Transactions on Information and Communications Technologies vol 9, 1995 WIT Press, ISSN

Size: px
Start display at page:

Download "Transactions on Information and Communications Technologies vol 9, 1995 WIT Press, ISSN"

Transcription

1 Transactions on Information and Communications Technologies vol 9, 995 WIT Press, ISSN Communications over ATM: communication software optimizing the L. Delgrossi*, G. Lo Re* "IBM European Networking Center, Wangerovstr., D-6900 Heidelberg, Germany ^Centro Studi sulle Reti di Elaboratori, Consiglio Nazionale delle Ricerche, Viale delle Scienze, 90 Palermo, Italy Abstract The last few years have seen network data rates skyrocket from a few Mbps to a Gbps or more. However, a lack of integration of the host-network interface, the operating system, and network protocols has resulted in end-applications that are able to exploit only a small fraction of the total bandwidth available for data transfer. This paper investigates the performances of the TCP/IP protocols over ATM networks. TCP/IP is the "de facto" standard for internetworking; the Asynchronous Transfer Mode is a standard networking technology for the broadband ISDN currently under development. The analysis activity included collecting traces with respect to different configurations of the relevant communication parameters involved. Introduction An advanced field in the computing world is represented by emerging multimedia applications comprising remote visualization, medical imaging, tele-conferencing, remote collaboration, and video distribution. Such applications are dependent upon the performance of the communication subsystem, which includes the communication network, network/host interconnection and the host itself. These applications require not only highspeed networks but also carefully engineered end-to-end protocols. These protocols have to be efficiently implemented within the constraints of the various existing operating systems and host architectures. For this kind of applications high-performance workstations are available today. Unfortunately, such machines have been optimized for computational tasks while the large band available with the most recent networking technology poses significant challenges to the communication subsystem. These challenges have in the last few years motivated, among the others, the design and development of new

2 Transactions on Information and Communications Technologies vol 9, 995 WIT Press, ISSN High-Performance Computing in Engineering communication protocols as ST-II [] and RSVP []. However, the world-wide diffusion of the TCP/IP protocols family and the not negligible time required for the complete acceptance and diffusion of the new standards, suggest an analysis of the TCP/IP protocols to study their behaviour within the new applications. Many articles and studies on TCP/IP performance have been published in the past, e.g. [3], [7]. The majority of them presents results of analysis and experimentations over the traditional networks for applications without specific demands on terms of high throughput. The introduction of fiber optics and the use of ATM technology [] resulted in high-speed transmission links and, as a consequence, the fastest paths are moving out of the domain for which TCP was originally engineered. This paper presents the first results of a study aimed to characterize the performance of TCP/IP protocols over an ATM network connecting a cluster of IBM workstations. The main objective of this activity has been to evaluate the performance of TCP/IP in terms of data throughput and end-to-end delay Indications on how to run TCP/IP over ATM can be found in [4] and [6]. A set of extensions to the TCP protocol to broaden the domain of its application to match the increasing network capability has been recently proposed by Jacobson [4]. This paper is organized as follows. Section presents an overview of ATM and TCP/IP implementation in the AIX kernel. Section 3 describes the scenarios considered in the performance study and shows the results of the various experiments and measurements. Finally, Section 4 concludes with somefinalremarks. Asynchronous Transfer Mode Asynchronous Transfer Mode (ATM) is the most compelling of the emerging networking technology due to the benefits it provides in terms of speed, scalability, and isochronous functionality. ATM has no throughput barriers and can support any data type It can scale with CPU performance increases, and is ideally suited for multimedia collaborative applications. Currently, ATM is evolving as standard networking technology for the broadband ISDN. The characteristics and features of ATM networks are different than those found in traditional LANs. In particular: ATM provides a Virtual Connection (VC) switched environment. VC setup may be done on either a Permanent Virtual Connection (PVC) or dynamic Switched Virtual Connection (SVC) basis. Data to be passed by a VC is segmented into 53 octet quantities called cells (5 octets of ATM header and 4 octets of data). The function of mapping user Protocol Data Units (PDUs) into the information field of the ATM cell and vice versa is performed by the ATM Adaptation Layer (AAL) When a VC is created a specific AAL type is associated with the VC There are four different AAL types, which are referred to individually as "AALT, "AAL", "AAL3/4", and "AAL5. The ATM Adaptation Layer used in this study is AAL5 Laubach [4] defines the standard values to be adopted for AAL5: the default MTU size for IP members operating over the ATM network is 90 octets; the LLC/SNAP

3 Transactions on Information and Communications Technologies vol 9, 995 WIT Press, ISSN High-Performance Computing in Engineering 3 header is octets, therefore the default ATM AAL5 protocol data unit size is 9 octets. CPCS PDU Trailer CPCS-PDU PAD CPCS-UTI CPI Length CRC up to ^ Figure : AAL5 CPCS-PDU Format. The TCP/IP AIX Implementation This section describes the TCP/IP sockets data processing at the sender and receiver sides. In AIX, applications that use TCP/IP protocols to communicate across networks use the socket abstraction. In the application layer, a program needing access to network communication has to open a socket and to specify the type of service required: connection-oriented over TCP or connection-less over UDP datagrams. The semantics of opening, reading, and writing to sockets are similar to those for manipulating files. As an application writes to a socket, the data is copied from user space into the socket send buffer in kernel space. The socket send buffer is made up of smaller buffers called mbufs, which are organized into linked lists. Once the data is copied into the socket send buffer, the socket layer calls the TCP layer, passing it a pointer to the linked list of mbufs (mbuf chain). The TCP layer allocates a new mbuf for its header information, and copies the data in the socket send buffer into the TCP header mbuf, if there is room, or into a newly allocated mbuf chain TCP then checksums the data, updates its various state variables, which are used for flow control and other services, and calls the IP layer, with the header mbuf now linked to the new mbuf chain (in the TCP layer, this chain is called a segment). The Internet Protocol (IP) layer determines which interface the mbuf chain should be sent to, updates and checksums the IP part of the header sent from TCP, and passes the chain (a packet to IP) to the Interface (IF) layer. The IF layer prepends the link (ATM) layer header information in the TCP/IP header mbuf, checks the format of the mbufs to make sure they conform to the device driver's input specifications, and then calls the device driver write routine. At the device driver layer, the mbuf chain containing the data is enqueued on the transmit queue and the adapter is signaled to start transmission or direct memory access (DMA) operations.at this point, control returns up the path to the TCP output routine, which continues sending as long as it has more to send. When all data has been sent, control returns to the application, which then runs asynchronously while the adapter transmits data. When the adapter has completed transmission, it interrupts the system and the device interrupt routines are called to adjust the transmit queues and free the mbufs that held the transmitted data. On the receive side, an application opens a socket, establishes a connection when required, and attempts to read data from it. If there is no data in the socket receive buffer, the socket layer causes the application to go to the sleep state (blocking) until data arrives. When packets are received by the adapter, they are transferred, using DMA, from the adapter into chain of mbufs resident in kernel space. The adapter the interrupts the system. The device driver software serves the interrupt starts protocol processing at the IF layer.

