A Review of IP Packet Compression Techniques
|
|
- Theodore Price
- 5 years ago
- Views:
Transcription
1 A Review of IP Packet Compression Techniques Ching Shen Tye and Dr. G. Fairhurst Electronics Research Group, Department of Engineering, Aberdeen University, Scotland, AB24 3UE. {c.tye, Abstract This paper investigates several compression techniques may improve the IP packet delivery process and identifies their limitations. The recent emergence and popularity of wireless Internet has triggered a demand for improved transmission efficiency, especially where the link has a high cost per transmitted byte. Packet compression at the link layer may speed up the delivery process and provide more efficient use of available capacity. However, the success of compression depends on several factors the protocol headers present, the use of encryption, and the type of data being sent. 1 INTRODUCTION IP networking is replacing many existing networks, e.g. IP telephony may replace a circuit switched telephone network. However, IP introduces packet overhead, and this raises the question of efficiency (defined as the ratio between the total number of information bytes and the total number of received bytes). Efficiency is important were the cost of transmission is high. Examples include fixed rate links where the speed of transmission is limited or wireless links were there is a cost for using the radio bandwidth. One effect of a low efficiency is that there is less capacity available for other services. It also increases the transit delay of the packets across the link (a larger packet takes longer to serialise). Furthermore, IP version 6 (IPv6) [1] is being deployed in many next generation networks, and especially in broadband wireless networks. This increases the size of an IP address from 32 bits in IPv4 [2] to 128 bits, resulting in a doubling of the minimum IP header to 40 B in IPv6. 2 LINK COMPRESSION One well known way to improve efficiency is use data compression [3]. This process attempts to yield a compact digital representation of the information, and send this in place of the original information. When compression is used at the link layer, it can improve transmission efficiency. There are two implications: First, there is a computational cost associated with algorithms for compression (at the sender side of the link) and decompression (at the link receiver). This may require additional processor hardware, and may introduce extra delay. In some cases this cost can be justified in terms of the improved efficiency and reduced bandwidth. A second drawback arises from the way in which compression is performed. To decompress a packet, the decompressor also needs to obtain information about the way in which the compression was performed, which we call this the context [4]. For correct decompression, this context information needs to be reliably sent by the compressor to the decompressor. In this paper, we assume that successfully decompressed packets are semantically identical to the original packets. In practice, this means that the decompressed packets must exactly match the original packets. This implies the use of lossless data compression techniques. 3 COMPRESSION TECHNIQUES 3.1 Bulk Compression The most common form of compression used in computer software is bulk compression. In this technique, all the information in the packets are treated as a block of information and are compressed using a compression algorithm. The compressor constructs a dictionary of common sequences within the information, and matches each sequence to a shorter compressed representation (key strings). Bulk compression may use a pre-defined dictionary (static context for all IP flows) or a running dictionary based on the compression algorithm (i.e. optimised for a particular IP flow). The receiver must use an identical dictionary for decompression. This method can achieve high compression ratios; however, it has two major drawbacks: ISBN: PGNet
2 The dictionary requires a large memory. The dictionaries at the compressor and decompressor must be synchronised. A running dictionary system may loose synchronisation (or context ) when used over a link subject to packet loss. A loss of synchronisation will cause the receiver to discard all packets, until the receive dictionary is re-synchronised. To overcome the limitations on memory and link quality, packet by packet dictionary [5] algorithms were invented. This compresses each packet individually, sending the context with the packet. This prevents a loss of synchronisation. This also requires a smaller dictionary (less memory). The trade off is this achieves lower compression ratios. using the CID in each packet to refer to the context state at the decompressor). VJHC compresses the IPv4 and TCP header together as a combined set of fields. Figure 1 shows the TCP/IPv4 header fields. Within an IP flow, more then half of the fields are unchanged between successive packets. The total length and identification field are expected to be handled by link framing protocols. The IP checksum can also re-calculate at the receiver. By suppressing these fields at the compressor and restoring them at the decompressor, VJHC can significantly improve transmission efficiency for the packet header. Another kind of compression technique is the Guess-Table-Based compression [5] algorithm. At the sender, this uses an algorithm to guess the next byte(s) of data based on previous data. If the guess is correct, the byte is not transmitted on the link. Both receiver and transmitter must use the same algorithm (context) to successfully decompress data at the receiver. 4. HEADER COMPRESSION Bulk compression achieves little benefit when used on protocol header information. The structure of this information varies from packet to packet and from field to field within the packet headers. Standard bulk compression algorithms can not take advantage of this structure, however a compression algorithm that understands the syntax (and possibly semantics) of the packet headers may be able to achieve considerable benefit by exploiting the redundancy which is often present in successive packets in the same IP flow. This is called Header Compression. 