Mike Shorthose, Nikos Fistas Eurocontrol
|
|
- Ronald Wilfrid Walker
- 6 years ago
- Views:
Transcription
1 Mike Shorthose, Nikos Fistas Eurocontrol AMCP WG-M 5th meeting St Petersburg, 20 August 2002 Slide 1
2 Background limitations of current protocol benefits of new protocol Process Eurocontrol funded development Validation details Technical details of new protocol Slide 2
3 Process Validation details Technical details of new protocol Slide 3
4 VDL Mode 4: status in WGM AMCP/7 meeting approved SARPs and TM for VDL Mode 4 for surveillance applications only WGM is considering the use of VM4 for point to point communications Some deficiencies exist with the currently specified VM4 DLS protocol Slide 4
5 Closely based on VDL Mode 2 (AVLC) Allows transfer of 4 frames before an acknowledgement is required BUT: does not provide support for message priority does not allow fragmentation of longer messages problem with leave event generation protocol adds unnecessary complexity errors and duplication inconsistencies and ambiguities in references to VDL Mode 2 Slide 5
6 New DLS provides explicit acknowledgement of each DATA packet mechanisms to make maximum use of reserved slots for DATA transfer ability to link sequences of messages in reserved slots packet fragmentation with minimum overhead, optimally matched to link conditions duplicate detection and suppression support for 15 priority levels supports pre-emption by higher priority message Slide 6
7 Benefits of new DLS protocol removes errors, duplication, inconsistencies and ambiguities reduces protocol complexity handles priority messages in an efficient way provides fragmentation reduce overhead optimal match of fragment size to link conditions extends performance benefits of previous DLS protocol greatly extends ability to combine successive messages between peers achieves high channel utilisation through maximum possible use of reserved access protocols Slide 7
8 LME Interface with DLS updated to take account of revised DLS services beneficial removal of special LME transport protocol Import of text previously called up from Mode 2 standard no functional change text is much clearer these changes highlighted in yellow Modification of parameter content rationalisation of parameters no change in functionality VSS consequential changes main impact is support for 15 priority levels Slide 8
9 Background Validation details Technical details of new protocol Slide 9
10 The basic principles of a new DLS proposal were presented to WGM/2 by Eurocontrol WGM agreed that this is a good direction and requested to advance the work and make a complete proposal for a new DLS protocol Eurocontrol established (Nov. 2001) a team to complete DLS proposal and validate the new DLS Slide 10
11 Drafting carried out by Mike Shorthose (Helios) and Tony Whyman (MWA) assisted by Steve Friedman (ADSI) and Marcus Gustafsson (SAAB) development team Other inputs from WG-M members Validation carried out by independent validation team at Helios Co-ordination maintained between the development team and VM4 radio manufactures (ADSI, SAAB), LFV, FAA, DFS and other WG-M members Slide 11
12 Define a complete proposal for a new DLS Resolution of issues review of initial DLS outline proposal with analysis of outstanding issues Produce outline design specification Design of burst types Produce first draft for technical manual Review after first phase of validation Produce second draft for technical manual response to validation issues drafting of LME interface Review after second stage of validation Final update and presentation to WG-M (this meeting) Slide 12
13 Validation of new DLS First stage inspection and analysis of DLS protocol Identification of protocol states Identification of state diagrams and associated events Protocol walk through: Step through of data transfer protocol including special transfer protocols Output: Validation report Slide 13
14 Validation of new DLS (c td) Second stage simulation of DLS and inspection of LME changes Carried out after update by development team Implementation of single aircraft test simulator Investigation of protocol performance in presence of disruption (lost messages, out of sequence messages etc) Inspection of LME changes Output: Simulation report containing open issues Third stage review of validation activities carried out after final update by development team and review by WG-M members Output: Updated simulation report (no open issues) Slide 14
15 Production of Implementation Manual entry to replace previous DLS text contains estimate of link utilisation provides guidance on use of short and long transmission protocols and ground reservation protocols Change proposal brings together and introduces all documentation Slide 15
