Network Simulation with OPNET
|
|
- Bertina Fox
- 6 years ago
- Views:
Transcription
1 CS 521 PROJECT 2 Network Simulation with OPNET Submitted by: Manish Mehta (manishmehta@india.com) Date: 04/16/2001
2 Scenario 1: Two file transfer TCP connections using the same link with two routers in between. The diagram below shows the system setup for this scenario: For this scenario, we have considered three different cases: Case 1: WORKSTATIONS: 1. Full : client1 client1 ethernet_wkstn T C P P A R A M E T E R S: Maximum Segment Size Ethernet Receive Buffer Receive Buffer Usage Threshold 0.0 Delayed ACK Mechanism Segment/Clock Based Maximum ACK Delay Fast Retransmit Disabled Fast Recovery Disabled Window Scaling Disabled Selective ACK (SACK) Disabled Nagle s SWS Avoidance Disabled Karn s Algorithm Enabled Retransmission Threshold Attempts based Initial RTO 1.0 Minimum RTO 0.5
3 Maximum RTO 64 RTT Gain Deviation Gain 0.25 RTT Deviation Coefficient 4.0 Timer Granularity 0.5 Persistence Timeout Full : client2 client2 ethernet_wkstn T C P P A R A M E T E R S: Maximum Segment Size Ethernet Receive Buffer 8760 Receive Buffer Usage Threshold 0.0 Delayed ACK Mechanism Segment/Clock Based Maximum ACK Delay Fast Retransmit Disabled Fast Recovery Disabled Window Scaling Disabled Selective ACK (SACK) Disabled Nagle s SWS Avoidance Disabled Karn s Algorithm Enabled Retransmission Threshold Attempts based Initial RTO 1.0 Minimum RTO 0.5 Maximum RTO 64 RTT Gain Deviation Gain 0.25 RTT Deviation Coefficient 4.0 Timer Granularity 0.5 Persistence Timeout 1.0 SERVER: Full : FTP_Server FTP_Server ethernet_server T C P P A R A M E T E R S: Maximum Segment Size Ethernet Receive Buffer Receive Buffer Usage Threshold 0.0 Delayed ACK Mechanism Segment/Clock Based Maximum ACK Delay Fast Retransmit Enabled Fast Recovery Enabled Window Scaling Disabled Selective ACK (SACK) Disabled Nagle s SWS Avoidance Disabled Karn s Algorithm Enabled Retransmission Threshold Time based Initial RTO 1.0 Minimum RTO 0.5
4 Maximum RTO 7.0 RTT Gain 0.1 Deviation Gain 0.1 RTT Deviation Coefficient 2.0 Timer Granularity 0.2 Persistence Timeout 1.0 S U P P O R T E D S E R V I C E S: FTP Description Supported APPLICATION CONFIGURATION: Full : node_2 node_2 application config A P P L I C A T I O N D E F I N I T I O N S: Command Mix 100% Inter-Request Time Constant (3600) File Size Constant ( ) Symbolic Server FTP Server Type of Service Best Effort (0) PROFILE CONFIGURATION: Full : node_3 node_3 profile config P R O F I L E C O N F I G U R A T I O N: Profile f1 Start Time Constant (10) Duration End of simulation Repeatability Once at start time P R O F I L E C O N F I G U R A T I O N.application FTP Start Time Offset Constant (10) Duration End of profile Repeatability Once at start time
5 CISCO 7000 ROUTER: Full : node_1 node_1 and node_4 CS_7000_6s_a_e6_fe2_fr4_sl4_tr4 IP Routing Speed 5000 PPP DS0: Full : node_4 <-> node_0 Transmitter A Receiver A Transmitter B Receiver B node_4 <-> node_0 PPP_DS0 node_4.pt_17_0 node_4.pr_17_0 node_0.output_1 node_0.input_1 Note: A similar link has been used between node_1 and node_0 ETHERNET 10BASET: Full : node_4 <-> FTP_Server Transmitter A Receiver A Transmitter B Receiver B node_4 <-> FTP_Server 10BaseT node_4.eth_port_tx_3_0 node_4.eth_port_rx_3_0 FTP_Server.hub_tx_0_0 FTP_Server.hub_rx_0_0 Note: A similar link has been used between client1/2 and node_1 Packet discarder Settings: All packets from time 200 sec 210 sec, 1100 sec 1110 sec, 2000 sec 2010 sec, 2200 sec 2210 sec are dropped by the packet discarder.