4 Transactions on Information and Communications Technologies vol 9, 995 WIT Press, ISSN High-Performance Computing in Engineering The IF layer removes the link header and enqueues the mbuf chain (done with pointers, no copy) on the IP input queue and schedules an off-level interrupt to do the IP input processing. When the off-level interrupt occurs, the IP input routine sequels the mbuf chain, checks the IP header checksum to make sure the header was not corrupted, determines if the packet is for this system, and if so, passes the mbuf chain to the TCP input routine. The TCP input routine checksums the TCP header and data for corruption detection, determines which connection this data is for, removes its header information, links the mbuf chain onto the socket receive buffer associated with this connection, and uses a socket service to wake up the application if it is sleeping as previously described. The socket layer copies the data stored in the socket receive buffer into the application's buffer and then frees the mbuf chain Execution control then passes back to the application. 3 Performance Analysis For our work we used two different measurements tools, namely AIX Trace and ZM4 The AIX operating system trace facility is a powerful system observation tool. The trace facility captures a sequential flow of time-stamped system events, providing a fine level of detail on system activity. Events are shown in time sequence and in the context of other events.the basic idea of ZM4 approach is to look at the execution of the system to be analysed (i.e. the object system) as a stream of "events". Events are significant points in the system, significant in the sense of the investigation. Events are generated by event-statements merged into the object code. The event-statement writes a - byte information to the PS/ parallel port with this one byte being the event id. During monitoring an external monitoring device (a PC-AT card called DPU) is connected to the parallel port catching the event id, adding a time-stamp to it, and storing the resulting "event record" in a FIFO memory on this monitoring card. The PC-AT reads continuously trace portions from that FIFO and writes them on the disk. The testing environment adopted comprised two IBM RISC/6000 workstations equipped with TURBOWAYS 00 ATM Adapters. The physical bit-rate of the ATM adapter card is 00 Mb/s and the complete ATM and AAL cell processing is done in hardware and firmware on board The adapter features a dedicated Intel i960 processor plus a specialized chip set to handle Segmentation And Reassembly (SAR) of ATM cells. A RISC/6000 model 50 workstation has been used as sender and a model 360 as receiver. Since we expected the communication side at the receiver to be critical, we decided to use a more powerful machine at this side. Both workstations run the IBM AIX 3..5 operating system. The connections over ATM have been set so that only Permanent Virtual Connections (PVC) have been used. During the performance evaluation, the network and the workstations were completely dedicated to this task. In the following, we describe the various experiments carried out. 3. Throughput Evaluation The achievable throughput is certainly one of the most interesting factors to be evaluated. The overall throughput depends on several parameters, including the size of the buffers used in the application and at the socket layer, and on the protocol adopted. Therefore, we decided to experiment with data transfer over both TCP and UDP, and to collect data relative to various buffer sizes.

5 Transactions on Information and Communications Technologies vol 9, 995 WIT Press, ISSN High-Performance Computing in Engineering 5 In this experiment we measure the total throughput at the TCP receiver obtained varying the socket buffer size at the sender and receiver. The buffer size used by the application is constant and equal to 64K. Table reports the traffic produced on a single PVC between two RISC/6000 workstations. Table : TCP Throughput (sockets buffer size) Mb/s * 04 45* As it can be observed, the throughput increases with the buffer size until a threshold is reached at 5K. For buffer sizes greater than 5K, the values obtained are unpredictable because of a large variance. The * symbol in the table indicates that the correspondent value is a "peak" rather than an "averase" value ^ In next experiment we measured the throughput as a function of the application buffer size. In light of the values obtained with the previous experiment, the socket buffer size was fixed at 5. The not optimal behaviour for sizes lower than 4 is explainable because the width of the AlXmbufi is 4 For application buffer sizes lower than this value the full mbufs capacity is not exploited, and this determines the performance downgrading. Table : TCP Throughput (application buffer size) Mb/s 7 : 4» * For application buffer sizes ranging into [4,... ], the diverse throughput values tend to be constant. This means that the receiver and the sender are well synchronized with regard to the transmission rate and not frequent changes of the TCP window size occur. In this range we can also observe a logarithmic increasing of the throughput related the to buffer size hor sizes of the application buffer higher than the behaviour of the throughput is floating during the time. The reason can be found in an a too fast data sending rate at the origin resulting in a floating TCP window f J^ ^^G experiment has been replicated using the UDP protocol instead ot KP and the results obtained are showed in Table 3. The UDP protocol a lows to send datagram whose maximum length is ^ bytes How the table clearly shows the best throughput is achievable for values multiple of the PDU size. It is corresponding to the maximum number of mbufs filling the MTU (Maximum Transfer Unit). It is clear from the previous tests that for small block sizes, the software is the limiting factor to the system performance. Table 3: UDP Throughput Mb/s /.4 / (-B)

