setup/data transfer TCP reliability Congestion sources and

More information

CSE/EE 461 Lecture 12 TCP. A brief Internet history...

CSE/EE 461 Lecture 12 TCP. A brief Internet history... CSE/EE 461 Lecture 12 TCP Tom Anderson tom@cs.washington.edu Peterson, Chapter 5.2, 6 A brief Internet history... 1991 WWW/HTTP 1969 ARPANET created 1972 TELNET RFC 318 1973 FTP RFC 454 1977 MAIL RFC 733

More information

Transport Protocols. Raj Jain. Washington University in St. Louis

Transport Protocols. Raj Jain. Washington University in St. Louis Transport Protocols Raj Jain Washington University Saint Louis, MO 63131 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 16-1 Overview q TCP q Key features

More information

Networked Systems and Services, Fall 2018 Chapter 3

Networked Systems and Services, Fall 2018 Chapter 3 Networked Systems and Services, Fall 2018 Chapter 3 Jussi Kangasharju Markku Kojo Lea Kutvonen 4. Transport Layer Reliability with TCP Transmission Control Protocol (TCP) RFC 793 + more than hundred other

More information

An SCTP-Protocol Data Unit with several chunks

An SCTP-Protocol Data Unit with several chunks SCTP for Beginners Section 2 SCTP Packets he protocol data units (PDU) of SCTP are called SCTP packets. If SCTP runs over IP (as described in RFC2960 ), an SCTP packet forms the payload of an IP packet.

More information

Networked Systems and Services, Fall 2017 Reliability with TCP

Networked Systems and Services, Fall 2017 Reliability with TCP Networked Systems and Services, Fall 2017 Reliability with TCP Jussi Kangasharju Markku Kojo Lea Kutvonen 4. Transmission Control Protocol (TCP) RFC 793 + more than hundred other RFCs TCP Loss Recovery

More information

TCP. CSU CS557, Spring 2018 Instructor: Lorenzo De Carli (Slides by Christos Papadopoulos, remixed by Lorenzo De Carli)

TCP. CSU CS557, Spring 2018 Instructor: Lorenzo De Carli (Slides by Christos Papadopoulos, remixed by Lorenzo De Carli) TCP CSU CS557, Spring 2018 Instructor: Lorenzo De Carli (Slides by Christos Papadopoulos, remixed by Lorenzo De Carli) 1 Sources Fall and Stevens, TCP/IP Illustrated Vol. 1, 2nd edition Congestion Avoidance

More information

05 Transmission Control Protocol (TCP)

05 Transmission Control Protocol (TCP) SE 4C03 Winter 2003 05 Transmission Control Protocol (TCP) Instructor: W. M. Farmer Revised: 06 February 2003 1 Interprocess Communication Problem: How can a process on one host access a service provided

More information

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections Application / Transport Interface Application requests service from transport layer Transport Layer Application Layer Prepare Transport service requirements Data for transport Local endpoint node address

More information

Recap. TCP connection setup/teardown Sliding window, flow control Retransmission timeouts Fairness, max-min fairness AIMD achieves max-min fairness

Recap. TCP connection setup/teardown Sliding window, flow control Retransmission timeouts Fairness, max-min fairness AIMD achieves max-min fairness Recap TCP connection setup/teardown Sliding window, flow control Retransmission timeouts Fairness, max-min fairness AIMD achieves max-min fairness 81 Feedback Signals Several possible signals, with different

More information

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16 Guide To TCP/IP, Second Edition Chapter 5 Transport Layer TCP/IP Protocols Objectives Understand the key features and functions of the User Datagram Protocol (UDP) Explain the mechanisms that drive segmentation,

More information

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6. Transport Layer 6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6.1 Internet Transport Layer Architecture The

More information

6. The Transport Layer and protocols

6. The Transport Layer and protocols 6. The Transport Layer and protocols 1 Dr.Z.Sun Outline Transport layer services Transmission Control Protocol Connection set-up and tear-down Ports and Well-know-ports Flow control and Congestion control

More information

Congestion Control. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Congestion Control. Daniel Zappala. CS 460 Computer Networking Brigham Young University Congestion Control Daniel Zappala CS 460 Computer Networking Brigham Young University 2/25 Congestion Control how do you send as fast as possible, without overwhelming the network? challenges the fastest