16 The following are submitted for consideration by WG-M Covering paper Revision-marked text of the VM4 Technical Manual Validation report Simulation report Revision-marked text of the VM4 Implementation Manual Slide 16
17 Background Process Technical details of new protocol Slide 17
18 Validation carried out by independent team Initial process inspection derivation of state diagrams Connection Establishment Data Transmission Data Reception report of initial findings (validation report) Slide 18
19 Rx Data, Notifications Tx Data LME DLS DLS User SZOM CTRL(IB=1) Invalid T-bit Tx Data Disconnected Connected Reset Rx Data, Failure Notifications Timer Expires FRMR_ACK Received Tx DLPDUs, VSS Rx DLPDUs, Failure Notifications Slide 19
20 INFO, CTRL Start RTS Type? UDATA Receive processing (long transmission) T-Bit? Correct T-bit Incorrect T-bit Send CTS INFO, CTRL Data Type? UDATA Correct T-bit T-bit? Incorrect T-bit None Received Send ACK Forward to Receive Array Send NACK Discard DATA Forward To DLS User END Slide 20
21 No fundamental problems found A number of logical errors discovered Corrective action suggested by the validation team Slide 21
22 Validation Stage 2 Stage 2 consisted of: inspection and analysis of v0.4 simulation of protocols using simple test harness inspection of LME interface production of simulation report Stage 2 results simulations show that protocol is robust development of simulator demonstrates that text is clear a number of open issues left for resolution which were addressed and closed in Stage 3 Slide 22
23 Control Physical Station 1 Station 2 Data Control Slide 23
24 Slide 24
25 Input input script configuration file inputs includes modifier which makes it possible to disrupt the data flow Output output file Slide 25
26 Background Process Validation details Slide 26
27 Provides services to external users for point-to-point comm to the LME to support link management between peer DLSs both air/ground and air/air for broadcast Uses services of VSS to send/receive messages LME DLS User DLS VSS Peer DLS Slide 27
28 DLS provides: simple transmit/acknowledge protocol duplicate suppression via toggle bit message fragmentation via M bit 15 message priority levels pre-emption of lower priority messages short and long transmission protocols includes linking of successive messages make best use of reservation protocols provided by VSS minimises use of random access protocol re-transmission based on knowledge of when ack is expected removes dependence on timers Slide 28
29 DLS User LME Directed Data (INFO, CTRL) Broadcast Data (UDATA) Connection Management (IB/SZOM) Message Segmentation (M-bit) Delivery Order (T-bit) DLS Short Acknowledged Long Acknowledged Short Unacknowledged Long Unacknowledged Unicast Request Reservation General Response Protocol Information Transfer Request Retransmission VSS Slide 29
30 Data link protocol data unit (DLPDU) Burst id + one or two DLS frames DATA frames transfer of user information CTRL (LME packets), INFO (point to point user data) and UDATA (broadcast user data or broadcast LME data) ACK frames acknowledge transfer of user information CTRL_ACK and INFO_ACK Slide 30
31 RTS frames request reservation of slots for DATA transfer CTRL_RTS, INFO_RTS, UDATA_RTS CTS frames provide reserved slots for DATA transfer CTRL_CTS, INFO_CTS, UDATA_CTS Other link control frames FRMR, FRMR_ACK for link reset DM/DISC for air/ground link disconnection SZOM for air/air link initialisation Slide 31
32 Toggle bit (T) alternatively set to 1 and 0 on each successive data transmission A B DATA T = 1 ACK T = 1 DATA T = 0 ACK T = 0 Slide 32
33 More Bit (M) set to zero to indicate end of message. Message fragmentation/concatenation If the length of the burst is longer than N4 slots the sending station will fragment the message. For single fragment messages: M bit is zero For multiple fragment messages: The M bit is set to 1 except the last segment, which is set to zero Slide 33
34 Initialise bit (IB) - used to initialise T bit Priority (p) absolute priority Length (lg) length of the data Negotiation subfield (neg) indicates link parameters for air/air link Slide 34
35 DATA sent (M = 0, pr = 2, T = 0, unicast reservation) A B DATA received (M = 0, pr = 2, T = 0) ACK sent (T = 0) ACK received (T = 0) Key Transmission sent by random access) Transmission sent in unicast reservation Slide 35
36 RTS Sent (lg = 4, pr = 2, T = 0, unicast reservation) CTS received (T = 0) A B RTS received (lg = 4, pr = 2, T = 0) CTS sent (T = 0, info transfer request reservation) DATA sent (M = 0, pr = 2, T = 0) Data received (M = 0, pr = 2, T = 0) ACK received (T = 0) ACK sent (T = 0) Key Transmission sent by random access Transmission sent by unicast reservation Transmission sent by info reservation Transmission sent by info reservation Slide 36