6 Transactions on Information and Communications Technologies vol 9, 995 WIT Press, ISSN High-Performance Computing in Engineering Small block sizes force the application to make frequent system calls, which force the AIX operating system to context switch frequently. Larger block sizes reduce the per-byte software overhead, since the system calls are amortized over a larger data transfer. As this overhead becomes relatively smaller, the data transfer dominates the performance and, since the software does not participate in actual transfer to and from the device, the hardware becomes the limiting factor. This can be seen by examining the relative performance gain for each doubling in block size. The performance is almost doubled as block size is increased from 64 bytes to, but the increase from to 6 gives less than a 0% gain 3. Delay Evaluation The results presented in this section have been obtained by means of the AIX TRACE facility and the ZM4 tool previously described. The unavailability of source code for AIX 3. allowed us only to monitor the user-level programs and the device driver level routines. We consider the whole execution of the TCP/IP protocols as a black box providing frames for the device driver level. For these reasons we placed the monitoring probes at the entrance and exit of the TCP/IP protocol code, as shown in Figure. Application Send Socket TCP/IP Network Receive Socket TCP/IP Network Figure : Probe Location The following experiment aimed at the measurement of the transmission delay when using the TCP protocol. The experiment was setup as follows: the sender transmits over the network variable sizes frame, as indicated by the table header For sizing exceeding the MTU, the communication protocols partition Table 4: TCP Delay dd-first-seud dd-first-recv dd-sec-send # segments dd-lasl-seud dd-last rec\ end recv

7 Transactions on Information and Communications Technologies vol 9, 995 WIT Press, ISSN High-Performance Computing in Engineering 7 the data into multiple segments. The number of such segments is shown in the table. Times in the table are expressed in ^s. The first row shows the time when the first Protocol Data Unit (PDU) is sent. The second row shows the time when the first PDU is received. Note that these delays are measured on different workstations and the use of the ZM4 tool guarantees the correct synchronization. In the next row; the time of the successive send is reported. Finally, in the last row, the user level end-of-receive time is shown. The generic TCP/IP behaviour in case of multiple segments is schematically represented in Figure 3. Values for the tj variables depend on the TSDU size. The factor that contributes most to the overall delay is the t-tl interval. This interval is due to the acknowledgment reception for thefirstsegment transmission. The reason of user space device driver t t3 4 5 t6 Figure 3: TCP message transmission to start transfer tl dd-first send t dd-second-send t3-t4 other dd-sends t5 dd-last-receive t6 end-transfer this initial delay could be attributed to the scheduling activity of the receiving host The arrival of thefirstsegment causes the wake-up of the blocked process associated with the connection and the consequent context switch []. The experiment explains the relationship between the throughput and the size of the application buffer. The constant overhead due to the first acknowledgment determines better performance for big sizes of the application buffer. This is because the time spent waiting for thefirstacknowledgment is amortized if the successive message transfer is long enough. The same experiments have been replicated using the UDP protocol As expected, the absence of the waiting period for the acknowledgments produces noticeable benefits on the time necessary to send a message using UDP datagrams. [ dd-first- sen d dd-first-recv dd-sec-seiid # segments (Id-last-send dd-last reev end ree\ Table 5: UDP Delay r I j " f! ~ ' 64 (-B) i_ 33 i \ 744.3

8 Transactions on Information and Communications Technologies vol 9, 995 WIT Press, ISSN High-Performance Computing in Engineering The generic UDP/IP behaviour in case of multiple segments is schematically represented in Figure 4. As expected, the t-tl interval is no more critical because UDP makes no use of acknowledgments. to start transfer user space ^ ^ tldd-firstsend t dd-second-send t3-t4 other dd-sends device driver h t5 dd-last-receive to Iltt3 4 t5 t6 Figure 4: UDP message transmission t6 end-transfer 4 Conclusions The performance of the TCP/IP protocols implementation over a simple ATM environment was studied through monitoring of the connected end hosts. Numerical results showed a strong dependency between message size and socket buffer size on one hand and throughput/delay on the other As far as the throughput is concerned the best performance is achievable for big block sizes However, for many sources of traffic, a 64 blocks size may be unrealistic. As soon as the physical network bandwidth is in Mb/s range, the physical network is not the bottleneck for the communication. The network delay is in the jus range, while the protocol processing delay in the ms range From our experience, it grows the necessity of workstations with higher performance access to computational resources and to the memory References. Braden, B & Zhang, L RSVP: A Resource ReSerVation Protocol, Connexions, The Interoperability Report, 994,,-7.. Herrtwich R G & Delgrossi L The ST-II Protocol for Multimedia Communication, Connexions, The Interoperability Report, 994,, Jacobson V, Braden R, Borman D TCP Extensions for High Performance,7#r 7JJ, May Laubach, M. Classical IP and ARP over ATM, RFC 577, January Luckenbach, T. Performance experiments within local ATM networks, pp , fmc6w/w#s o/a7'or <S TV, Geneva, Oechsle, R & Graf, M. The Internet Protocol Family over ATM, IBM European Networking Center Technical Report N , Papadopoulos, C & Parulkar, G.M. Experimental Evaluation of SUNOS IPC and TCP/IP Protocol Implementation, IEEE ACM Transactions on Networking 993,, Stuttgen, H J. Network Evolution and Multimedia Communication, IBM European Networking Center Technical Report N , 994.