More information

Outline. TCP: Overview RFCs: 793, 1122, 1323, 2018, steam: r Development of reliable protocol r Sliding window protocols

Outline. TCP: Overview RFCs: 793, 1122, 1323, 2018, steam: r Development of reliable protocol r Sliding window protocols Outline r Development of reliable protocol r Sliding window protocols m Go-Back-N, Selective Repeat r Protocol performance r Sockets, UDP, TCP, and IP r UDP operation r TCP operation m connection management

More information

Computer Networks and Data Systems

Computer Networks and Data Systems Computer Networks and Data Systems Transport Layer TDC463 Winter 2011/12 John Kristoff - DePaul University 1 Why a transport layer? IP gives us end-to-end connectivity doesn't it? Why, or why not, more

More information

Transport Layer: outline

Transport Layer: outline Transport Layer: outline Transport-layer services Multiplexing and demultiplexing Connectionless transport: UDP Principles of reliable data transfer Connection-oriented transport: TCP Segment structure

More information

Transport Layer: Outline

Transport Layer: Outline Transport Layer: Outline Transport-layer services Multiplexing and demultiplexing Connectionless transport: UDP Principles of reliable data transfer Connection-oriented transport: TCP Segment structure

More information

TCP Review. Carey Williamson Department of Computer Science University of Calgary Winter 2018

TCP Review. Carey Williamson Department of Computer Science University of Calgary Winter 2018 TCP Review Carey Williamson Department of Computer Science University of Calgary Winter 2018 Credit: Much of this content came courtesy of Erich Nahum (IBM Research) The TCP Protocol Connection-oriented,

More information

Lecture 20 Overview. Last Lecture. This Lecture. Next Lecture. Transport Control Protocol (1) Transport Control Protocol (2) Source: chapters 23, 24

Lecture 20 Overview. Last Lecture. This Lecture. Next Lecture. Transport Control Protocol (1) Transport Control Protocol (2) Source: chapters 23, 24 Lecture 20 Overview Last Lecture Transport Control Protocol (1) This Lecture Transport Control Protocol (2) Source: chapters 23, 24 Next Lecture Internet Applications Source: chapter 26 COSC244 & TELE202

More information

Video Streaming with the Stream Control Transmission Protocol (SCTP)

Video Streaming with the Stream Control Transmission Protocol (SCTP) Chair for Network Architectures and Services Department of Informatics Technische Universität München Video Streaming with the Stream Control Transmission Protocol (SCTP) Lothar Braun, Andreas Müller Internet

More information

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control Chapter 6 What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control OSI Model Hybrid Model Software outside the operating system Software inside

More information

Introduction to Networks and the Internet

Introduction to Networks and the Internet Introduction to Networks and the Internet CMPE 80N Announcements Project 2. Reference page. Library presentation. Internet History video. Spring 2003 Week 7 1 2 Today Internetworking (cont d). Fragmentation.

More information

Outline. TCP: Overview RFCs: 793, 1122, 1323, 2018, Development of reliable protocol Sliding window protocols

Outline. TCP: Overview RFCs: 793, 1122, 1323, 2018, Development of reliable protocol Sliding window protocols Outline Development of reliable protocol Sliding window protocols Go-Back-N, Selective Repeat Protocol performance Sockets, UDP, TCP, and IP UDP operation TCP operation connection management flow control

More information

TCP : Fundamentals of Computer Networks Bill Nace

TCP : Fundamentals of Computer Networks Bill Nace TCP 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia Lab #1 due now! Reminder: Paper Review

More information

Department of Computer and IT Engineering University of Kurdistan. Transport Layer. By: Dr. Alireza Abdollahpouri

Department of Computer and IT Engineering University of Kurdistan. Transport Layer. By: Dr. Alireza Abdollahpouri Department of Computer and IT Engineering University of Kurdistan Transport Layer By: Dr. Alireza Abdollahpouri TCP/IP protocol suite 2 Transport Layer The transport layer is responsible for process-to-process

More information

TCP and Congestion Control (Day 1) Yoshifumi Nishida Sony Computer Science Labs, Inc. Today's Lecture