6 Case 1: Using the parameters shown above Fig. 1 The congestion window for the connection between the FTP Server and Client 1 Fig. 2 The congestion window for the connection between the FTP Server and Client 2
7 Fig. 3 The traffic received by client 1 Fig. 4 The traffic received by client 2
8 Case 2: Parameters changed Client 1 receive buffer : 4096 bytes Client 2 receive buffer : 4096 bytes Fig. 5 The congestion window for the connection between the FTP Server and Client 1 Fig. 6 The congestion window for the connection between the FTP Server and Client 2
9 Fig. 7 The traffic received by client 2 Fig. 8 The traffic received by client 1
10 Case 3: Parameters changed. Client 1 receive buffer : bytes Client 2 receive buffer : 200 bytes Fig. 9 The congestion window for the connection between the FTP Server and Client 1 Fig. 10 The congestion window for the connection between the FTP Server and Client 2
11 Fig. 11 The traffic received by client 1 Fig. 12 The traffic received by client 2
12 Scenario 2: Two file transfer TCP connections using the same link with four routers in between. The diagram below shows the system setup for this scenario: For this scenario, we have considered three different cases: WORKSTATIONS: 1. Full : node_5 node_5 ethernet_wkstn T C P P A R A M E T E R S: Maximum Segment Size 536 Receive Buffer Receive Buffer Usage Threshold 0.0 Delayed ACK Mechanism Segment/Clock Based Maximum ACK Delay Fast Retransmit Enabled Fast Recovery Enabled Window Scaling Disabled Selective ACK (SACK) Disabled Nagle s SWS Avoidance Disabled Karn s Algorithm Enabled Retransmission Threshold Attempts based
13 Initial RTO 0.5 Minimum RTO 0.5 Maximum RTO 4.0 RTT Gain Deviation Gain 0.25 RTT Deviation Coefficient 4.0 Timer Granularity 0.5 Persistence Timeout 1.0 Connection Information Do Not Print D E S T I N A T I O N P R E F E R E N C E S ss2 Selection Weight 10 S U P P O R T E D P R O F I L E S Profile FTP 2. Full : node_4 node_4 ethernet_wkstn Client Address Auto Assigned T C P P A R A M E T E R S: Maximum Segment Size 536 Receive Buffer 8760 Receive Buffer Usage Threshold 0.0 Delayed ACK Mechanism Segment/Clock Based Maximum ACK Delay Fast Retransmit Enabled Fast Recovery Enabled Window Scaling Disabled Selective ACK (SACK) Disabled Nagle s SWS Avoidance Disabled Karn s Algorithm Enabled Retransmission Threshold Attempts based Initial RTO 0.5 Minimum RTO 0.5 Maximum RTO 4.0 RTT Gain Deviation Gain 0.25 RTT Deviation Coefficient 4.0 Timer Granularity 0.5 Persistence Timeout 1.0 Connection Information Do Not Print D E S T I N A T I O N P R E F E R E N C E S ss1 Selection Weight 10 SERVERS: 1. Full : ftpserver1 Server Address ftpserver1 ethernet_server ss1
14 T C P P A R A M E T E R S: Maximum Segment Size 8192 Receive Buffer Receive Buffer Usage Threshold 0.0 Delayed ACK Mechanism Segment/Clock Based Maximum ACK Delay Fast Retransmit Enabled Fast Recovery Enabled Window Scaling Disabled Selective ACK (SACK) Disabled Nagle s SWS Avoidance Disabled Karn s Algorithm Enabled Retransmission Threshold Attempts based Initial RTO 0.5 Minimum RTO 0.5 Maximum RTO 7.0 RTT Gain Deviation Gain 0.25 RTT Deviation Coefficient 4.0 Timer Granularity 0.5 Persistence Timeout 1.0 Connection Information Do Not Print S U P P O R T E D S E R V I C E S: FTP1 Description Supported 2. Full : ftpserver2 ftpserver2 ethernet_server Server Address ss2 T C P P A R A M E T E R S: Maximum Segment Size 8192 Receive Buffer Receive Buffer Usage Threshold 0.0 Delayed ACK Mechanism Segment/Clock Based Maximum ACK Delay Fast Retransmit Enabled Fast Recovery Enabled Window Scaling Disabled Selective ACK (SACK) Disabled Nagle s SWS Avoidance Disabled Karn s Algorithm Enabled Retransmission Threshold Attempts based Initial RTO 0.5 Minimum RTO 0.5 Maximum RTO 7.0 RTT Gain Deviation Gain 0.25 RTT Deviation Coefficient 4.0 Timer Granularity 0.5 Persistence Timeout 1.0 Connection Information Do Not Print
15 S U P P O R T E D S E R V I C E S Profile FTP2 Description Supported CISCO 7000 ROUTER: Full : node_1 node_1 CS_7000_6s_a_e6_fe2_fr4_sl4_tr4 IP Routing Speed 5000 PROFILE CONFIGURATION: Full : ftp_1 ftp_1 Profile Config P R O F I L E C O N F I G U R A T I O N: Profile FTP Operation Mode Serial (Ordered) Start Time Constant (10) Duration End of simulation Repeatability Once at start time P R O F I L E C O N F I G U R A T I O N.application FTP1 Start Time Offset Constant (10) Duration End pf proffile Repeatability Once at start time APPLICATION PROFILE: Full : ftp1 ftp1 Application Config Voice Encoder Schemes All schemes A P P L I C A T I O N D E F I N I T I O N S:ftp1 Command Mix 100% Inter-Request Time Constant (20000) File Size Constant ( ) Symbolic Server FTP Server Type of Service Best Effort (0) RSVP Parameters None A P P L I C A T I O N D E F I N I T I O N S:ftp2 Command Mix 100% Inter-Request Time Constant (20000) File Size Constant ( ) Symbolic Server FTP Server Type of Service Best Effort (0) RSVP Parameters None PPP DS0: Link used between all the routers (64 kbps).
16 10BaseT: Remaining links in the setup.