ATM in TCP/IP environment: Adaptations and Effectiveness

ATM in TCP/IP environment: Adaptations and Effectiveness Bremen Institute of Industrial Technology and Applied Work Science ATM in TCP/IP environment: Adaptations and Effectiveness Dipl.-Ing. Kai-Oliver Detken, BIBA ATM Traffic Symposium, Mykonos, Greece, September

More information

Asynchronous. nous Transfer Mode. Networks: ATM 1

Asynchronous. nous Transfer Mode. Networks: ATM 1 Asynchronous nous Transfer Mode (ATM) Networks: ATM 1 Issues Driving LAN Changes Traffic Integration Voice, video and data traffic Multimedia became the buzz word One-way batch Two-way batch One-way interactive

More information

Asynchronous Transfer Mode

Asynchronous Transfer Mode ATM Asynchronous Transfer Mode CS420/520 Axel Krings Page 1 Protocol Architecture (diag) CS420/520 Axel Krings Page 2 1 Reference Model Planes User plane Provides for user information transfer Control

More information

BROADBAND AND HIGH SPEED NETWORKS

BROADBAND AND HIGH SPEED NETWORKS BROADBAND AND HIGH SPEED NETWORKS ATM SWITCHING ATM is a connection-oriented transport concept An end-to-end connection (virtual channel) established prior to transfer of cells Signaling used for connection

More information

Adaptation Problems and Solutions. MARCOM 97, Dipl.-Ing. Kai-Oliver Detken, BIBA Bremen, Germany, October the 16th, 1997

Adaptation Problems and Solutions. MARCOM 97, Dipl.-Ing. Kai-Oliver Detken, BIBA Bremen, Germany, October the 16th, 1997 IP-over over-atm: Migrations, Adaptation Problems and Solutions MARCOM 97, Dipl.-Ing. Kai-Oliver Detken, BIBA Bremen, Germany, October the 16th, 1997 Content Introduction of the European ACTS project EIES

More information

Internetworking Part 1

Internetworking Part 1 CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross Part 5: Link Layer Technologies CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross 1 Outline PPP ATM X.25 Frame Relay 2 Point to Point Data Link Control One sender, one receiver,

More information

Cell Switching (ATM) Commonly transmitted over SONET other physical layers possible. Variable vs Fixed-Length Packets

Cell Switching (ATM) Commonly transmitted over SONET other physical layers possible. Variable vs Fixed-Length Packets Cell Switching (ATM) Connection-oriented packet-switched network Used in both WAN and LAN settings Signaling (connection setup) Protocol: Q2931 Specified by ATM forum Packets are called cells 5-byte header

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

Chapter 3 Packet Switching

Chapter 3 Packet Switching Chapter 3 Packet Switching Self-learning bridges: Bridge maintains a forwarding table with each entry contains the destination MAC address and the output port, together with a TTL for this entry Destination

More information

ATM Technology in Detail. Objectives. Presentation Outline

ATM Technology in Detail. Objectives. Presentation Outline ATM Technology in Detail Professor Richard Harris Objectives You should be able to: Discuss the ATM protocol stack Identify the different layers and their purpose Explain the ATM Adaptation Layer Discuss

More information

High bandwidth, Long distance. Where is my throughput? Robin Tasker CCLRC, Daresbury Laboratory, UK

High bandwidth, Long distance. Where is my throughput? Robin Tasker CCLRC, Daresbury Laboratory, UK High bandwidth, Long distance. Where is my throughput? Robin Tasker CCLRC, Daresbury Laboratory, UK [r.tasker@dl.ac.uk] DataTAG is a project sponsored by the European Commission - EU Grant IST-2001-32459

More information

Data & Computer Communication

Data & Computer Communication Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Packet Switching - Asynchronous Transfer Mode. Introduction. Areas for Discussion. 3.3 Cell Switching (ATM) ATM - Introduction

Packet Switching - Asynchronous Transfer Mode. Introduction. Areas for Discussion. 3.3 Cell Switching (ATM) ATM - Introduction Areas for Discussion Packet Switching - Asynchronous Transfer Mode 3.3 Cell Switching (ATM) Introduction Cells Joseph Spring School of Computer Science BSc - Computer Network Protocols & Arch s Based on

More information

Lecture 1 Overview - Data Communications, Data Networks, and the Internet

Lecture 1 Overview - Data Communications, Data Networks, and the Internet DATA AND COMPUTER COMMUNICATIONS Lecture 1 Overview - Data Communications, Data Networks, and the Internet Mei Yang Based on Lecture slides by William Stallings 1 OUTLINE Data Communications and Networking

More information

Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks

Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks Kok Soon Thia and Chen Khong Tham Dept of Electrical Engineering National University of Singapore Tel: (65) 874-5095 Fax:

More information

Measuring MPLS overhead

Measuring MPLS overhead Measuring MPLS overhead A. Pescapè +*, S. P. Romano +, M. Esposito +*, S. Avallone +, G. Ventre +* * ITEM - Laboratorio Nazionale CINI per l Informatica e la Telematica Multimediali Via Diocleziano, 328

More information

A T M. Cell Switched Technology. not SMDS. Defacto Standard Multimedia capable Use with SONET or SDH. Fixed Length - 53 bytes. DigiPoints Volume 1

A T M. Cell Switched Technology. not SMDS. Defacto Standard Multimedia capable Use with SONET or SDH. Fixed Length - 53 bytes. DigiPoints Volume 1 A T M Cell Switched Technology Fixed Length - 53 bytes not SMDS Defacto Standard Multimedia capable Use with SONET or SDH SCTE VA 12.1 SONET Optical Carrier (OC) Rates and SDH Synchronous Transport Module

More information

Packet Switching. Hongwei Zhang Nature seems to reach her ends by long circuitous routes.

Packet Switching. Hongwei Zhang  Nature seems to reach her ends by long circuitous routes. Problem: not all networks are directly connected Limitations of directly connected networks: limit on the number of hosts supportable limit on the geographic span of the network Packet Switching Hongwei

More information

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Network Layer Network Fundamentals Chapter 5 Version 4.0 1 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most

More information

IO-Lite: A Unified I/O Buffering and Caching System

IO-Lite: A Unified I/O Buffering and Caching System IO-Lite: A Unified I/O Buffering and Caching System Vivek S. Pai, Peter Druschel and Willy Zwaenepoel Rice University (Presented by Chuanpeng Li) 2005-4-25 CS458 Presentation 1 IO-Lite Motivation Network

More information

Real-Time Protocol (RTP)

Real-Time Protocol (RTP) Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of

More information

! Cell streams relating to different media types are multiplexed together on a statistical basis for transmission and switching.