TCP and Congestion Control (Day 1) Yoshifumi Nishida Sony Computer Science Labs, Inc. Today's Lecture TCP and Congestion Control (Day 1) Yoshifumi Nishida nishida@csl.sony.co.jp Sony Computer Science Labs, Inc 1 Today's Lecture Part1: TCP concept Part2: TCP detailed mechanisms Part3: Tools for TCP 2 1

More information

TCP so far Computer Networking Outline. How Was TCP Able to Evolve

TCP so far Computer Networking Outline. How Was TCP Able to Evolve TCP so far 15-441 15-441 Computer Networking 15-641 Lecture 14: TCP Performance & Future Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Reliable byte stream protocol Connection establishments

More information

Transport Protocols. ISO Defined Types of Network Service: rate and acceptable rate of signaled failures.

Transport Protocols. ISO Defined Types of Network Service: rate and acceptable rate of signaled failures. Transport Protocols! Type A: ISO Defined Types of Network Service: Network connection with acceptable residual error rate and acceptable rate of signaled failures. - Reliable, sequencing network service

More information

Information Network 1 TCP 1/2. Youki Kadobayashi NAIST

Information Network 1 TCP 1/2. Youki Kadobayashi NAIST Information Network 1 TCP 1/2 Youki Kadobayashi NAIST 1 Transport layer: a birds-eye view Hosts maintain state for each transport-layer endpoint Routers don t maintain per-host state H R R R R H Transport

More information

Topics in Computer Networking Switch SS7 PSTN/ISDN. Gatekeeper/ Proxy Server. Topics in Computer Networking Н.

Topics in Computer Networking Switch SS7 PSTN/ISDN. Gatekeeper/ Proxy Server. Topics in Computer Networking Н. Outline SCTP Stream Control Transmission Protocol NGN and Motivation for SCTP Protocol Overview Packet format Protection against SYN Flooding Multistreaming Multihoming Research Activities at Kau Summary

More information

Fall 2012: FCM 708 Bridge Foundation I

Fall 2012: FCM 708 Bridge Foundation I Fall 2012: FCM 708 Bridge Foundation I Prof. Shamik Sengupta Instructor s Website: http://jjcweb.jjay.cuny.edu/ssengupta/ Blackboard Website: https://bbhosted.cuny.edu/ Intro to Computer Networking Transport

More information

ITS323: Introduction to Data Communications

ITS323: Introduction to Data Communications ITS323: Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 ITS323Y12S1L13, Steve/Courses/2012/s1/its323/lectures/transport.tex,

More information

CS 356: Introduction to Computer Networks. Lecture 16: Transmission Control Protocol (TCP) Chap. 5.2, 6.3. Xiaowei Yang

CS 356: Introduction to Computer Networks. Lecture 16: Transmission Control Protocol (TCP) Chap. 5.2, 6.3. Xiaowei Yang CS 356: Introduction to Computer Networks Lecture 16: Transmission Control Protocol (TCP) Chap. 5.2, 6.3 Xiaowei Yang xwy@cs.duke.edu Overview TCP Connection management Flow control When to transmit a

More information

Transport Layer TCP / UDP

Transport Layer TCP / UDP Transport Layer TCP / UDP Chapter 6 section 6.5 is TCP 12 Mar 2012 Layers Application Transport Why do we need the Transport Layer? Network Host-to-Network/Physical/DataLink High Level Overview TCP (RFC

More information

Operating Systems and Networks. Network Lecture 10: Congestion Control. Adrian Perrig Network Security Group ETH Zürich

Operating Systems and Networks. Network Lecture 10: Congestion Control. Adrian Perrig Network Security Group ETH Zürich Operating Systems and Networks Network Lecture 10: Congestion Control Adrian Perrig Network Security Group ETH Zürich Where we are in the Course More fun in the Transport Layer! The mystery of congestion

More information

Where we are in the Course. Topic. Nature of Congestion. Nature of Congestion (3) Nature of Congestion (2) Operating Systems and Networks

Where we are in the Course. Topic. Nature of Congestion. Nature of Congestion (3) Nature of Congestion (2) Operating Systems and Networks Operating Systems and Networks Network Lecture 0: Congestion Control Adrian Perrig Network Security Group ETH Zürich Where we are in the Course More fun in the Transport Layer! The mystery of congestion