17 Case 1: Using the parameters shown above Fig. 13 The congestion window diagram for the connection between node_4 and ftpserver1 Fig. 14 The congestion window diagram for the connection between node_5 and ftpserver2
18 Fig. 15 Traffic received by node_4 Fig. 16 Traffic received by node_5
19 Case 2: Parameters Changed: Receive Buffer for node_5 : 8760 bytes Receive Buffer for node_4 : bytes Fig. 17 The congestion window diagram for the connection between node_4 and ftpserver1 Fig. 18 The congestion window diagram for the connection between node_5 and ftpserver2
20 Fig. 19 Traffic received by node_4 Fig. 20 Traffic received by node_5
21 Case 3: Parameters Changed: Receive Buffer for node_5 : 200 bytes Receive Buffer for node_4 : bytes Fig. 21 The congestion window diagram for the connection between node_4 and ftpserver1 Fig. 22 The congestion window diagram for the connection between node_5 and ftpserver2
22 Fig. 23 Traffic received by node_5 Fig. 24 Traffic received by node_4
23 Scenario 3: A file transfer TCP connection and video conferencing traffic between two clients, using the same link with two routers in between. The diagram below shows the system setup for this scenario: WORKSTATIONS: 1. Full : client1 client1 ethernet_wkstn Client Address Auto Assigned T C P P A R A M E T E R S: Maximum Segment Size 536 Receive Buffer 8760 Receive Buffer Usage Threshold 0.0 Delayed ACK Mechanism Segment/Clock Based Maximum ACK Delay Fast Retransmit Disabled Fast Recovery Disabled Window Scaling Disabled Selective ACK (SACK) Disabled Nagle s SWS Avoidance Disabled Karn s Algorithm Enabled Retransmission Threshold Attempts based Initial RTO 1.0 Minimum RTO 0.5 Maximum RTO 64
24 RTT Gain Deviation Gain 0.25 RTT Deviation Coefficient 4.0 Timer Granularity 0.5 Persistence Timeout 1.0 S U P P O R T E D P R O F I L E S: Profile f1 2. Full : client2 client2 ethernet_wkstn Client Address c2 T C P P A R A M E T E R S: Maximum Segment Size 536 Receive Buffer Receive Buffer Usage Threshold 0.0 Delayed ACK Mechanism Segment/Clock Based Maximum ACK Delay Fast Retransmit Disabled Fast Recovery Disabled Window Scaling Disabled Selective ACK (SACK) Disabled Nagle s SWS Avoidance Disabled Karn s Algorithm Enabled Retransmission Threshold Attempts based Initial RTO 1.0 Minimum RTO 0.5 Maximum RTO 64 RTT Gain Deviation Gain 0.25 RTT Deviation Coefficient 4.0 Timer Granularity 0.5 Persistence Timeout 1.0 D E S T I N A T I O N P R E F E R E N C E S: Symbollic Video Destination Actual c3 S U P P O R T E D P R O F I L E S: Profile stream 3. Full : client3 Client Address T C P P A R A M E T E R S: Maximum Segment Size 536 Receive Buffer Client3 ethernet_wkstn c3 Receive Buffer Usage Threshold 0.0 Delayed ACK Mechanism Segment/Clock Based
25 Maximum ACK Delay Fast Retransmit Disabled Fast Recovery Disabled Window Scaling Disabled Selective ACK (SACK) Disabled Nagle s SWS Avoidance Disabled Karn s Algorithm Enabled Retransmission Threshold Attempts based Initial RTO 1.0 Minimum RTO 0.5 Maximum RTO 64 RTT Gain Deviation Gain 0.25 RTT Deviation Coefficient 4.0 Timer Granularity 0.5 Persistence Timeout 1.0 D E S T I N A T I O N P R E F E R E N C E S: Symbollic Video Destination Actual c3 S U P P O R T E D P R O F I L E S: Profile stream SERVER: Full : FTP_Server FTP_Server ethernet_server Server Address Auto Assigned T C P P A R A M E T E R S: Maximum Segment Size Ethernet Receive Buffer Receive Buffer Usage Threshold 0.0 Delayed ACK Mechanism Segment/Clock Based Maximum ACK Delay Fast Retransmit Enabled Fast Recovery Enabled Window Scaling Disabled Selective ACK (SACK) Disabled Nagle s SWS Avoidance Disabled Karn s Algorithm Enabled Retransmission Threshold Time based Initial RTO 1.0 Minimum RTO 0.5 Maximum RTO 9.0 RTT Gain 0.1 Deviation Gain 0.1 RTT Deviation Coefficient 2.0 Timer Granularity 0.2 Persistence Timeout 1.0 S U P P O R T E D S E R V I C E S: FTP Description Supported
26 CISCO 7000 ROUTER: Full : node_1 node_1 CS_7000_6s_a_e6_fe2_fr4_sl4_tr4 IP Routing Speed PROFILE CONFIGURATIONS: 1. Full : node_3 (FTP) node_3 Profile Config P R O F I L E C O N F I G U R A T I O N: Profile f1 Operation Mode Simultaneous Start Time Constant (5) Duration End of simulation Repeatability Once at start time P R O F I L E C O N F I G U R A T I O N.application FTP Start Time Offset Constant (10) Duration End pf proffile Repeatability Once at start time 2. Full : stream Stream Profile Config P R O F I L E C O N F I G U R A T I O N: Profile Stream Operation Mode Serial (Ordered) Start Time Constant (70) Duration End of simulation Repeatability Once at start time P R O F I L E C O N F I G U R A T I O N.application Stream Start Time Offset Constant (10) Duration End pf proffile Repeatability Unlimited APPLICATION PROFILE: 1. Full : node_2 (FTP) node_2 Application Config Voice Encoder Schemes All schemes A P P L I C A T I O N D E F I N I T I O N S:ftp1 Command Mix 100% Inter-Request Time Constant (3600) File Size Constant ( ) Symbolic Server FTP Server