! Cell streams relating to different media types are multiplexed together on a statistical basis for transmission and switching. Asynchronous Transfer Mode (ATM) Networks! All source media is first broken down into a stream of fixed sized units known as cells.! Cell streams relating to different media types are multiplexed together

More information

Internet Protocols (chapter 18)

Internet Protocols (chapter 18) Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol

More information

440GX Application Note

440GX Application Note Overview of TCP/IP Acceleration Hardware January 22, 2008 Introduction Modern interconnect technology offers Gigabit/second (Gb/s) speed that has shifted the bottleneck in communication from the physical

More information

Continuous Real Time Data Transfer with UDP/IP

Continuous Real Time Data Transfer with UDP/IP Continuous Real Time Data Transfer with UDP/IP 1 Emil Farkas and 2 Iuliu Szekely 1 Wiener Strasse 27 Leopoldsdorf I. M., A-2285, Austria, farkas_emil@yahoo.com 2 Transilvania University of Brasov, Eroilor

More information

Module 3. Wide Area Networking (WAN)

Module 3. Wide Area Networking (WAN) Module 3 Wide Area Networking (WAN) When many nodes or LAN s are connected together in a large scale, we have a WAN. This may be world wide. Because of the separation of the nodes, the Public Data Network

More information

Fragmenting and Interleaving Real-Time and Nonreal-Time Packets

Fragmenting and Interleaving Real-Time and Nonreal-Time Packets CHAPTER 16 Fragmenting and Interleaving Real-Time and Nonreal-Time Packets Integrating delay-sensitive real-time traffic with nonreal-time data packets on low-speed links can cause the real-time packets

More information

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print, ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure

More information

PERFORMANCE OF INTERCONNECTING FDDI NETWORKS THROUGH ATM WHEN MANAGING VIDEO TRAFFIC *

PERFORMANCE OF INTERCONNECTING FDDI NETWORKS THROUGH ATM WHEN MANAGING VIDEO TRAFFIC * PERFORMANCE OF INTERCONNECTING FDDI NETWORKS THROUGH ATM WHEN MANAGING VIDEO TRAFFIC * David Andrés, Joan Vila, Jordi Domingo and Josep Solé Departament d Arquitectura de Computadors, Universitat Politècnica

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department of Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Stephan Günther

More information

6.9. Communicating to the Outside World: Cluster Networking

6.9. Communicating to the Outside World: Cluster Networking 6.9 Communicating to the Outside World: Cluster Networking This online section describes the networking hardware and software used to connect the nodes of cluster together. As there are whole books and

More information

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE William Stallings F.1 TCP/IP LAYERS... 2 F.2 TCP AND UDP... 4 F.3 OPERATION OF TCP/IP... 6 F.4 TCP/IP APPLICATIONS... 10 Copyright 2014 Supplement to Computer

More information

SEN366 (SEN374) (Introduction to) Computer Networks

SEN366 (SEN374) (Introduction to) Computer Networks SEN366 (SEN374) (Introduction to) Computer Networks Prof. Dr. Hasan Hüseyin BALIK (12 th Week) The Internet Protocol 12.Outline Principles of Internetworking Internet Protocol Operation Internet Protocol

More information

PAPER Asynchronous UDP

PAPER Asynchronous UDP IEICE TRANS. COMMUN., VOL.E84 B, NO.12 DECEMBER 2001 3243 PAPER Asynchronous UDP Chuck YOO, Regular Member, Hyun-Wook JIN, and Soon-Cheol KWON, Nonmembers SUMMARY Network bandwidth has rapidly increased,

More information

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Lecture 3. The Network Layer (cont d) Network Layer 1-1 Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets

More information

Introduction to TCP/IP Offload Engine (TOE)

Introduction to TCP/IP Offload Engine (TOE) Introduction to TCP/IP Offload Engine (TOE) Version 1.0, April 2002 Authored By: Eric Yeh, Hewlett Packard Herman Chao, QLogic Corp. Venu Mannem, Adaptec, Inc. Joe Gervais, Alacritech Bradley Booth, Intel

More information

Implementation of Differentiated Services over ATM

Implementation of Differentiated Services over ATM Implementation of Differentiated s over ATM Torsten Braun, Arik Dasen, and Matthias Scheidegger; Institute of Computer Science and Applied Mathematics, University of Berne, Switzerland Karl Jonas and Heinrich

More information

Ch. 4 - WAN, Wide Area Networks

Ch. 4 - WAN, Wide Area Networks 1 X.25 - access 2 X.25 - connection 3 X.25 - packet format 4 X.25 - pros and cons 5 Frame Relay 6 Frame Relay - access 7 Frame Relay - frame format 8 Frame Relay - addressing 9 Frame Relay - access rate

More information

1997, Scott F. Midkiff 1

1997, Scott F. Midkiff 1 Welcome to! Loooooooooooooooots of acronyms! By Scott Midkiff ECpE/CS 5516, VPI Spring 1997 (modified by Marc Abrams for Spring 1998) A lot of what s in came from the phone and ing worlds, not the LAN

More information

EE 610 Part 2: Encapsulation and network utilities

EE 610 Part 2: Encapsulation and network utilities EE 610 Part 2: Encapsulation and network utilities Objective: After this experiment, the students should be able to: i. Understand the format of standard frames and packet headers. Overview: The Open Systems

More information

Performance measurements in local and wide area ATM networks

Performance measurements in local and wide area ATM networks 1 Performance measurements in local and wide area ATM networks R. Eberhardt, C. Rueß, R. Sigle Daimler-Benz AG, Research and Technology P.O. Box 2360, 89013 Ulm, Germany Tel: ++49-731-505-2103, Fax: ++49-731-505-4110

More information

ATM. Asynchronous Transfer Mode. (and some SDH) (Synchronous Digital Hierarchy)

ATM. Asynchronous Transfer Mode. (and some SDH) (Synchronous Digital Hierarchy) ATM Asynchronous Transfer Mode (and some SDH) (Synchronous Digital Hierarchy) Why use ATM? Circuit switched connections: After initial setup no processing in network nodes Fixed bit rates, fixed time delay

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Networking Introduction Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) Computer Networking A background of important areas

More information

Figure 10.1 Cell switching principles: (a) routing schematic; (b) VP routing; (c) VC routing.