37 Up to two DLS frames can be contained in a single DLS burst enables protocols to be linked so as to avoid use of random access protocol The following combinations are possible: DATA/RTS and ACK/CTS links a stream of messages or fragments sent from one peer to another ACK/DATA allows receiving station to send back a single slot response ACK/RTS allows a receiving station to reserved slots for multi-slot response eg subsequent transport ACK Slide 37
38 A B RTS CTS DATA / RTS ACK / CTS Slide 38
39 TD1 and TD2: control the air/air link ND1: Maximum number of octets in any frame ND2: The maximum length of the message to be sent as a short protocol ND3: The maximum length of a segment Slide 39
40 The services offered to the LME will be: transfer of LME packets encoded within CTRL frames using the T bit protocol (duplicate suppression) at the highest priority T-bit initialisation via flag setting within CTRL frame fragmentation for long LME packets provision of short and long transmission protocols for CTRL frames pre-emption of lower priority INFO frames transfer of broadcast LME packets using modified short and long transmission protocols ability to disconnect link via DM/DISC frame Slide 40
41 The services offered for air/ground INFO transfer are: disconnect mode indication if INFO transfer is attempted before a link is established operation on a full 4 bit priority basis duplicate suppression pre-emption fragmentation provision of short and long transmission protocols for INFO frames transfer of broadcast INFO packets using modified short and long transmission protocols Slide 41
42 The services offered for air/air INFO exchange are: T-bit initialisation via an SZOM frame which is combined with the first INFO frame Link parameter negotiation via version number Link maintenance via send and receive timers Operation on a full 4 bit priority basis Transfer of information encoded within INFO frames using the T-bit protocol pre-emption fragmentation provision of short and long transmission protocols Slide 42
43 Protocol provides minimisation of use of random access protocol protection against hidden and exposed terminals priority handling including pre-emption use of ground reserved slots to protect transmissions Slide 43
Changes originating from the review of the DLS burst formats (subject of this report)
Legend: Review of the VDL/ Technical Manual concerning DLS burst formats EUROCAE WG/SG (VDL/ MOPS) Changes originating from the review of the DLS burst formats (subject of this report) Changes originating
More informationAMCP/4-WP/70. b) requirements and recommendations together with their rationale; and
Appendix A to the Report on Agenda Item 3 3A-1 APPENDIX A VHF DIGITAL LINK (VDL) DESIGN GUIDELINES 1. INTRODUCTION 1.1 In the absence of a comprehensive and detailed set of operational requirements, the
More informationAMCP/5-WP/72 APPENDIX D (ENGLISH ONLY)
Appendix D to the Report on Agenda Item 1 1D-1 APPENDIX D (ENGLISH ONLY) DRAFT MANUAL ON HF DATA LINK (HFDL) TECHNICAL DETAILS 1D-2 Appendix D to the Report on Agenda Item 1 TABLE OF CONTENTS 1. INTRODUCTION...
More informationNetworking Technologies and Applications
Networking Technologies and Applications Rolland Vida BME TMIT Transport Protocols UDP User Datagram Protocol TCP Transport Control Protocol and many others UDP One of the core transport protocols Used
More informationAlternative approach to VDL Mode 4 data link service
AC/WG /2 W18 AERONAUICA OBIE COUNICAIONS ANE (AC) Working Group 2 nd eeting Järvenpää, Finland 25 April3 ay, 21 Agenda Item 11: Review of results of subgroup dealing with VD ode 4 AN issues Alternative
More informationGuide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16
Guide To TCP/IP, Second Edition Chapter 5 Transport Layer TCP/IP Protocols Objectives Understand the key features and functions of the User Datagram Protocol (UDP) Explain the mechanisms that drive segmentation,
More informationMobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods
Mobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods 1 Timeout freezing of transmission (TFT) Used in situations where
More informationLecture 7: Flow Control"
Lecture 7: Flow Control" CSE 123: Computer Networks Alex C. Snoeren No class Monday! Lecture 7 Overview" Flow control Go-back-N Sliding window 2 Stop-and-Wait Performance" Lousy performance if xmit 1 pkt
More informationData Link Control Protocols
Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,
More informationLecture 7: Flow & Media Access Control"
Lecture 7: Flow & Media Access Control" CSE 123: Computer Networks Alex C. Snoeren HW 2 due next Wednesday! Lecture 7 Overview" Flow control Go-back-N Sliding window Methods to share physical media: multiple
More informationUser Datagram Protocol (UDP):
SFWR 4C03: Computer Networks and Computer Security Feb 2-5 2004 Lecturer: Kartik Krishnan Lectures 13-15 User Datagram Protocol (UDP): UDP is a connectionless transport layer protocol: each output operation
More informationIEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall
IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06
More informationFlow control: Ensuring the source sending frames does not overflow the receiver
Layer 2 Technologies Layer 2: final level of encapsulation of data before transmission over a physical link responsible for reliable transfer of frames between hosts, hop by hop, i.e. on a per link basis
More informationComputer Communication III
Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost
More information3. Data Link Layer 3-2
3. Data Link Layer 3.1 Transmission Errors 3.2 Error Detecting and Error Correcting Codes 3.3 Bit Stuffing 3.4 Acknowledgments and Sequence Numbers 3.5 Flow Control 3.6 Examples: HDLC, PPP 3. Data Link
More informationLecture 5: Flow Control. CSE 123: Computer Networks Alex C. Snoeren
Lecture 5: Flow Control CSE 123: Computer Networks Alex C. Snoeren Pipelined Transmission Sender Receiver Sender Receiver Ignored! Keep multiple packets in flight Allows sender to make efficient use of
More informationChapter 3. The Data Link Layer. Wesam A. Hatamleh
Chapter 3 The Data Link Layer The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols The Data
More informationConfiguring MLD. Overview. MLD versions. How MLDv1 operates. MLD querier election
Contents Configuring MLD 1 Overview 1 MLD versions 1 How MLDv1 operates 1 How MLDv2 operates 3 MLD message types 4 MLD SSM mapping 7 MLD proxying 8 Protocols and standards 9 MLD configuration task list
More informationData Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class
Data Link Layer Kuang Chiu Huang TCM NCKU Goals of This Lecture Through the lecture and in-class discussion, students are enabled to describe role and functions of the link layer, and compare different
More informationPolitecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. Link Layer. Fundamentals of Communication Networks
Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione Link Layer Fundamentals of Communication Networks Data Link layer o It is the first logical layer in the protocol stack o Functions
More informationEUROPEAN ETS TELECOMMUNICATION January 2000 STANDARD
EUROPEAN ETS 300 396-8-1 TELECOMMUNICATION January 2000 STANDARD Source: TETRA Reference: DE/TETRA-02007-8-1 ICS: 33.020 Key words: ICS, PICS, DMO, MS, TETRA, radio Terrestrial Trunked Radio (TETRA); Technical
More informationSecond revision of STP-ISS Transport. Protocol for Spacecraft On-board Networks
FRUCT #17 20-24 April 2015 Second revision of STP-ISS Transport Yuriy Sheynin, Valentin Olenev, Irina Lavrovskaya, Ilya Korobkov, Saint-Petersburg State University of Aerospace Instrumentation Dmitry Dymov,
More informationWiMOD LR Base Host Controller Interface
WiMOD LR Base Host Controller Interface Specification Version 1.7 Document ID: 4100/40140/0062 IMST GmbH Carl-Friedrich-Gauß-Str. 2-4 47475 KAMP-LINTFORT GERMANY Introduction Document Information File
More informationUniversity of New Hampshire InterOperability Laboratory Ethernet in the First Mile Consortium
University of New Hampshire InterOperability Laboratory As of July 26, 2004 the Ethernet in the First Mile Clause 57 OAM Conformance Test Suite version 0.4 has been superseded by the release of the Clause
More informationCSE 123: Computer Networks Alex C. Snoeren. HW 1 due NOW!
CSE 123: Computer Networks Alex C. Snoeren HW 1 due NOW! Automatic Repeat Request (ARQ) Acknowledgements (ACKs) and timeouts Stop-and-Wait Sliding Window Forward Error Correction 2 Link layer is lossy
More informationSENSOR-MAC CASE STUDY
SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle
More informationERROR AND FLOW CONTROL. Lecture: 10 Instructor Mazhar Hussain
ERROR AND FLOW CONTROL Lecture: 10 Instructor Mazhar Hussain 1 FLOW CONTROL Flow control coordinates the amount of data that can be sent before receiving acknowledgement It is one of the most important
More informationWiMOD LoRaWAN EndNode Modem HCI Specification
WiMOD LoRaWAN EndNode Modem HCI Specification Specification Version 1.13 Document ID: 4100/40140/0073 IMST GmbH Carl-Friedrich-Gauß-Str. 2-4 47475 KAMP-LINTFORT GERMANY Introduction Document Information
More informationECE 653: Computer Networks Mid Term Exam all
ECE 6: Computer Networks Mid Term Exam 16 November 004. Answer all questions. Always be sure to answer each question concisely but precisely! All questions have points each. 1. What are the different layers
More informationOPEN BASE STATION ARCHITECTURE INITIATIVE
OPEN BASE STATION ARCHITECTURE INITIATIVE Conformance Test Specification Appendix H UDPCP Test Cases Version.00 Issue.00 (38) FOREWORD OBSAI description and specification documents are developed within
More informationOutline. EEC-484/584 Computer Networks. Data Link Layer Design Issues. Framing. Lecture 6. Wenbing Zhao Review.