27 Type of Service Best Effort (0) RSVP Parameters None 2. Full : streaapp (Stream) StreaApp Application Config Voice Encoder Schemes All schemes A P P L I C A T I O N D E F I N I T I O N S. Description VIDEO CONFERENCING Frame Size Information 128 * 120 pixels Symbollic Destination Video Destination Type of Service Streaming Multimedia (4) Incoming Stream Interarrival Time Constant (0.2) Outgoing Stream Interarrival Time Constant (0.2) R S V P P A R A M E T E R S RSVP Status Disabled Outbound Flow Default Inbound Flow Default
28 Fig. 25 Congestion window for Client1 Fig. 26 Traffic received by client1
29 Fig. 27 Traffic received by client2 Fig. 28 Traffic received by client3
30 Fig. 29 Traffic sent by client 3 Fig. 30 Traffic sent by client 2
SIMULATION FRAMEWORK MODELING
CHAPTER 5 SIMULATION FRAMEWORK MODELING 5.1 INTRODUCTION This chapter starts with the design and development of the universal mobile communication system network and implementation of the TCP congestion
More informationPerformance Evaluation of TCP over WLAN with the Snoop Performance Enhancing Proxy
Performance Evaluation of TCP over WLAN 802.11 with the Snoop Performance Enhancing Proxy Case study Chi-ho Ng, Jack Chow, and Ljiljana Trajković Simon Fraser University 1 Roadmap Introducing the problem
More informationTCP Congestion Control
TCP Congestion Control What is Congestion The number of packets transmitted on the network is greater than the capacity of the network Causes router buffers (finite size) to fill up packets start getting
More informationTCP Congestion Control
What is Congestion TCP Congestion Control The number of packets transmitted on the network is greater than the capacity of the network Causes router buffers (finite size) to fill up packets start getting
More informationObjective To examine the throughput of a TCP connection as the flow control window size is varied.
Lab 7 TCP Throughput Overview TCP uses a sliding window mechanism to provide flow control. The destination advertises how much space it has available in its buffers, and the source restricts its transmissions
More informationThe Impact of Delay Variations on TCP Performance
INSTITUT FÜR KOMMUNIKATIONSNETZE UND RECHNERSYSTEME Prof. Dr.-Ing. Dr. h. c. mult. P. J. Kühn The Impact of Delay Variations on TCP Performance Michael Scharf scharf@ikr.uni-stuttgart.de ITG FG 5.2.1 Workshop,
More informationTransport Protocols and TCP: Review
Transport Protocols and TCP: Review CSE 6590 Fall 2010 Department of Computer Science & Engineering York University 1 19 September 2010 1 Connection Establishment and Termination 2 2 1 Connection Establishment
More informationTCP Congestion Control in Wired and Wireless networks
TCP Congestion Control in Wired and Wireless networks Mohamadreza Najiminaini (mna28@cs.sfu.ca) Term Project ENSC 835 Spring 2008 Supervised by Dr. Ljiljana Trajkovic School of Engineering and Science
More informationOrder of Packet Transmission and Dropping
Laboratory 9 Queuing Disciplines Order of Packet Transmission and Dropping Objective The objective of this lab is to examine the effect of different queuing disciplines on packet delivery and delay for
More informationTransport Protocols & TCP TCP
Transport Protocols & TCP CSE 3213 Fall 2007 13 November 2007 1 TCP Services Flow control Connection establishment and termination Congestion control 2 1 TCP Services Transmission Control Protocol (RFC
More informationQueuing Disciplines. Order of Packet Transmission and Dropping. Laboratory. Objective. Overview
Laboratory 2 Queuing Disciplines Order of Packet Transmission and Dropping Objective The objective of this lab is to examine the effect of different queuing disciplines on packet delivery and delay for
More informationOutline. CS5984 Mobile Computing
CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline Review Transmission Control Protocol (TCP) Based on Behrouz Forouzan, Data Communications and Networking,
More informationNetwork Protocols. Transmission Control Protocol (TCP) TDC375 Autumn 2009/10 John Kristoff DePaul University 1
Network Protocols Transmission Control Protocol (TCP) TDC375 Autumn 2009/10 John Kristoff DePaul University 1 IP review IP provides just enough connected ness Global addressing Hop by hop routing IP over
More informationTCP: Flow and Error Control
1 TCP: Flow and Error Control Required reading: Kurose 3.5.3, 3.5.4, 3.5.5 CSE 4213, Fall 2006 Instructor: N. Vlajic TCP Stream Delivery 2 TCP Stream Delivery unlike UDP, TCP is a stream-oriented protocol
More informationOrder of Packet Transmission and Dropping
LAB 11 Queuing Disciplines Order of Packet Transmission and Dropping OBJECTIVES The objective of this lab is to examine the effect of various queuing disciplines on packet delivery and delay for different
More informationGuide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16
Guide To TCP/IP, Second Edition Chapter 5 Transport Layer TCP/IP Protocols Objectives Understand the key features and functions of the User Datagram Protocol (UDP) Explain the mechanisms that drive segmentation,
More informationTCP/IP. Chapter 5: Transport Layer TCP/IP Protocols