4.1 Van Jacobson Header Compression (VJHC) The Van Jacobson Header Compression scheme [6] relies on knowledge of the TCP/IPv4 headers. The algorithm first classifies packets into individual flows (i.e. packets that share the same set of {IP addresses, IP protocol type, and TCP port numbers}). State (a context) is then created for each flow and a Context ID (CID) assigned to identify the flow at the compressor and decompressor. The sender then omits fields in the header that remain unchanged between successive packets in an IP flow (these may be deduced by Figure 1 TCP/IPv4 s header behaviour Furthermore, the remaining changing fields do not frequently change at the same time, and the compressed header can thus omit these in most cases. The remaining fields usually change only by a small amount in successive packets. A further saving can be achieved by transmitting the difference (i.e. differential encoding) in the value of the field rather then the entire fields. VJHC relies on two types of error detection: A CRC at the link layer (to detect corruption of the compressed packet) and the TCP checksum at the transport layer (to detect corruption in the compressed packet). When errors are detected, the receiver discards the erroneous packet. This creates another problem in the decompression process. Since the differential compression techniques are applied, the receiver also looses the context state. The next following packet after the discarded packet can not therefore be decompressed correctly. It must also be discarded. All subsequent packets will therefore be discarded until the next synchronisation (i.e. uncompressed packet is received, restoring the context state). To overcome this error propagation, receiver should use the differential sequence number change from the incoming compressed packet to the sequence number of the last correctly received packet, and
3 generate a correct sequence number for the packet after discard packet. Errors in the value of the TCP checksum errors of packets received by the destination end host must also be considered. When the end host fails to receive TCP data segments (forward path), no TCP acknowledgement is sent. The sender eventually suffers a TCP timeout, and resends the missing segment(s), these also trigger the compressor to resynchronise the context state. The combined IPv4 and TCP headers the two header can typically be reduced using VJHC from 40B to 4B (i.e. 10% of the original size). The technique significantly improves performance over low speed (300 to 19,200bps) serial links. The main disadvantages of VJHC are the impact of loss of synchronisation (when not used with a reliable link protocol) and the combined compression of the TCP and IPv4 headers. The scheme does not support recent changes to IP (e.g. ECN, Diffserv), or TCP (e.g. SACK, ECN, TS option, LFN). It also prevents the VJHC algorithm from compressing packets with additional headers placed between the IP and TCP headers (e.g. IPSEC AH, or tunnel encapsulations). It also will not compress either IPv6 and/or for other transport protocols (such as UDP). 4.2 IP Header Compression (IPHC) Internet Protocol Header Compression [7] is another uses the same mechanism as VJHC by omitting the unchanged fields in the header. The main difference between IPHC and VJHC, is IPHC compresses only the IP header. This supports any transport protocol or tunnel encapsulation also ECN and IPv6. IPHC also allows extension to multicast, multi-access links. Like VJHC, a 16 bit CID is used for TCP flows, but a larger CID is assigned to non-tcp flows. IPHC handles errors in a similar way to VJHC. IPHC can also use other recovery methods to recover TCP checksum failure (e.g. TWICE algorithm [8]). For non-tcp packets, a periodical uncompressed packet is sent to improve the probability of the context information being correct. This additional information reduces efficiency, but helps bound the impact of packet loss. IPHC may reduce the IP header to 2 bytes for non- TCP session and 4 bytes for TCP session. The main advantage of IPHC is independence of the transport layer protocols. The drawback is IPHC is only half as efficient as VJHC for TCP packets. 5. ROBUST HEADER COMPRESSION (ROHC) The RObust Header Compression scheme [4] is a new header compression scheme, being developed in the ROHC Working Group of the IETF. Compared with the previous schemes (in section 4), the major advantages are high robustness and improved efficiency. A key feature is that the ROHC framework is extensible. This means that new protocols can be added without the need to design a completely new compression protocol. The monolithic approach of VJHC now seems inappropriate, considering the widespread use of tunnel encapsulations, increasing use of security protocols and the emergence of IPv6. The penalty for flexibility is that ROHC is a complicated technique, absorbing all the existing compression techniques, and adding a more sophisticated mechanism to achieve robustness and reliability. Compression and Decompression are treated as finite state machines and can be broken into a series of states. At the compressor, these are Initialization & Refresh (IR), First Order (FO) and Second Order (SO). At the decompressor these three sates: No Context (NO), Static Context (SC) and Full Context (FC). The link starts with no context state for a flow (CID), and therefore can only perform limited compression. Once the compressor has successfully installed context state at the receiver, it may transits to the next state. (E.g. the compressor will gradually transit forward from IR FO SO when it gets sufficiently confident that decompressor has all the information to decompress the header). ROHC defines three operation modes [4], they are: Unidirectional (U-mode), Bidirectional Optimistic (O-mode) and Bidirectional Reliable (R-mode). All ROHC operations start from U-mode, and then may transit to O-mode or R-mode depending on the feedback information. U-mode makes a periodic refresh and time out to update the context (as in IPHC for UDP), O-mode uses the feedback channel for error correction and R-mode utilises all the available resources to prevent from any context loss or loss synchronisation.