EEC-484/584 Computer Networks Lecture 6 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Review Data Link Layer Design Issues Error
More informationCE693: Adv. Computer Networking
CE693: Adv. Computer Networking L-10 Wireless Broadcast Fall 1390 Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are
More informationCS 268: Computer Networking. Taking Advantage of Broadcast
CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic
More informationThis Lecture. BUS Computer Facilities Network Management. Line Discipline. Data Link Layer
This Lecture US35 - Computer Facilities Network Management Synchronisation and interfacing insufficient by themselves. Need to provide: Flow control - allow the receiver to regulate the flow of data. Error
More informationSERIAL ATTACHED SCSI (SAS) CONSORTIUM
SERIAL ATTACHED SCSI (SAS) CONSORTIUM Clause 8 SAS SPL Target Error Handling Test Suite Version0.3 Technical Document Last Updated: 6 September 2011 Serial Attached SCSI Consortium 121 Technology Drive,
More informationMedium Access Control Sublayer
Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA
More informationResearch and Analysis of Flow Control Mechanism for Transport Protocols of the SpaceWire Onboard Networks
Research and Analysis of Flow Control Mechanism for Transport Protocols of the SpaceWire Onboard Networks Nikolay Sinyov, Valentin Olenev, Irina Lavrovskaya, Ilya Korobkov {nikolay.sinyov, valentin.olenev,
More informationI. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations
I. INTRODUCTION (a) Network Topologies (i) point-to-point communication each station (i.e., computer, telephone, etc.) directly connected to all other stations (ii) switched networks (1) circuit switched
More information23-3 TCP. Topics discussed in this section: TCP Services TCP Features Segment A TCP Connection Flow Control Error Control 23.22
23-3 TCP 23.22 TCP is a connection-oriented protocol; it creates a virtual connection between two TCPs to send data. In addition, TCP uses flow and error control mechanisms at the transport level. Topics
More informationPage 1. Review: Internet Protocol Stack. Transport Layer Services. Design Issue EEC173B/ECS152C. Review: TCP
EEC7B/ECS5C Review: Internet Protocol Stack Review: TCP Application Telnet FTP HTTP Transport Network Link Physical bits on wire TCP LAN IP UDP Packet radio Transport Layer Services Design Issue Underlying
More informationMedium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem
Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE
More informationECE697AA Lecture 3. Today s lecture
ECE697AA Lecture 3 Transport Layer: TCP and UDP Tilman Wolf Department of Electrical and Computer Engineering 09/09/08 Today s lecture Transport layer User datagram protocol (UDP) Reliable data transfer
More informationLogical Link Control (LLC) Medium Access Control (MAC)
Overview of IEEE 802.11 Data Link layer Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform
More informationAdvanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science
Advanced Computer Networks Rab Nawaz Jadoon Department of Computer Science DCS COMSATS Institute of Information Technology Assistant Professor COMSATS University, Lahore Pakistan Advanced Computer Networks
More informationImproving Reliable Transport and Handoff Performance in Cellular Wireless Networks
Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks H. Balakrishnan, S. Seshan, and R. H. Katz ACM Wireless Networks Vol. 1, No. 4, pp. 469-482 Dec. 1995 P. 1 Introduction
More informationNetwork Working Group
Network Working Group Request for Comments: 2961 Category: Standards Track L. Berger LabN Consulting, LLC D. Gan Juniper Networks, Inc. G. Swallow Cisco Systems, Inc. P. Pan Juniper Networks, Inc. F. Tommasi
More informationLecture 7: Sliding Windows. CSE 123: Computer Networks Geoff Voelker (guest lecture)
Lecture 7: Sliding Windows CSE 123: Computer Networks Geoff Voelker (guest lecture) Please turn in HW #1 Thank you From last class: Sequence Numbers Sender Receiver Sender Receiver Timeout Timeout Timeout
More informationChapter 5 Peer-to-Peer Protocols. School of Info. Sci. & Eng. Shandong Univ..