More information

Fast Retransmit. Problem: coarsegrain. timeouts lead to idle periods Fast retransmit: use duplicate ACKs to trigger retransmission

Fast Retransmit. Problem: coarsegrain. timeouts lead to idle periods Fast retransmit: use duplicate ACKs to trigger retransmission Fast Retransmit Problem: coarsegrain TCP timeouts lead to idle periods Fast retransmit: use duplicate ACKs to trigger retransmission Packet 1 Packet 2 Packet 3 Packet 4 Packet 5 Packet 6 Sender Receiver

More information

UNIT IV TRANSPORT LAYER

UNIT IV TRANSPORT LAYER Transport Layer UNIT IV TRANSPORT LAYER Congestion Control and Quality of Service Ref: Data Communication & Networking, 4 th edition, Forouzan IV-1 DATA TRAFFIC The main focus of congestion control and

More information

Internet and Intranet Protocols and Applications

Internet and Intranet Protocols and Applications Internet and Intranet Protocols and Applications Lecture 1b: The Transport Layer in the Internet January 17, 2006 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu 01/17/06

More information

Transport Layer Protocols TCP

Transport Layer Protocols TCP Transport Layer Protocols TCP Gail Hopkins Introduction Features of TCP Packet loss and retransmission Adaptive retransmission Flow control Three way handshake Congestion control 1 Common Networking Issues

More information

Computer Network Programming

Computer Network Programming Computer Network Programming SCTP Overview Dr. Sam Hsu Computer Science & Engineering Florida Atlantic University SCTP Overview Introduction Motivations Architectural & Functional Views Packet & Chunk

More information

Transport of (Legacy) Signaling over IP. Summary of course scope

Transport of (Legacy) Signaling over IP. Summary of course scope Transport of (Legacy) Signaling over SIGTRAN architecture (http://www.ietf.org/html.charters/sigtran-charter.html) Raimo Kantola S- 2004 Signaling Protocols 15-1 Summary of course scope PABX H.323 or S

More information

Programming Assignment 3: Transmission Control Protocol

Programming Assignment 3: Transmission Control Protocol CS 640 Introduction to Computer Networks Spring 2005 http://www.cs.wisc.edu/ suman/courses/640/s05 Programming Assignment 3: Transmission Control Protocol Assigned: March 28,2005 Due: April 15, 2005, 11:59pm

More information

Different Layers Lecture 20

Different Layers Lecture 20 Different Layers Lecture 20 10/15/2003 Jian Ren 1 The Network Layer 10/15/2003 Jian Ren 2 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host,

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Literature: Lecture 10: AAA RFC3286 RFC2881 RFC2905 RFC2903 Lecture 10: AAA Goals: 2004 Image Coding Group, Linköpings Universitet 2 Lecture 10: AAA AAA Introduction Outline: AAA introduction AAA in Network

More information

Internet Transport Protocols UDP and TCP

Internet Transport Protocols UDP and TCP Outline Internet Transport Protocols UDP and TCP Transport Layer Review UDP Protocol UDP Characteristics UDP Functionalities TCP Protocol TCP Characteristics Connection Management TCP Flow and Congestion

More information

Correcting mistakes. TCP: Overview RFCs: 793, 1122, 1323, 2018, TCP seq. # s and ACKs. GBN in action. TCP segment structure

Correcting mistakes. TCP: Overview RFCs: 793, 1122, 1323, 2018, TCP seq. # s and ACKs. GBN in action. TCP segment structure Correcting mistakes Go-back-N: big picture: sender can have up to N unacked packets in pipeline rcvr only sends cumulative acks doesn t ack packet if there s a gap sender has r for oldest unacked packet

More information

CS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control

CS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control : Computer Networks Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control TCP performance We ve seen how TCP the protocol works Sequencing, receive window, connection setup and teardown And

More information

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Transport Layer Network Fundamentals Chapter 4 Version 4.0 1 Transport Layer Role and Services Transport layer is responsible for overall end-to-end transfer of application data 2 Transport Layer Role