4 Each operation mode contains all three states; IR, FO and SO, as shown in the Figure 2 below. Any errors that occur will force each state to return back to a lower compression state or gradually to lower the operation mode if more errors are detected or propagated. Figure 2 ROHC Operation modes The ROHC basic packet format is shown in Figure 3; it consists of padding, feedback, header information and payload. These four generic fields allow the decompressor to generate feedback information quickly and send this back to compressor quickly. Figure 3 ROHC basic packet structure Padding: Padding is located at the beginning of the compressed header; this aligns headers to byte boundaries. Feedback: Feedback information travels from the de-compressor to compressor, to assist in synchronisation of the context state. Header : Compressed header information Payload: Packet payload data As earlier header compression techniques (section 4), ROHC still relies on a Link Layer CRC to verify integrity of the compressed packet. To gain the full benefit, ROHC relies on a feedback acknowledgment channel for error discovery and recovery. In some cases, a CRC also used protects the entire segment such as the initialisation and refresh header and ROHC fragmentation. The main benefit of ROHC is that it may be designed to compress any type of header. For links that may experience loss, it may also be made more robust than exiting schemes such as VJHC and IPHC. Moreover it offer significant benefits for small packets such as TCP ACKs or VoIP packets when sent over a link with limited capacity or low transmission speed. 6 EXPERIMENTAL RESULTS 6.1 Packet by packet bulk compression This section investigates the performance of several bulk compression algorithms (section 3), when use over the entire IP packet. 10,000 TCP/IPv4 packets were captured from an Ethernet LAN and compressed by both the Huffman [3] and Lempel-Ziv Welch (LZW) [9] algorithms. The relationship between compression ratio and original packet length for each compression algorithm is shown in Figure 7(a), (b) respectively. Figure 7(a) shows two curves corresponding to two distinct types of packet payloads. The compression ratio of the packets in the lower curve are consistently lower than 1 throughout the entire range of packet length, (i.e. these packets are expanded in size by the compression algorithm, rather than being reduced). Packets in this class include packets that contain random (or precompressed) data, which can not be successfully compressed by the link compressor using the dictionary based compression techniques, such as Huffman coding and LZW. The upper curve in Figure 7(a) shows an increase in the compression ratio with the packet length increase, yielding a compression gain for packets whose original length is larger than 550 B. In Huffman coding, variable length packets are represented by a fixed size entry in the dictionary, so the data is are smaller than the corresponding code size at the beginning of dictionary, whereas near the end of dictionary, the data size is much bigger than the code size. When the packet size is small, most data in a packet are represented by the first entries in the dictionary, thus, the compression ratio is less then 1. For larger packet sizes, good compression ratios are achieved. Similar result can be found for LZW coding in Figure 7(b) however LZW maps blocks of variable length into blocks of fixed size which allow it to obtain better compression than Huffman coding.