hapter 5 Peer-to-Peer Protocols School of Info. Sci. & Eng. Shandong Univ.. Outline 5. Peer-to-peer protocols and service models 5. RQ Protocols 5.3 Other daptation Functions Sliding Window Flow ontrol
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationAERONAUTICAL COMMUNICATION PANEL WORKING GROUP N. PM-CPDLC Validation Report
ACP WGN/5 WP19 AERONAUTICAL COMMUNICATION PANEL WORKING GROUP N PM-CPDLC Validation Report SUMMARY This paper gives the results of the PM-CPDLC ATN Application (version 1) validation effort. Version: 0.1
More informationET4254 Communications and Networking 1
Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of
More informationInformation Network Systems The network layer. Stephan Sigg
Information Network Systems The network layer Stephan Sigg Tokyo, November 1, 2012 Error-detection and correction Decoding of Reed-Muller codes Assume a second order (16, 11) code for m = 4. The r-th order
More informationData link layer functions. 2 Computer Networks Data Communications. Framing (1) Framing (2) Parity Checking (1) Error Detection
2 Computer Networks Data Communications Part 6 Data Link Control Data link layer functions Framing Needed to synchronise TX and RX Account for all bits sent Error control Detect and correct errors Flow
More informationUNIT IV -- TRANSPORT LAYER
UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission
More informationTransport Layer Protocols TCP
Transport Layer Protocols TCP Gail Hopkins Introduction Features of TCP Packet loss and retransmission Adaptive retransmission Flow control Three way handshake Congestion control 1 Common Networking Issues
More informationNetwork Working Group Request for Comments: 1377 November The PPP OSI Network Layer Control Protocol (OSINLCP)
Network Working Group Request for Comments: 1377 D. Katz cisco November 1992 Status of this Memo The PPP OSI Network Layer Control Protocol (OSINLCP) This RFC specifies an IAB standards track protocol
More informationThe flow of data must not be allowed to overwhelm the receiver
Data Link Layer: Flow Control and Error Control Lecture8 Flow Control Flow and Error Control Flow control refers to a set of procedures used to restrict the amount of data that the sender can send before
More informationETSI TC SMG TDoc SMG 938/97
ETSI TC SMG TDoc SMG 938/97 Madrid, Spain Agenda item 5.1, GPRS 15-19 December, 1997 Source: Rapporteur GSM 04.64 Topic: GPRS Title: Change Requests to GSM 04.64 Date: 8 December, 1997 Introduction GSM
More informationTCP/IP Protocol Suite 1
TCP/IP Protocol Suite 1 Stream Control Transmission Protocol (SCTP) TCP/IP Protocol Suite 2 OBJECTIVES: To introduce SCTP as a new transport-layer protocol. To discuss SCTP services and compare them with
More informationImpact of transmission errors on TCP performance. Outline. Random Errors
Impact of transmission errors on TCP performance 1 Outline Impact of transmission errors on TCP performance Approaches to improve TCP performance Classification Discussion of selected approaches 2 Random
More informationRequest for Comments: 1333 May 1992
Network Working Group Request for Comments: 1333 W. Simpson Daydreamer May 1992 PPP Link Quality Monitoring Status of this Memo This RFC specifies an IAB standards track protocol for the Internet community,
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 10 CMPE 257 Spring'15 1 Student Presentations Schedule May 21: Sam and Anuj May 26: Larissa
More informationPage 1. Review: Internet Protocol Stack. Transport Layer Services EEC173B/ECS152C. Review: TCP. Transport Layer: Connectionless Service
EEC7B/ECS5C Review: Internet Protocol Stack Review: TCP Application Telnet FTP HTTP Transport Network Link Physical bits on wire TCP LAN IP UDP Packet radio Do you remember the various mechanisms we have
More informationAMCP/4-WP/70. Appendix D to the Report on Agenda Item 3 3D-1. * This appendix is available in English only.