TCP/IP Chapter 5: Transport Layer TCP/IP Protocols 1 Objectives Understand the key features and functions of the User Datagram Protocol Explain the mechanisms that drive segmentation, reassembly, and retransmission
More informationMobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods
Mobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods 1 Timeout freezing of transmission (TFT) Used in situations where
More informationTCP Flavors Simulation Evaluations over Noisy Environment
International Journal of Information Engineering and Applications 2018; 1(1): 11-17 http://www.aascit.org/journal/information TCP Flavors Simulation Evaluations over Noisy Environment Elsadig Gamaleldeen
More informationUNIT IV -- TRANSPORT LAYER
UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission
More informationSequence Number. Acknowledgment Number. Data
CS 455 TCP, Page 1 Transport Layer, Part II Transmission Control Protocol These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make
More informationCongestion / Flow Control in TCP
Congestion and Flow Control in 1 Flow Control and Congestion Control Flow control Sender avoids overflow of receiver buffer Congestion control All senders avoid overflow of intermediate network buffers
More informationTransmission Control Protocol. ITS 413 Internet Technologies and Applications
Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion
More informationYour Name: Your student ID number:
CSC 573 / ECE 573 Internet Protocols October 11, 2005 MID-TERM EXAM Your Name: Your student ID number: Instructions Allowed o A single 8 ½ x11 (front and back) study sheet, containing any info you wish
More informationCS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007
CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 Question 344 Points 444 Points Score 1 10 10 2 10 10 3 20 20 4 20 10 5 20 20 6 20 10 7-20 Total: 100 100 Instructions: 1. Question
More informationInternet Networking recitation #10 TCP New Reno Vs. Reno
recitation #0 TCP New Reno Vs. Reno Spring Semester 200, Dept. of Computer Science, Technion 2 Introduction Packet Loss Management TCP Reno (RFC 258) can manage a loss of at most one packet from a single
More informationTransport Protocols CS 640 1
Transport Protocols CS 640 1 Reliability CS 640 2 Sliding Window Revisited TCP s variant of the sliding window algorithm, which serves several purposes: (1) it guarantees the reliable delivery of data,
More informationSIP System Features. Differentiated Services Codepoint CHAPTER
CHAPTER 6 Revised: December 30 2007, This chapter describes features that apply to all SIP system operations. It includes the following topics: Differentiated Services Codepoint section on page 6-1 Limitations
More informationUser Datagram Protocol (UDP):
SFWR 4C03: Computer Networks and Computer Security Feb 2-5 2004 Lecturer: Kartik Krishnan Lectures 13-15 User Datagram Protocol (UDP): UDP is a connectionless transport layer protocol: each output operation
More informationfile:///c:/users/hpguo/dropbox/website/teaching/fall 2017/CS4470/H...
1 of 9 11/26/2017, 11:28 AM Homework 3 solutions 1. A window holds bytes 2001 to 5000. The next byte to be sent is 3001. Draw a figure to show the situation of the window after the following two events:
More informationChapter 24. Transport-Layer Protocols
Chapter 24. Transport-Layer Protocols 23.1 Introduction 23.2 User Datagram Protocol 23.3 Transmission Control Protocol 23.4 SCTP Computer Networks 24-1 Position of Transport-Layer Protocols UDP is an unreliable
More informationSIP System Features. SIP Timer Values. Rules for Configuring the SIP Timers CHAPTER
CHAPTER 4 Revised: October 30, 2012, This chapter describes features that apply to all SIP system operations. It includes the following topics: SIP Timer Values, page 4-1 Limitations on Number of URLs,
More informationTCP Congestion Control in Wired and Wireless Networks
TCP Congestion Control in Wired and Wireless Networks ENCS 835 Course Project Spring 2008 April 7, 2008 Presented by: Mohamadreza Najiminaini Professor: Ljiljana Trajkovic 4/16/2008 1 Roadmap Introduction
More informationSTUDY OF TCP THROUGHPUT ON NETWORK SIMULATOR OPNET++ BY USING DIFFERENT PARAMETERS
STUDY OF TCP THROUGHPUT ON NETWORK SIMULATOR OPNET++ BY USING DIFFERENT PARAMETERS Bhargava Neeraj*, Kumawat Anchal 1, Bhargava Ritu 2 and Kumar Bharat 3 1. Department of Computer Science, School of Engineering
More information8. TCP Congestion Control
8. TCP Congestion Control 1 TCP Congestion Control Slow-start increase Multiplicative decrease Congestion avoidance Measurement of variation Exponential timer backoff 2002 Yanghee Choi 2 Congestion Control
More informationTCP/IP Performance ITL
TCP/IP Performance ITL Protocol Overview E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP IP ICMP ARP RARP (Auxiliary Services) Ethernet, X.25, HDLC etc. ATM 4/30/2002 Hans Kruse & Shawn Ostermann,
More informationc) With the selective repeat protocol, it is possible for the sender to receive an ACK for a packet that falls outside of its current window.