5 Figure 8 plots the compression ratio against packet size for 10,000 UDP/IPv4 packets compressed by either the Huffman or LZW algorithms. The compression ratio is below 1 through the entire range of original packet size, which means no compression gain is obtained. Further analysis showed that most UDP traffic captured was steaming data (e.g. audio or video) which is already compressed by video/audio codec. Some small (control) packets were compressible. 6.2 Comparison of techniques Figure 4 presents a theoretical comparison of the original packet length and compressed packet length with several types of header. ROHC shows considerable advantage and is constantly capable of compression of all headers to less than 10 B. Header Lengths (bytes) Compression Ratio IPv4 IPv6 IPv4/TCP IPv6/TCP IPv4/UDP IPv6/UDP IPv4/UDP/RTP IPv6/UDP/RTP Figure 4 Length of original packets and compressed packet by several compression schemes Original Packet Length (bytes) Original BULK VJHC IPHC ROHC BULK VJHC IPHC ROHC Figure 5 Comparison of compression ratio of several compression schemes The compression ratio of several compression schemes are compared in Figure 5. VJHC, IPHC and ROHC show a similar relationship between compression ratio and original packets length. When the packet length is less then 180 bytes header compression schemes achieve a higher compression ratio then bulk compression. In the case of larger packets, bulk compression can outperform the other compression schemes, but only where data has not already been compressed. The use of IPSEC encryption (ESP with encrypted payload) is also an obstacle to compression. This prevents use of VJHC, and forces ROHC to only compress the outer (unencrypted) packet headers. Bulk compression will also fail to compress an encrypted payload. One mitigation, is to use a bulk compression algorithm prior to applying the IPSEC encryption. 6.3 Application performance Header compression increases the efficiency of information delivery, and for low speed transmission may also reduce the packet transit time. The benefit when using small packets (such as VoIP or TCP ACKs) may be very noticeable. Multimedia HTTP Telnet FTP Bit saving percentage (%) Figure 6 Bit rate saving base on application Bit saving (%) To investigate the overall benefit, requires a study of the range of packet sizes encountered for different applications. 10,000 packets were captured from an Ethernet LAN corresponding to IP flows between several applications, and the resulting data analysed to determine the distribution of packet sizes. Figure 6 shows the predicted bit rate saving of header compression utilised by application. Since Telnet sessions packets are usually small, they offer good compression. HTTP, FTP and multimedia packet usually consist of large packets, thus significant efficiency savings cannot be obtained by solely compressing protocol headers. 7 CONCLUSION Bulk compression is useful when packets carry large volumes of uncompressed data (especially when the payload is larger than 500 bytes). However, when the IP traffic uses encryption or higher layer compression (e.g. ZIP files, IPCOMP, or multimedia CODECs) there is no benefit from
6 compression. In fact, attempted compression simply wastes sender computing resources Header compression is an effective way to reduce the packet header size for small packets (less than approximately 200 B) where compression can provide a significant saving in overall packet size. VJHC can only be applied on TCP/IPv4 packet with no any options. IPHC can not achieve high compression ratio by just compressing IP header, since IP header is one of multiple headers used in a packet. The existing schemes have a number of weaknesses in the packet headers they can compress, and their robustness to loss of packets. In the future, it can be expected that header compression techniques based on the ROHC framework will be able to achieve a reasonable compression ratio but without necessarily a significant loss of robustness to packet loss. At the moment, compression schemes for TCP using ROHC have not been defined, and their behaviour with loss is still to be examined. The practical performance of ROHC is therefore an item of further work. REFERENCES [1] S. Deering and R. Hinden, Internet Protocol Version 6 (IPv6) Specification, RFC 1883, [2] U. o. S. California and C. Marina del Rey, Internet Protocol Specification, RFC 0791, [3] D. A. Huffman, A Method for the Construction of Minimum Redundancy Codes, Proceedings of the IRE, [4] C. Bormann, et al RObust Header Compression (ROHC): Framework and four profiles: RTP, UDP, ESP, and uncompressed, RFC 3095, [5] HP Company, HP Case Study: WAN Link Compression on HP Routers, [6] V. Jacobson, Compression TCP/IP for Low-Speed Serial Link, RFC 1144, [7] M. Degermark, B. Nordgren, and S. Pink, IP Header Compression, RFC 2507, [8] M. Degermark, M. Engan, B. Nordgren, and S. Pink, Low-loss TCP/IP header compression for wireless networks, at ACM MobiCom, [9] T. A. Welch, A Technique for High- Performance Data Compression, Computer, pp. 8-18, (a) Huffman Coding (b) Lempel-Ziv Welch Figure 7 Packet by packet compression on TCP/IP packets (a) Huffman Coding (b) Lempel-Ziv Welch Figure 8 Packet by packet compression on UDP/IP packets
Robust Header Compression for Multimedia Services
Robust Header Compression for Multimedia Services Frank Fitzek Arizona State University 06/03/2002 Content Motivation, Introduction, Problems Related Work Robust Header Compression Wireless JSQ Testbed
More informationAdaptive Header Compression for Wireless Networks
Adaptive Header Compression for Wireless Networks Changli Jiao Department of Electrical and Computer Engineering Wayne State University Detroit, MI 48202 Email: changli@katha.eng.wayne.edu Loren Schwiebert
More informationConfiguring RTP Header Compression
Header compression is a mechanism that compresses the IP header in a packet before the packet is transmitted. Header compression reduces network overhead and speeds up the transmission of either Real-Time
More informationConfiguring RTP Header Compression
Configuring RTP Header Compression First Published: January 30, 2006 Last Updated: July 23, 2010 Header compression is a mechanism that compresses the IP header in a packet before the packet is transmitted.