More information

CS4700/CS5700 Fundamentals of Computer Networks

CS4700/CS5700 Fundamentals of Computer Networks CS4700/CS5700 Fundamentals of Computer Networks Lecture 14: TCP Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu Northeastern

More information

Kent State University

Kent State University CS 4/54201 Computer Communication Network Kent State University Dept. of Computer Science www.mcs.kent.edu/~javed/class-net06f/ 1 A Course on Networking and Computer Communication LECT-10, S-2 IP- Internet

More information

A Survey of Recent Developments of TCP. Sally Floyd ACIRI (AT&T Center for Internet Research at ICSI) October 17, 2001

A Survey of Recent Developments of TCP. Sally Floyd ACIRI (AT&T Center for Internet Research at ICSI) October 17, 2001 A Survey of Recent Developments of TCP Sally Floyd ACIRI (AT&T Center for Internet Research at ICSI) October 17, 2001 IEEE Annual Computer Communications Workshop 1 An overview of this session: This talk:

More information

CS 640 Introduction to Computer Networks Spring 2009

CS 640 Introduction to Computer Networks Spring 2009 CS 640 Introduction to Computer Networks Spring 2009 http://pages.cs.wisc.edu/~suman/courses/wiki/doku.php?id=640-spring2009 Programming Assignment 3: Transmission Control Protocol Assigned: March 26,

More information

Internet Technology. Internet Transport Tomorrow

Internet Technology. Internet Transport Tomorrow Uni Innsbruck Informatik - 1 Internet Technology Internet Transport Tomorrow Michael Welzl http://www.welzl.at DPS NSG Team http://dps.uibk.ac.at dps.uibk.ac.at/nsg Institute of Computer Science University

More information

CS457 Transport Protocols. CS 457 Fall 2014

CS457 Transport Protocols. CS 457 Fall 2014 CS457 Transport Protocols CS 457 Fall 2014 Topics Principles underlying transport-layer services Demultiplexing Detecting corruption Reliable delivery Flow control Transport-layer protocols User Datagram

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 5: SCTP Litterature: RFC3257 SCTP Applicability Statement RFC3286 Introduction to SCTP Forouzan 3 rd ed, Chapter 13 (optional) RFC2960 (optional extra material) RFC3309 (optional extra material)

More information

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 23-1 PROCESS-TO-PROCESS DELIVERY The transport

More information

Datagram Congestion Control Protocol (DCCP) Spec Walkthrough

Datagram Congestion Control Protocol (DCCP) Spec Walkthrough Datagram Congestion Control Protocol (DCCP) Spec Walkthrough Eddie Kohler International Computer Science Institute IETF 57 DCCP Meeting July 16, 2003 1 Outline Problem & alternatives Design choices & philosophy

More information

Multiple unconnected networks

Multiple unconnected networks TCP/IP Life in the Early 1970s Multiple unconnected networks ARPAnet Data-over-cable Packet satellite (Aloha) Packet radio ARPAnet satellite net Differences Across Packet-Switched Networks Addressing Maximum

More information

Transport Layer. -UDP (User Datagram Protocol) -TCP (Transport Control Protocol)

Transport Layer. -UDP (User Datagram Protocol) -TCP (Transport Control Protocol) Transport Layer -UDP (User Datagram Protocol) -TCP (Transport Control Protocol) 1 Transport Services The transport layer has the duty to set up logical connections between two applications running on remote

More information

Congestion / Flow Control in TCP

Congestion / Flow Control in TCP Congestion and Flow Control in 1 Flow Control and Congestion Control Flow control Sender avoids overflow of receiver buffer Congestion control All senders avoid overflow of intermediate network buffers

More information

CNT 6885 Network Review on Transport Layer

CNT 6885 Network Review on Transport Layer CNT 6885 Network Review on Transport Layer Jonathan Kavalan, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida User Datagram Protocol [RFC 768] no frills,

More information

TCP/IP Networking. Part 4: Network and Transport Layer Protocols

TCP/IP Networking. Part 4: Network and Transport Layer Protocols TCP/IP Networking Part 4: Network and Transport Layer Protocols Orientation Application Application protocol Application TCP TCP protocol TCP IP IP protocol IP IP protocol IP IP protocol IP Network Access

More information