Figure 10.1 Cell switching principles: (a) routing schematic; (b) VP routing; (c) VC routing. Figure. Cell switching principles: (a) routing schematic; (b) VP routing; (c) VC routing. (a) PCI =,,, 4 4 PCI =, 4 4 6 PCI = 6, Link/Port RT Link/Port RT Link/Port RT In Port PCI 4 Out Port PCI 4 6 Port

More information

Boosting Server-to-Server Gigabit Throughput with Jumbo Frames

Boosting Server-to-Server Gigabit Throughput with Jumbo Frames Boosting Server-to-Server Gigabit Throughput with Jumbo Frames September 15, 2000 U.S.A. 2000 Hewlett-Packard Company Legal Notices The information in this document is subject to change without notice.

More information

Asynchronous Transfer Mode (ATM) ATM concepts

Asynchronous Transfer Mode (ATM) ATM concepts Asynchronous Transfer Mode (ATM) Asynchronous Transfer Mode (ATM) is a switching technique for telecommunication networks. It uses asynchronous time-division multiplexing,[1][2] and it encodes data into

More information

ATM. Asynchronous Transfer Mode. these slides are based on USP ATM slides from Tereza Carvalho. ATM Networks Outline

ATM. Asynchronous Transfer Mode. these slides are based on USP ATM slides from Tereza Carvalho. ATM Networks Outline ATM Asynchronous Transfer Mode these slides are based on USP ATM slides from Tereza Carvalho 1 ATM Networks Outline ATM technology designed as a support for ISDN Definitions: STM and ATM Standardization

More information

INTRODUCTORY COMPUTER

INTRODUCTORY COMPUTER INTRODUCTORY COMPUTER NETWORKS TYPES OF NETWORKS Faramarz Hendessi Introductory Computer Networks Lecture 4 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi 2 Types of Networks Circuit

More information

Device-Functionality Progression

Device-Functionality Progression Chapter 12: I/O Systems I/O Hardware I/O Hardware Application I/O Interface Kernel I/O Subsystem Transforming I/O Requests to Hardware Operations Incredible variety of I/O devices Common concepts Port

More information

Chapter 12: I/O Systems. I/O Hardware

Chapter 12: I/O Systems. I/O Hardware Chapter 12: I/O Systems I/O Hardware Application I/O Interface Kernel I/O Subsystem Transforming I/O Requests to Hardware Operations I/O Hardware Incredible variety of I/O devices Common concepts Port

More information

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6. Transport Layer 6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6.1 Internet Transport Layer Architecture The

More information

Chapter 1 Introduction

Chapter 1 Introduction Emerging multimedia, high-speed data, and imaging applications are generating a demand for public networks to be able to multiplex and switch simultaneously a wide spectrum of data rates. These networks

More information

ISTITUTO DI ANALISI DEI SISTEMI ED INFORMATICA

ISTITUTO DI ANALISI DEI SISTEMI ED INFORMATICA ISTITUTO DI ANALISI DEI SISTEMI ED INFORMATICA CONSIGLIO NAZIONALE DELLE RICERCHE M. Cannarella, M. Draoli, G. Gambosi, C. Gaibisso, M. Lancia DESIGNING RELIABLE ATM NETWORKS FOR MULTIMEDIA INTERACTIE

More information

INTEGRATING ATM NETWORKING INTO BSD

INTEGRATING ATM NETWORKING INTO BSD INTEGRATING ATM NETWORKING INTO BSD Charles D. Cranor WUCS-98-?? August 6, 1998 Department of Computer Science Campus Box 1045 Washington University One Brookings Drive St. Louis, MO 63130-4899 Abstract

More information

Lesson 3 Network technologies - Controlling

Lesson 3 Network technologies - Controlling Lesson 3 Network technologies - Controlling Objectives : Network control or traffic engineering is one of the important techniques in the network. Understanding QoS control, traffic engineering and OAM

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or

More information

Module 10 Frame Relay and ATM

Module 10 Frame Relay and ATM Module 10 Frame Relay and ATM Lesson 35 ATM: Virtual Path, Virtual Channel. ATM Adaptation Layer (AAL) 10.3.1 VIRTUAL PATH AND VIRTUAL CHANNEL Connection between two endpoints is accomplished through virtual

More information

CMSC 417 Project Implementation of ATM Network Layer and Reliable ATM Adaptation Layer

CMSC 417 Project Implementation of ATM Network Layer and Reliable ATM Adaptation Layer CMSC 417 Project Implementation of ATM Network Layer and Reliable ATM Adaptation Layer 1. Introduction In this project you are required to implement an Asynchronous Transfer Mode (ATM) network layer and

More information

Chapter 13: I/O Systems

Chapter 13: I/O Systems Chapter 13: I/O Systems DM510-14 Chapter 13: I/O Systems I/O Hardware Application I/O Interface Kernel I/O Subsystem Transforming I/O Requests to Hardware Operations STREAMS Performance 13.2 Objectives

More information

Chapter 13: I/O Systems

Chapter 13: I/O Systems Chapter 13: I/O Systems I/O Hardware Application I/O Interface Kernel I/O Subsystem Transforming I/O Requests to Hardware Operations Streams Performance I/O Hardware Incredible variety of I/O devices Common

More information

CSE 4/521 Introduction to Operating Systems. Lecture 24 I/O Systems (Overview, Application I/O Interface, Kernel I/O Subsystem) Summer 2018

CSE 4/521 Introduction to Operating Systems. Lecture 24 I/O Systems (Overview, Application I/O Interface, Kernel I/O Subsystem) Summer 2018 CSE 4/521 Introduction to Operating Systems Lecture 24 I/O Systems (Overview, Application I/O Interface, Kernel I/O Subsystem) Summer 2018 Overview Objective: Explore the structure of an operating system