Appendix D to the Report on Agenda Item 3 3D-1 APPENDIX D * VDL IMPLEMENTATION ASPECTS * This appendix is available in English only. 3D-2 Appendix D to the Report on Agenda Item 3 TABLE OF CONTENTS SECTION
More informationTransport Protocols. ISO Defined Types of Network Service: rate and acceptable rate of signaled failures.
Transport Protocols! Type A: ISO Defined Types of Network Service: Network connection with acceptable residual error rate and acceptable rate of signaled failures. - Reliable, sequencing network service
More informationEUROPEAN ETS TELECOMMUNICATION September 1991 STANDARD
EUROPEAN ETS 300 125 TELECOMMUNICATION September 1991 STANDARD Source: ETSI TC-SPS Reference: T/S 46-20 [CC] ICS: 33.080 Key words: ISDN, data link layer, Q.920, Q.921 Integrated Services Digital Network
More informationSURVEILLANCE DATA EXCHANGE
EUROPEAN ORGANISATION FOR THE SAFETY OF AIR NAVIGATION EUROCONTROL EUROCONTROL STANDARD DOCUMENT FOR SURVEILLANCE DATA EXCHANGE Part 10: Category 63 SUR.ET1.ST05.2000-STD-10-01 Edition : 1.3 Edition Date
More information05 Transmission Control Protocol (TCP)
SE 4C03 Winter 2003 05 Transmission Control Protocol (TCP) Instructor: W. M. Farmer Revised: 06 February 2003 1 Interprocess Communication Problem: How can a process on one host access a service provided
More informationLecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission
1 Lecture 4: CRC & Reliable Transmission CSE 123: Computer Networks Chris Kanich Quiz 1: Tuesday July 5th Lecture 4: CRC & Reliable Transmission Lecture 4 Overview CRC toward a better EDC Reliable Transmission
More informationA Survey of Recent Developments of TCP. Sally Floyd ACIRI (AT&T Center for Internet Research at ICSI) October 17, 2001
A Survey of Recent Developments of TCP Sally Floyd ACIRI (AT&T Center for Internet Research at ICSI) October 17, 2001 IEEE Annual Computer Communications Workshop 1 An overview of this session: This talk:
More informationDepartment of Electrical and Computer Systems Engineering
Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)
More informationChapter. Managed Switch Software Monitoring. In This Chapter...
Managed Switch Software Monitoring Chapter 23 In This Chapter... System Information...3 2 Port and Power Status...3 4 Network Statistics...3 5 Spanning Tree Status...3 8 Real-Time Ring Status...3 10 Multicast
More informationInternetworking Models The OSI Reference Model
Internetworking Models When networks first came into being, computers could typically communicate only with computers from the same manufacturer. In the late 1970s, the Open Systems Interconnection (OSI)
More informationMAC protocols. Lecturer: Dmitri A. Moltchanov
MAC protocols Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of MAC protocols Contention-based
More informationWiMOD LR Base Host Controller Interface
WiMOD LR Base Host Controller Interface Specification Version 1.10 Document ID: 4100/40140/0062 IMST GmbH Carl-Friedrich-Gauß-Str. 2-4 47475 KAMP-LINTFORT GERMANY Introduction Document Information File
More informationETSI TS V8.6.0 ( ) Technical Specification
Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; 3GPP Evolved Packet System (EPS); Optimized handover procedures and protocols between E-UTRAN access and cdma2000 HRPD Access;
More information3GPP TR V4.0.1 ( )
TR 25.936 V4.0.1 (2001-12) Technical Report 3 rd Generation Partnership Project (); Technical Specification Group (TSG) RAN 3; Handovers for real-time services from PS domain; (Release 4) The present document
More informationUniv. of Sci. and Tech. Beijing. Intended status: Standards Track. T. Watteyne Analog Devices March 30, 2018
6TiSCH Internet-Draft Intended status: Standards Track Expires: October 1, 2018 Q. Wang, Ed. Univ. of Sci. and Tech. Beijing X. Vilajosana Universitat Oberta de Catalunya T. Watteyne Analog Devices March
More informationTCP/IP. Chapter 5: Transport Layer TCP/IP Protocols
TCP/IP Chapter 5: Transport Layer TCP/IP Protocols 1 Objectives Understand the key features and functions of the User Datagram Protocol Explain the mechanisms that drive segmentation, reassembly, and retransmission
More informationTCP : Fundamentals of Computer Networks Bill Nace
TCP 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia Lab #1 due now! Reminder: Paper Review
More informationATNP WG2 Utrecht, Netherlands 29 June 1 July IDRP Security. Prepared by Ron Jones. Summary