More informationRobust Header Compression (ROHC)
Robust Header Compression (ROHC) A step towards all-ip wireless networks Carsten Bormann TZI ISSLOW: Integrated Services over slow links Background: RTP is replacing TDM ISSLOW: 1996 initiative for packet
More informationMILCOM October 2002 (Anaheim, California) Subject
MILCOM 2002 7-10 October 2002 (Anaheim, California) Subject PERFORMANCE ANALYSIS OF A NEW HEADER COMPRESSION SCHEME FOR TCP STREAMS IN IP BASED WIRELESS NETWORKS Authors: Prof. Pietro Camarda, Ing.. Sandro
More informationRobust Header Compression (RoHC) over Multiprotocol Label Switching (MPLS) Networks
Computer Science Mohammad Ahsan Chishti / Shaima Quershi / Ajaz Hussain Mir Robust Header Compression (RoHC) over Multiprotocol Label Switching (MPLS) Networks Bibliographic information published by the
More informationBackground: IP Protocol Stack
Networking and protocols for real-time signal transmissions by Hans-Peter Schwefel & Søren Vang Andersen Mm1 Introduction & simple performance models (HPS) Mm2 Real-time Support in Wireless Technologies
More informationIPv6 Header Compression
IPv6 Header Compression North American IPv6 Summit, June 2004 Emre Ertekin Christos Christou Booz Allen Hamilton {ertekin_emre, christou_chris}@bah.com 1 Outline Introduction Background on IETF Hop-by-Hop
More informationPerformance Evaluation of Robust Header Compression Protocol for Low Data Rate Networks
Performance Evaluation of Robust Header Compression Protocol for Low Data Rate Networks Author: Faraz Iqbal Supervisor: Frank Y. Li (UIA) Co-Supervisors: Marrian Hauge & Margrete Allern Brose (FFI) A thesis
More informationOSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,
ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure
More informationInternet Engineering Task Force (IETF) Category: Standards Track. M. West Siemens/Roke Manor January 2013
Internet Engineering Task Force (IETF) Request for Comments: 6846 Obsoletes: 4996 Category: Standards Track ISSN: 2070-1721 G. Pelletier InterDigital Communications K. Sandlund Ericsson L-E. Jonsson M.
More informationPerformance Analysis of Header Compression Schemes in Heterogeneous Wireless Multi Hop Networks
Wireless Personal Communications (2006) 38: 203 232 DOI: 10.1007/s11277-005-9012-7 C Springer 2006 Performance Analysis of Header Compression Schemes in Heterogeneous Wireless Multi Hop Networks PATRICK
More informationConfiguring TCP Header Compression
Configuring TCP Header Compression First Published: January 30, 2006 Last Updated: May 5, 2010 Header compression is a mechanism that compresses the IP header in a packet before the packet is transmitted.
More informationUDP Lite for Real Time Multimedia Applications
UDP Lite for Real Time Multimedia Applications Lars-Åke Larzon*, Mikael Degermark*, Stephen Pink* Extended Enterprise Laboratory HP Laboratories Bristol HPL-IRI-1999-001 April, 1999 E-mail: [11n,micke,steve]@cdt.luth.se
More informationConfiguring TCP Header Compression
Header compression is a mechanism that compresses the IP header in a packet before the packet is transmitted. Header compression reduces network overhead and speeds up the transmission of either Real-Time
More informationHeader Compression Schemes for Wireless Internet Access
Header Compression Schemes for Wireless Internet Access Frank Fitzek, Stefan Hendrata, Patrick Seeling, and Martin Reisslein July 30, 2003 Contents 1 Introduction 6 1.1 Motivation for Header Compression......................
More informationONLINE GAMES: IS THE INTERNET PREPARED FOR
ONLINE GAMES: IS THE INTERNET PREPARED FOR THEM? GTC Communication Technologies Group Jose Saldana University of Zaragoza Spain Index - I. The two problems - II. Online games - III. Multiplexing FPS -
More informationRObust Header Compression (ROHC): Framework and four profiles: RTP, UDP, ESP, and uncompressed
Network Working Group Request for Comments: 3095 Category: Standards Track C. Bormann, Editor, TZI/Uni Bremen C. Burmeister, Matsushita M. Degermark, Univ. of Arizona H. Fukushima, Matsushita H. Hannu,
More informationCategory: Standards Track Lulea University of Technology/Telia Research AB S. Pink. Lulea University of Technology/SICS.