Part 1 Question 1 [0.5 Marks] Suppose an application generates chunks of 40 bytes of data every 20 msec, and each chunk gets encapsulated by a TCP segment and then an IP datagram. What percentage of each
More informationIntro to LAN/WAN. Transport Layer
Intro to LAN/WAN Transport Layer Transport Layer Topics Introduction (6.1) Elements of Transport Protocols (6.2) Internet Transport Protocols: TDP (6.5) Internet Transport Protocols: UDP (6.4) socket interface
More informationEnhancing TCP Throughput over Lossy Links Using ECN-Capable Capable RED Gateways
Enhancing TCP Throughput over Lossy Links Using ECN-Capable Capable RED Gateways Haowei Bai Honeywell Aerospace Mohammed Atiquzzaman School of Computer Science University of Oklahoma 1 Outline Introduction
More informationCS321: Computer Networks Error and Flow Control in TCP
CS321: Computer Networks Error and Flow Control in TCP Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in SEQ and ACK numbers in TCP TCP views data as an unstructured,
More informationDualRTT: Enhancing TCP Performance During Delay Spikes
DualRTT: Enhancing TCP Performance During Delay Spikes Ph.D. School of Computer Science University of Oklahoma. Email: atiq@ieee.org Web: www.cs.ou.edu/~atiq Presentation at Tohoku University, Sendai,
More informationData Communication Networks Final
Data Communication Networks Final Saad Mneimneh Visiting Professor Hunter College of CUNY NAME: This final test is take home... There are 8 Problems (but each problem has multiple parts, possibly on separate
More informationUNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING
UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING ECE361 Computer Networks Midterm March 06, 2017, 6:15PM DURATION: 80 minutes Calculator Type: 2 (non-programmable calculators) Examiner:
More informationTransport Layer TCP / UDP
Transport Layer TCP / UDP Chapter 6 section 6.5 is TCP 12 Mar 2012 Layers Application Transport Why do we need the Transport Layer? Network Host-to-Network/Physical/DataLink High Level Overview TCP (RFC
More informationCS 716: Introduction to communication networks th class; 7 th Oct Instructor: Sridhar Iyer IIT Bombay
CS 716: Introduction to communication networks - 18 th class; 7 th Oct 2011 Instructor: Sridhar Iyer IIT Bombay Reliable Transport We have already designed a reliable communication protocol for an analogy
More informationCS 349/449 Internet Protocols Final Exam Winter /15/2003. Name: Course:
CS 349/449 Internet Protocols Final Exam Winter 2003 12/15/2003 Name: Course: Instructions: 1. You have 2 hours to finish 2. Question 9 is only for 449 students 3. Closed books, closed notes. Write all
More informationII. Principles of Computer Communications Network and Transport Layer
II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part
More informationTransport Protocols and TCP
Transport Protocols and TCP Functions Connection establishment and termination Breaking message into packets Error recovery ARQ Flow control Multiplexing, de-multiplexing Transport service is end to end
More informationRouter and ACL ACL Filter traffic ACL: The Three Ps One ACL per protocol One ACL per direction One ACL per interface
CCNA4 Chapter 5 * Router and ACL By default, a router does not have any ACLs configured and therefore does not filter traffic. Traffic that enters the router is routed according to the routing table. *
More informationTCP over Wireless PROF. MICHAEL TSAI 2016/6/3
TCP over Wireless PROF. MICHAEL TSAI 2016/6/3 2 TCP Congestion Control (TCP Tahoe) Only ACK correctly received packets Congestion Window Size: Maximum number of bytes that can be sent without receiving
More informationCMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 25, 2018
CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet IP
More informationComputer Communication Networks Midterm Review
Computer Communication Networks Midterm Review ICEN/ICSI 416 Fall 2018 Prof. Aveek Dutta 1 Instructions The exam is closed book, notes, computers, phones. You can use calculator, but not one from your
More informationIIP Wireless. Presentation Outline
IIP Wireless Improving Internet Protocols for Wireless Links Markku Kojo Department of Computer Science www.cs cs.helsinki.fi/research/.fi/research/iwtcp/ 1 Presentation Outline Project Project Summary
More informationSIP System Features. SIP Timer Values. Rules for Configuring the SIP Timers CHAPTER
CHAPTER 4 Revised: March 24, 2011, This chapter describes features that apply to all SIP system operations. It includes the following topics: SIP Timer Values, page 4-1 SIP Session Timers, page 4-7 Limitations
More informationComputer Networks and Data Systems
Computer Networks and Data Systems Transport Layer TDC463 Winter 2011/12 John Kristoff - DePaul University 1 Why a transport layer? IP gives us end-to-end connectivity doesn't it? Why, or why not, more
More informationFINAL May 21, minutes
CS 421: COMPUTER NETWORKS SPRING 2004 FINAL May 21, 2004 160 minutes Name: Student No: 1) a) Consider a 1 Mbits/sec channel with a 20 msec one-way propagation delay, i.e., 40 msec roundtrip delay. We want
More informationPage 1. Review: Internet Protocol Stack. Transport Layer Services. Design Issue EEC173B/ECS152C. Review: TCP
EEC7B/ECS5C Review: Internet Protocol Stack Review: TCP Application Telnet FTP HTTP Transport Network Link Physical bits on wire TCP LAN IP UDP Packet radio Transport Layer Services Design Issue Underlying
More informationCS 356: Introduction to Computer Networks. Lecture 16: Transmission Control Protocol (TCP) Chap. 5.2, 6.3. Xiaowei Yang
CS 356: Introduction to Computer Networks Lecture 16: Transmission Control Protocol (TCP) Chap. 5.2, 6.3 Xiaowei Yang xwy@cs.duke.edu Overview TCP Connection management Flow control When to transmit a
More informationPreview Test: HW3. Test Information Description Due:Nov. 3
Preview Test: HW3 Test Information Description Due:Nov. 3 Instructions Multiple Attempts Not allowed. This test can only be taken once. Force Completion This test can be saved and resumed later. Question
More informationTransport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections
Application / Transport Interface Application requests service from transport layer Transport Layer Application Layer Prepare Transport service requirements Data for transport Local endpoint node address
More informationCross-layer TCP Performance Analysis in IEEE Vehicular Environments
24 Telfor Journal, Vol. 6, No. 1, 214. Cross-layer TCP Performance Analysis in IEEE 82.11 Vehicular Environments Toni Janevski, Senior Member, IEEE, and Ivan Petrov 1 Abstract In this paper we provide
More informationMidterm Review. EECS 489 Computer Networks Z. Morley Mao Monday Feb 19, 2007
Midterm Review EECS 489 Computer Networks http://www.eecs.umich.edu/courses/eecs489/w07 Z. Morley Mao Monday Feb 19, 2007 Acknowledgement: Some slides taken from Kurose&Ross and Katz&Stoica 1 Adminstrivia
More informationRSVP: Resource Reservation Protocol
LAB 12 RSVP: Resource Reservation Protocol Providing QoS by Reserving Resources in the Network OBJECTIVES The objective of this lab is to study the Resource Reservation Protocol (RSVP) as part of the integrated
More informationSolution to Question 1: ``Quickies'' (25 points, 15 minutes)
Solution to Question : ``Quickies'' (25 points, 5 minutes) What is meant by the term statistical multiplexing? Answer: In statistical multiplexing, data from multiple users (senders) is sent over a link.