More information

BlueGene/L. Computer Science, University of Warwick. Source: IBM

BlueGene/L. Computer Science, University of Warwick. Source: IBM BlueGene/L Source: IBM 1 BlueGene/L networking BlueGene system employs various network types. Central is the torus interconnection network: 3D torus with wrap-around. Each node connects to six neighbours

More information

CS 428/528 Computer Networks Lecture 01. Yan Wang

CS 428/528 Computer Networks Lecture 01. Yan Wang 1 CS 428/528 Computer Lecture 01 Yan Wang 2 Motivation: Why bother? Explosive growth of networks 1989, 100,000 hosts on the Internet Distributed Applications and Systems E-mail, WWW, multimedia, distributed

More information

Demultiplexing on the ATM Adapter: Experiments withinternetprotocolsinuserspace

Demultiplexing on the ATM Adapter: Experiments withinternetprotocolsinuserspace Demultiplexing on the ATM Adapter: Experiments withinternetprotocolsinuserspace Ernst W. Biersack, Erich Rütsche B.P. 193 06904 Sophia Antipolis, Cedex FRANCE e-mail: erbi@eurecom.fr, rue@zh.xmit.ch Abstract

More information

Internetwork Protocols

Internetwork Protocols Internetwork Protocols Background to IP IP, and related protocols Internetworking Terms (1) Communications Network Facility that provides data transfer service An internet Collection of communications

More information

Code No: RR Set No. 1

Code No: RR Set No. 1 Code No: RR410402 Set No. 1 1. (a) Write any four reasons for using layered protocols. (b) List two ways in which the OSI reference model and the TCP/IP reference model are the same and list in which they

More information

Data and Computer Communications. Protocols and Architecture

Data and Computer Communications. Protocols and Architecture Data and Computer Communications Protocols and Architecture Characteristics Direct or indirect Monolithic or structured Symmetric or asymmetric Standard or nonstandard Means of Communication Direct or

More information

Chapter 13: I/O Systems

Chapter 13: I/O Systems COP 4610: Introduction to Operating Systems (Spring 2015) Chapter 13: I/O Systems Zhi Wang Florida State University Content I/O hardware Application I/O interface Kernel I/O subsystem I/O performance Objectives

More information

Frame Relay. Frame Relay Information 1 of 18

Frame Relay. Frame Relay Information 1 of 18 Frame Relay Information 1 of 18 This document was retrieved from the Web and has been been edited by Thomas Jerry Scott for use in his TCP/IP network classes. Chapter Goals Describe the history of Frame

More information

Code No: RR Set No. 1

Code No: RR Set No. 1 Code No: RR320503 Set No. 1 III B.Tech II Semester Regular Examinations, Apr/May 2007 COMPUTER NETWORKS ( Common to Computer Science & Engineering, Information Technology, Electronics & Control Engineering,

More information

Chapter 13: I/O Systems

Chapter 13: I/O Systems Chapter 13: I/O Systems I/O Hardware Application I/O Interface Kernel I/O Subsystem Transforming I/O Requests to Hardware Operations Streams Performance Objectives Explore the structure of an operating

More information

Computer Networks with Internet Technology William Stallings. Chapter 2 Protocols and the TCP/IP Protocol Suite

Computer Networks with Internet Technology William Stallings. Chapter 2 Protocols and the TCP/IP Protocol Suite Computer Networks with Internet Technology William Stallings Chapter 2 Protocols and the TCP/IP Protocol Suite Need For Protocol Architecture E.g. File transfer Source must activate comms. Path or inform

More information

Quality of Service (QoS) Computer network and QoS ATM. QoS parameters. QoS ATM QoS implementations Integrated Services Differentiated Services

Quality of Service (QoS) Computer network and QoS ATM. QoS parameters. QoS ATM QoS implementations Integrated Services Differentiated Services 1 Computer network and QoS QoS ATM QoS implementations Integrated Services Differentiated Services Quality of Service (QoS) The data transfer requirements are defined with different QoS parameters + e.g.,

More information

BROADBAND AND HIGH SPEED NETWORKS

BROADBAND AND HIGH SPEED NETWORKS BROADBAND AND HIGH SPEED NETWORKS INTRODUCTION ATM stands for Asynchronous Transfer Mode ATM is a flexible high bandwidth, low delay network technology that is: Capable of handling voice, video and data

More information

The Importance of Non-Data Touching Processing Overheads in TCP/IP

The Importance of Non-Data Touching Processing Overheads in TCP/IP The Importance of Non-Data Touching Processing Overheads in TCP/IP Jonathan Kay and Joseph Pasquale Computer Systems Laboratory Department of Computer Science and Engineering University of California,

More information

BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS

BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS Prof. Dr. Hasan Hüseyin BALIK (1 st Week) Outline Course Information and Policies Course Syllabus 1. Data Communications, Data Networks, and the Internet

More information

Chapter 12: I/O Systems

Chapter 12: I/O Systems Chapter 12: I/O Systems Chapter 12: I/O Systems I/O Hardware! Application I/O Interface! Kernel I/O Subsystem! Transforming I/O Requests to Hardware Operations! STREAMS! Performance! Silberschatz, Galvin

More information

Chapter 13: I/O Systems

Chapter 13: I/O Systems Chapter 13: I/O Systems Chapter 13: I/O Systems I/O Hardware Application I/O Interface Kernel I/O Subsystem Transforming I/O Requests to Hardware Operations STREAMS Performance Silberschatz, Galvin and

More information

Chapter 12: I/O Systems. Operating System Concepts Essentials 8 th Edition

Chapter 12: I/O Systems. Operating System Concepts Essentials 8 th Edition Chapter 12: I/O Systems Silberschatz, Galvin and Gagne 2011 Chapter 12: I/O Systems I/O Hardware Application I/O Interface Kernel I/O Subsystem Transforming I/O Requests to Hardware Operations STREAMS

More information

Performance Evaluation of FDDI, ATM, and Gigabit Ethernet as Backbone Technologies Using Simulation