Network Working Group M. Degermark Request for Comments: 2507 Lulea University of Technology/SICS Category: Standards Track B. Nordgren Lulea University of Technology/Telia Research AB S. Pink Lulea University
More informationNetwork Layer (1) Networked Systems 3 Lecture 8
Network Layer (1) Networked Systems 3 Lecture 8 Role of the Network Layer Application Application The network layer is the first end-to-end layer in the OSI reference model Presentation Session Transport
More informationThe OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).
Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication
More informationRequest for Comments: 5225 Category: Standards Track April 2008
Network Working Group Request for Comments: 5225 Category: Standards Track G. Pelletier K. Sandlund Ericsson April 2008 Status of This Memo RObust Header Compression Version 2 (ROHCv2): Profiles for RTP,
More informationPosition of IP and other network-layer protocols in TCP/IP protocol suite
Position of IP and other network-layer protocols in TCP/IP protocol suite IPv4 is an unreliable datagram protocol a best-effort delivery service. The term best-effort means that IPv4 packets can be corrupted,
More informationPaper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015
Paper solution Subject: Computer Networks (TE Computer- 2012 pattern) Marks : 30 Date: 5/2/2015 Q1 a) What is difference between persistent and non persistent HTTP? Also Explain HTTP message format. [6]
More informationETSF10 Internet Protocols Transport Layer Protocols
ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.2 Kaan Bür, Jens Andersson Transport Layer Protocols Special Topic: Quality of Service (QoS) [ed.4 ch.24.1+5-6] [ed.5 ch.30.1-2]
More information6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1
6. Transport Layer 6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6.1 Internet Transport Layer Architecture The
More informationIP Packet Switching. Goals of Todayʼs Lecture. Simple Network: Nodes and a Link. Connectivity Links and nodes Circuit switching Packet switching
IP Packet Switching CS 375: Computer Networks Dr. Thomas C. Bressoud Goals of Todayʼs Lecture Connectivity Links and nodes Circuit switching Packet switching IP service model Best-effort packet delivery
More informationET4254 Communications and Networking 1
Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of
More informationDoes current Internet Transport work over Wireless? Reviewing the status of IETF work in this area
Does current Internet Transport work over Wireless? Reviewing the status of IETF work in this area Sally Floyd March 2, 2000 IAB Workshop on Wireless Internetworking 1 Observations: Transport protocols
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationIP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia
IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist
More informationA Hybrid ARQ Scheme for Resilient Packet Header Compression
A Hybrid ARQ Scheme for Resilient Packet Compression Vijay A Suryavanshi and Aria Nosratinia Multimedia Communications Laboratory, The University of Texas at Dallas Richardson, TX 7083-0688, USA E-mail:
More informationTransporting Voice by Using IP
Transporting Voice by Using IP National Chi Nan University Quincy Wu Email: solomon@ipv6.club.tw 1 Outline Introduction Voice over IP RTP & SIP Conclusion 2 Digital Circuit Technology Developed by telephone
More informationA Lossless Compression Method for Internet Packet Headers
A Lossless Compression Method for Internet Packet Headers Raimir Holanda and Jorge García Computer Architecture Dept. Technical University of Catalonia Barcelona, Spain Email: {rholanda,jorge}@ac.upc.edu
More informationData and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications
Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks
More informationCommunication Systems DHCP
Communication Systems DHCP Computer Science Copyright Warning This lecture is already stolen If you copy it please ask the author Prof. Dr. Gerhard Schneider like I did 2 Internet Protocol the Universal
More informationPrinciples. IP QoS DiffServ. Agenda. Principles. L74 - IP QoS Differentiated Services Model. L74 - IP QoS Differentiated Services Model
Principles IP QoS DiffServ Differentiated Services Architecture DSCP, CAR Integrated Services Model does not scale well flow based traffic overhead (RSVP messages) routers must maintain state information
More informationMultimedia in the Internet
Protocols for multimedia in the Internet Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ > 4 4 3 < 2 Applications and protocol stack DNS Telnet
More informationCédric Westphal Nokia Research Center, Mountain View, CA
Improvements on IP Header Compression: a performance study Cédric Westphal Nokia Research Center, Mountain View, CA cedric.westphal@nokia.com Abstract Due to bandwidth constraints on the wireless link
More information8. Network Layer Contents
Contents 1 / 43 * Earlier Work * IETF IP sec Working Group * IP Security Protocol * Security Associations * Authentication Header * Encapsulation Security Payload * Internet Key Management Protocol * Modular
More informationLink download full: Test Bank for Business Data Networks and Security 9th Edition by Panko https://digitalcontentmarket.org/download/business-data-networks-and-security-9thedition-by-panko/ Business Data
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationConfiguring Class-Based RTP and TCP Header Compression
Configuring Class-Based RTP and TCP Header Compression Header compression is a mechanism that compresses the IP header in a packet before the packet is transmitted. Header compression reduces network overhead
More informationCMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 25, 2018
CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet IP
More informationMODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:
BSc.(Hons) Computer Science with Network Security BEng (Hons) Telecommunications Cohort: BCNS/17B/FT Examinations for 2017-2018 / Semester 2 Resit Examinations for BCNS/15A/FT, BTEL/15B/FT & BTEL/16B/FT
More informationWe are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors
We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists 3,800 116,000 120M Open access books available International authors and editors Downloads Our
More informationComputer Networking: A Top Down Approach Featuring the. Computer Networks with Internet Technology, William
Dr. John Keeney 3BA33 TCP/IP protocol architecture with IP OSI Model Layers TCP/IP Protocol Architecture Layers TCP/IP Protocol Suite Application Layer Application Layer Telnet FTP HTTP DNS RIPng SNMP
More informationCHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS
CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS 18.1 (1) The communications network may only accept blocks of data up to a certain size. (2) Error control may be more efficient with a smaller PDU size.