More informationNetwork Management & Monitoring Network Delay
Network Management & Monitoring Network Delay These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) End-to-end
More informationMobile Transport Layer Lesson 02 TCP Data Stream and Data Delivery
Mobile Transport Layer Lesson 02 TCP Data Stream and Data Delivery 1 TCP Data Stream Consists of bytes Delivered using a virtual connection between sockets Each socket has the port number and IP address
More informationConfigure IP SLA Tracking for IPv4 Static Routes on an SG550XG Switch
Configure IP SLA Tracking for IPv4 Static Routes on an SG550XG Switch Introduction When using static routing, you may experience a situation where a static route is active, but the destination network
More informationEng 3553 Lab #5 TCP Throughput
Eng 3553 Lab #5 TCP Throughput Overview TCP (Transmission Control Protocol) is a means for building a reliable communications stream, enabling two hosts to establish a connection and exchange streams of
More informationLecture 3: The Transport Layer: UDP and TCP
Lecture 3: The Transport Layer: UDP and TCP Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 3-1 The Transport Layer Provides efficient and robust end-to-end
More informationNetworked Systems and Services, Fall 2018 Chapter 3
Networked Systems and Services, Fall 2018 Chapter 3 Jussi Kangasharju Markku Kojo Lea Kutvonen 4. Transport Layer Reliability with TCP Transmission Control Protocol (TCP) RFC 793 + more than hundred other
More informationTCP. CSU CS557, Spring 2018 Instructor: Lorenzo De Carli (Slides by Christos Papadopoulos, remixed by Lorenzo De Carli)
TCP CSU CS557, Spring 2018 Instructor: Lorenzo De Carli (Slides by Christos Papadopoulos, remixed by Lorenzo De Carli) 1 Sources Fall and Stevens, TCP/IP Illustrated Vol. 1, 2nd edition Congestion Avoidance
More informationNetworked Systems and Services, Fall 2017 Reliability with TCP
Networked Systems and Services, Fall 2017 Reliability with TCP Jussi Kangasharju Markku Kojo Lea Kutvonen 4. Transmission Control Protocol (TCP) RFC 793 + more than hundred other RFCs TCP Loss Recovery
More information05 Transmission Control Protocol (TCP)
SE 4C03 Winter 2003 05 Transmission Control Protocol (TCP) Instructor: W. M. Farmer Revised: 06 February 2003 1 Interprocess Communication Problem: How can a process on one host access a service provided
More informationThe Network Layer and Routers
The Network Layer and Routers Daniel Zappala CS 460 Computer Networking Brigham Young University 2/18 Network Layer deliver packets from sending host to receiving host must be on every host, router in
More informationShared Ethernet Networks
Lab 1 Shared Ethernet Networks Overview In a shared Ethernet network, end systems are typically connected together using a hub. The hub retransmits any incoming frames on all outgoing lines creating a
More informationTopics. TCP sliding window protocol TCP PUSH flag TCP slow start Bulk data throughput
Topics TCP sliding window protocol TCP PUSH flag TCP slow start Bulk data throughput 2 Introduction In this chapter we will discuss TCP s form of flow control called a sliding window protocol It allows
More informationPage 1. Review: Internet Protocol Stack. Transport Layer Services EEC173B/ECS152C. Review: TCP. Transport Layer: Connectionless Service
EEC7B/ECS5C Review: Internet Protocol Stack Review: TCP Application Telnet FTP HTTP Transport Network Link Physical bits on wire TCP LAN IP UDP Packet radio Do you remember the various mechanisms we have
More informationPaper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015
Paper solution Subject: Computer Networks (TE Computer- 2012 pattern) Marks : 30 Date: 5/2/2015 Q1 a) What is difference between persistent and non persistent HTTP? Also Explain HTTP message format. [6]
More informationConsidering Spurious Timeout in Proxy for Improving TCP Performance in Wireless Networks
Considering Spurious Timeout in Proxy for Improving TCP Performance in Wireless Networks YuChul Kim Telecommunication R&D Center, Samsung Electronics,Co., Ltd yuchul.kim@samsung.com DongHo Cho Communication
More informationCongestion Control. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Congestion Control Daniel Zappala CS 460 Computer Networking Brigham Young University 2/25 Congestion Control how do you send as fast as possible, without overwhelming the network? challenges the fastest
More informationRD-TCP: Reorder Detecting TCP
RD-TCP: Reorder Detecting TCP Arjuna Sathiaseelan and Tomasz Radzik Department of Computer Science, King s College London, Strand, London WC2R 2LS {arjuna,radzik}@dcs.kcl.ac.uk Abstract. Numerous studies