Performance Evaluation of FDDI, ATM, and Gigabit Ethernet as Backbone Technologies Using Simulation Performance Evaluation of FDDI, ATM, and Gigabit Ethernet as Backbone Technologies Using Simulation Sanjay P. Ahuja, Kyle Hegeman, Cheryl Daucher Department of Computer and Information Sciences University

More information

Cisco Series Internet Router Architecture: Packet Switching

Cisco Series Internet Router Architecture: Packet Switching Cisco 12000 Series Internet Router Architecture: Packet Switching Document ID: 47320 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Packet Switching:

More information

Simulation of an ATM{FDDI Gateway. Milind M. Buddhikot Sanjay Kapoor Gurudatta M. Parulkar

Simulation of an ATM{FDDI Gateway. Milind M. Buddhikot Sanjay Kapoor Gurudatta M. Parulkar Simulation of an ATM{FDDI Gateway Milind M. Buddhikot Sanjay Kapoor Gurudatta M. Parulkar milind@dworkin.wustl.edu kapoor@dworkin.wustl.edu guru@flora.wustl.edu (314) 935-4203 (314) 935 4203 (314) 935-4621

More information

Impact of TCP Window Size on a File Transfer

Impact of TCP Window Size on a File Transfer Impact of TCP Window Size on a File Transfer Introduction This example shows how ACE diagnoses and visualizes application and network problems; it is not a step-by-step tutorial. If you have experience

More information

Module 12: I/O Systems

Module 12: I/O Systems Module 12: I/O Systems I/O hardwared Application I/O Interface Kernel I/O Subsystem Transforming I/O Requests to Hardware Operations Performance 12.1 I/O Hardware Incredible variety of I/O devices Common

More information

Introduction to Networks and the Internet

Introduction to Networks and the Internet Introduction to Networks and the Internet CMPE 80N Announcements Project 2. Reference page. Library presentation. Internet History video. Spring 2003 Week 7 1 2 Today Internetworking (cont d). Fragmentation.

More information

Network protocols and. network systems INTRODUCTION CHAPTER

Network protocols and. network systems INTRODUCTION CHAPTER CHAPTER Network protocols and 2 network systems INTRODUCTION The technical area of telecommunications and networking is a mature area of engineering that has experienced significant contributions for more

More information

Evaluation of a Zero-Copy Protocol Implementation

Evaluation of a Zero-Copy Protocol Implementation Evaluation of a Zero-Copy Protocol Implementation Karl-André Skevik, Thomas Plagemann, Vera Goebel Department of Informatics, University of Oslo P.O. Box 18, Blindern, N-316 OSLO, Norway karlas, plageman,

More information

Chapter 11 in Stallings 10 th Edition

Chapter 11 in Stallings 10 th Edition Local Area Network Overview Chapter 11 in Stallings 10 th Edition CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large

More information

I/O Systems. Amir H. Payberah. Amirkabir University of Technology (Tehran Polytechnic)

I/O Systems. Amir H. Payberah. Amirkabir University of Technology (Tehran Polytechnic) I/O Systems Amir H. Payberah amir@sics.se Amirkabir University of Technology (Tehran Polytechnic) Amir H. Payberah (Tehran Polytechnic) I/O Systems 1393/9/15 1 / 57 Motivation Amir H. Payberah (Tehran

More information

The University of Kansas

The University of Kansas The University of Kansas Technical Report Rapidly Deployable Radio Network ATM/IP Analysis Gary J. Minden, Joseph B. Evans Information & Telecommunication Technology Center Department of Electrical Engineering

More information

PRODUCT SUMMARY. SARA-Lite SAR for AAL Type 0/5 with UBR Traffic, Frame Relay and LANE Support INTRODUCTION

PRODUCT SUMMARY. SARA-Lite SAR for AAL Type 0/5 with UBR Traffic, Frame Relay and LANE Support INTRODUCTION SARA-Lite SAR for AAL Type 0/5 with UBR Traffic, Frame Relay and LANE Support INTRODUCTION PRODUCT SUMMARY SARA-Lite ATM AAL0/5 Segmentation and Reassembly Product TheTranSwitchSARA-Lite product provides

More information

CSCI-GA Operating Systems. Networking. Hubertus Franke

CSCI-GA Operating Systems. Networking. Hubertus Franke CSCI-GA.2250-001 Operating Systems Networking Hubertus Franke frankeh@cs.nyu.edu Source: Ganesh Sittampalam NYU TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute

More information

Module 12: I/O Systems

Module 12: I/O Systems Module 12: I/O Systems I/O Hardware Application I/O Interface Kernel I/O Subsystem Transforming I/O Requests to Hardware Operations Performance Operating System Concepts 12.1 Silberschatz and Galvin c

More information

LANCOM Techpaper Routing Performance

LANCOM Techpaper Routing Performance LANCOM Techpaper Routing Performance Applications for communications and entertainment are increasingly based on IP networks. In order to ensure that the necessary bandwidth performance can be provided

More information

Internetworking Models The OSI Reference Model

Internetworking Models The OSI Reference Model Internetworking Models When networks first came into being, computers could typically communicate only with computers from the same manufacturer. In the late 1970s, the Open Systems Interconnection (OSI)

More information

CHAPTER-2 IP CONCEPTS

CHAPTER-2 IP CONCEPTS CHAPTER-2 IP CONCEPTS Page: 1 IP Concepts IP is a very important protocol in modern internetworking; you can't really comprehend modern networking without a good understanding of IP. Unfortunately, IP

More information

UBR Congestion controlled Video Transmission over ATM Eltayeb Omer Eltayeb, Saudi Telecom Company

UBR Congestion controlled Video Transmission over ATM Eltayeb Omer Eltayeb, Saudi Telecom Company UBR Congestion controlled Video Transmission over ATM Eltayeb Omer Eltayeb, Saudi Telecom Company ABSTRACT The ATM unspecified bit rate (UBR) class of service some times referred to as best effort service-

More information