More informationGoals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks
Verkkomedian perusteet Fundamentals of Media T-110.250 19.2.2002 Antti Ylä-Jääski 19.2.2002 / AYJ lide 1 Goals and topics protocols Discuss how packet-switching networks differ from circuit switching networks.
More informationNetwork-Adaptive Video Coding and Transmission
Header for SPIE use Network-Adaptive Video Coding and Transmission Kay Sripanidkulchai and Tsuhan Chen Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA 15213
More informationIntroduction to VoIP. Cisco Networking Academy Program Cisco Systems, Inc. All rights reserved. Cisco Public. IP Telephony
Introduction to VoIP Cisco Networking Academy Program 1 Requirements of Voice in an IP Internetwork 2 IP Internetwork IP is connectionless. IP provides multiple paths from source to destination. 3 Packet
More informationEvaluation of CRTP Performance over Cellular Radio Links
Abstract To make mobile IP telephony over cellular radio systems an economically viable alternative to circuit-switched voice, it is an absolute requirement that the 40-octet IP/UDP/RTP headers on IP telephony
More informationJuly 3, Diet-IPsec: ESP Payload Compression of IPv6 / UDP / TCP / UDP-Lite draft-mglt-ipsecme-diet-esp-payload-compression-00.
IPSECME Internet-Draft Intended status: Standards Track Expires: January 4, 2015 D. Migault, Ed. Orange T. Guggemos, Ed. Orange / LMU Munich July 3, 2014 Diet-IPsec: ESP Payload Compression of IPv6 / UDP
More informationChapter 09 Network Protocols
Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems
More informationCC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments
CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted
More informationCMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 30, 2018
CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala October 30, 2018 Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet
More informationRTP. Prof. C. Noronha RTP. Real-Time Transport Protocol RFC 1889
RTP Real-Time Transport Protocol RFC 1889 1 What is RTP? Primary objective: stream continuous media over a best-effort packet-switched network in an interoperable way. Protocol requirements: Payload Type
More informationEricsson January 2006
Network Working Group Request for Comments: 4224 Category: Informational G. Pelletier L-E. Jonsson K. Sandlund Ericsson January 2006 Status of This Memo RObust Header Compression (ROHC): ROHC over Channels
More informationA Packet Header Compression Algorithm based on TCP Flow Clustering and Huffman Encoding
Anais do XXVI Congresso da SBC SEMISH l XXXIII Seminário Integrado de Software e Hardware 14 a 20 de julho de 2006 Campo Grande, MS A Packet Header Compression Algorithm based on TCP Flow Clustering and
More informationThe Effnet Header & Payload Compression Solution for Industrial Communication
The Effnet Header & Compression Solution for Industrial Communication Many industries such as oil and gas, mining, utility, public safety and military, transport and government use low bandwidth (narrowband)
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationIntroduction to Networked Multimedia An Introduction to RTP p. 3 A Brief History of Audio/Video Networking p. 4 Early Packet Voice and Video
Preface p. xi Acknowledgments p. xvii Introduction to Networked Multimedia An Introduction to RTP p. 3 A Brief History of Audio/Video Networking p. 4 Early Packet Voice and Video Experiments p. 4 Audio
More informationPacketization Layer Path Maximum Transmission Unit Discovery (PLPMTU) For IPsec Tunnels
Packetization Layer Path Maximum Transmission Unit Discovery (PLPMTU) For IPsec Tunnels draft-spiriyath-ipsecme-dynamic-ipsec-pmtu-01 Shibu Piriyath, Umesh Mangla, Nagavenkata Suresh Melam, Ron Bonica
More informationNT1210 Introduction to Networking. Unit 10
NT1210 Introduction to Networking Unit 10 Chapter 10, TCP/IP Transport Objectives Identify the major needs and stakeholders for computer networks and network applications. Compare and contrast the OSI
More informationETSF05/ETSF10 Internet Protocols Network Layer Protocols