More informationCS457 Transport Protocols. CS 457 Fall 2014
CS457 Transport Protocols CS 457 Fall 2014 Topics Principles underlying transport-layer services Demultiplexing Detecting corruption Reliable delivery Flow control Transport-layer protocols User Datagram
More informationTCP s Retransmission Timer and the Minimum RTO
TCP s Retransmission Timer and the Minimum RTO Alae Loukili, Alexander L. Wijesinha, Ramesh K. Karne, and Anthony K. Tsetse Department of Computer & Information Sciences Towson University Towson, MD 2122,
More informationTCP/IP-2. Transmission control protocol:
TCP/IP-2 Transmission control protocol: TCP and IP are the workhorses in the Internet. In this section we first discuss how TCP provides reliable, connectionoriented stream service over IP. To do so, TCP
More informationToward a Reliable Data Transport Architecture for Optical Burst-Switched Networks
Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University
More informationTSIN02 - Internetworking
Lecture 4: Transport Layer Literature: Forouzan: ch 11-12 2004 Image Coding Group, Linköpings Universitet Lecture 4: Outline Transport layer responsibilities UDP TCP 2 Transport layer in OSI model Figure
More informationTransport Layer. -UDP (User Datagram Protocol) -TCP (Transport Control Protocol)
Transport Layer -UDP (User Datagram Protocol) -TCP (Transport Control Protocol) 1 Transport Services The transport layer has the duty to set up logical connections between two applications running on remote
More informationNeural-based TCP performance modelling
Section 1 Network Systems Engineering Neural-based TCP performance modelling X.D.Xue and B.V.Ghita Network Research Group, University of Plymouth, Plymouth, United Kingdom e-mail: info@network-research-group.org
More informationCS268: Beyond TCP Congestion Control
TCP Problems CS68: Beyond TCP Congestion Control Ion Stoica February 9, 004 When TCP congestion control was originally designed in 1988: - Key applications: FTP, E-mail - Maximum link bandwidth: 10Mb/s
More informationIntroduction to Protocols
Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These
More informationTSIN02 - Internetworking
Lecture 4: Transport Layer Literature: Forouzan: ch 11-12 2004 Image Coding Group, Linköpings Universitet Lecture 4: Outline Transport layer responsibilities UDP TCP 2 Transport layer in OSI model Figure
More informationCHAPTER 4. The main aim of this chapter is to discuss the simulation procedure followed in
CHAPTER 4 4. Simulation procedure 4.1 Introduction The main aim of this chapter is to discuss the simulation procedure followed in evaluating the performance of AODV under black hole attacks. As discussed
More informationHomework #4. Due: December 2, 4PM. CWND (#pkts)
Homework #4 Due: December 2, 2009 @ 4PM EE122: Introduction to Communication Networks (Fall 2009) Department of Electrical Engineering and Computer Sciences College of Engineering University of California,
More informationInvestigations on TCP Behavior during Handoff
Investigations on TCP Behavior during Handoff Thomas Schwabe, Jörg Schüler Technische Universität Dresden Outlook 1. Transport Control Protocol - TCP Overview TCP versions 2. Simulation scenarios Local
More informationLTE system performance optimization by RED based PDCP buffer management
LTE system performance optimization by RED based PDCP buffer management Umar Toseef 1,2, Thushara Weerawardane 2, Andreas Timm-Giel 2, Carmelita Görg 1 1, University of Bremen, Bremen, Germany 2, TUHH,
More informationOn Inter-layer Assumptions
On Inter-layer Assumptions (A View from the Transport Area) Mark Handley ACIRI/ICSI mjh@aciri.org Ping The Internet Hourglass FTP HTTP NNTP SMTP NFS DNS Applications TCP UDP ICMP IP 802.x PPP SLIP RS232
More informationTransport Protocols for Networked Games
Transport Protocols for Networked Games 1 TCP or UDP? 2 Why use TCP? TCP provides reliable, in-order delivery TCP goes through most firewalls, UDP does not TCP manages connection for us 3 Why not to use
More informationA THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS S.P.Valli 1,K.M.Mehata 2 1 vallisp@yahoo.com Department of Computer Science and Engineering B.S.Abdur Rahman University,Chennai. 2 kmmehata@bsauniv.ac.in
More informationCCNA 1 Chapter 7 v5.0 Exam Answers 2013
CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the
More informationTCP/IP Networking. Part 4: Network and Transport Layer Protocols
TCP/IP Networking Part 4: Network and Transport Layer Protocols Orientation Application Application protocol Application TCP TCP protocol TCP IP IP protocol IP IP protocol IP IP protocol IP Network Access
More information