ATNP WG2/WP 450 8 June 1998 ATNP WG2 Utrecht, Netherlands 29 June 1 July 1998 IDRP Security Prepared by Ron Jones Summary This working paper presents a review of ISO/IEC 10747 and Sub-Volume 5 as regards
More informationSURVEILLANCE DATA EXCHANGE
EUROPEAN ORGANISATION FOR THE SAFETY OF AIR NAVIGATION EUROCONTROL EUROCONTROL STANDARD DOCUMENT FOR SURVEILLANCE DATA EXCHANGE Part 10: Category 63 SUR.ET1.ST05.2000-STD-10-01 Edition : 0.21 Edition Date
More information3GPP TS V7.2.0 ( )
TS 25.462 V7.2.0 (2007-03) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Radio Access Network; UTRAN Iuant interface: Signalling transport (Release 7) The present
More informationInternet Engineering Task Force (IETF) Request for Comments: 7213 Category: Standards Track. M. Bocci Alcatel-Lucent June 2014
Internet Engineering Task Force (IETF) Request for Comments: 7213 Category: Standards Track ISSN: 2070-1721 D. Frost Blue Sun S. Bryant Cisco Systems M. Bocci Alcatel-Lucent June 2014 Abstract MPLS Transport
More informationTransport Over IP. CSCI 690 Michael Hutt New York Institute of Technology
Transport Over IP CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP What is a transport protocol? Choosing to use a transport protocol Ports and Addresses Datagrams UDP What is a
More informationMohamed Khedr.
Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing
More informationData Service Options for Spread Spectrum Systems:
GPP C.S00-0-A Version.0 May, 00 Data Service Options for Spread Spectrum Systems: Service Options and GPP 00 GPP and its Organizational Partners claim copyright in this document and individual Organizational
More informationApplied Networks & Security
Applied Networks & Security TCP/IP Protocol Suite http://condor.depaul.edu/~jkristof/it263/ John Kristoff jtk@depaul.edu IT 263 Spring 2006/2007 John Kristoff - DePaul University 1 ARP overview datalink
More informationCC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments
CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted
More informationCMPE150 Midterm Solutions
CMPE150 Midterm Solutions Question 1 Packet switching and circuit switching: (a) Is the Internet a packet switching or circuit switching network? Justify your answer. The Internet is a packet switching
More informationLecture 10: Link layer multicast. Mythili Vutukuru CS 653 Spring 2014 Feb 6, Thursday
Lecture 10: Link layer multicast Mythili Vutukuru CS 653 Spring 2014 Feb 6, Thursday Unicast and broadcast Usually, link layer is used to send data over a single hop between source and destination. This
More informationChapter 7: Data Link Control. CS420/520 Axel Krings Page 1
Chapter 7: Data Link Control CS420/520 Axel Krings Page 1 Data Link Control Protocols Need layer of logic above Physical to manage exchange of data over a link frame synchronization flow control error
More informationChapter 7: Data Link Control. Data Link Control Protocols
Chapter 7: Data Link Control CS420/520 Axel Krings Page 1 Data Link Control Protocols Need layer of logic above Physical to manage exchange of data over a link frame synchronization flow control error
More informationChapter 3. The Data Link Layer
Chapter 3 The Data Link Layer 1 Data Link Layer Algorithms for achieving reliable, efficient communication between two adjacent machines. Adjacent means two machines are physically connected by a communication
More informationRahman 1. Application
Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform
More informationTCP /IP Fundamentals Mr. Cantu
TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:
More informationThe Transport Layer Reliability
The Transport Layer Reliability CS 3, Lecture 7 http://www.cs.rutgers.edu/~sn4/3-s9 Srinivas Narayana (slides heavily adapted from text authors material) Quick recap: Transport Provide logical communication
More informationETSI TS V1.1.1 ( )
TS 102 369 V1.1.1 (2004-11) Technical Specification Methods for Testing and Specification (MTS); Stream Control Transmission Protocol (SCTP); Test Suite Structure and Test Purposes (TSS&TP) 2 TS 102 369
More informationUnit 7 Media Access Control (MAC)
Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC
More informationTransport Protocols & TCP TCP
Transport Protocols & TCP CSE 3213 Fall 2007 13 November 2007 1 TCP Services Flow control Connection establishment and termination Congestion control 2 1 TCP Services Transmission Control Protocol (RFC
More information