ETSF05/ETSF10 Internet Protocols Network Layer Protocols 2016 Jens Andersson Agenda Internetworking IPv4/IPv6 Framentation/Reassembly ICMPv4/ICMPv6 IPv4 to IPv6 transition VPN/Ipsec NAT (Network Address
More informationCS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP
CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering
More informationH.323. Definition. Overview. Topics
H.323 Definition H.323 is a standard that specifies the components, protocols and procedures that provide multimedia communication services real-time audio, video, and data communications over packet networks,
More informationInternet Protocols (chapter 18)
Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol
More informationGuide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols
Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP
More informationLecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005
Firewalls Lecture 33 Security April 15, 2005 Idea: separate local network from the Internet Trusted hosts and networks Intranet Firewall DMZ Router Demilitarized Zone: publicly accessible servers and networks
More informationInformation Network Systems The network layer. Stephan Sigg
Information Network Systems The network layer Stephan Sigg Tokyo, November 1, 2012 Error-detection and correction Decoding of Reed-Muller codes Assume a second order (16, 11) code for m = 4. The r-th order
More informationCODING TECHNIQUES FOR RESILIENT PACKET HEADER COMPRESSION
CODING TECHNIQUES FOR RESILIENT PACKET HEADER COMPRESSION APPROVED BY SUPERVISORY COMMITTEE: Dr. Aria Nosratinia, Chair Dr. Andrea Fumagalli Dr. Hlaing Minn Copyright 2005 Vijay A Suryavanshi All Rights
More informationNetwork Working Group. Category: Standards Track Cisco Systems February Compressing IP/UDP/RTP Headers for Low-Speed Serial Links
Network Working Group Request for Comments: 2508 Category: Standards Track S. Casner Cisco Systems V. Jacobson Cisco Systems February 1999 Compressing IP/UDP/RTP Headers for Low-Speed Serial Links Status
More informationUDP: Datagram Transport Service
UDP: Datagram Transport Service 1 Topics Covered Introduction Transport Protocols and End-to-End Communication The User Datagram Protocol The Connectionless Paradigm Message-Oriented Interface UDP Communication
More informationComputer Communication & Networks / Data Communication & Computer Networks Week # 03
Computer Communication & Networks / Data Communication & Computer Networks Week # 03 M.Nadeem Akhtar CS & IT Department The University of Lahore Email: nadeem.akhtar@cs.uol.edu.pk URL-https://sites.google.com/site/nadeemuolcsccn/home
More informationBusiness Data Networks and Security 10th Edition by Panko Test Bank
Business Data Networks and Security 10th Edition by Panko Test Bank Chapter 2 Network Standards 1) Internet standards are published as. A) RFCs B) IETFs C) TCP/IPs D) Internet Protocols Question: 1a Objective:
More informationData & Computer Communication
Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects
More informationIntroduction. IP Datagrams. Internet Service Paradigm. Routers and Routing Tables. Datagram Forwarding. Example Internet and Conceptual Routing Table
Introduction Datagram Forwarding Gail Hopkins Service paradigm IP datagrams Routing Encapsulation Fragmentation Reassembly Internet Service Paradigm IP Datagrams supports both connectionless and connection-oriented
More informationfor Wireless Networks fmicke, engan, bcn, Lulea University PO box 1263 S Lulea, Sweden S Kista, Sweden 1 Introduction
Low-loss TCP/IP Header Compression for Wireless Networks Mikael Degermark y, Mathias Engan y, Bjorn Nordgren y, and Stephen Pink yz fmicke, engan, bcn, steveg@cdt.luth.se y CDT/Department of Computer Science
More informationSEN366 (SEN374) (Introduction to) Computer Networks
SEN366 (SEN374) (Introduction to) Computer Networks Prof. Dr. Hasan Hüseyin BALIK (12 th Week) The Internet Protocol 12.Outline Principles of Internetworking Internet Protocol Operation Internet Protocol
More informationRSVP Support for RTP Header Compression, Phase 1
RSVP Support for RTP Header Compression, Phase 1 The Resource Reservation Protocol (RSVP) Support for Real-Time Transport Protocol (RTP) Header Compression, Phase 1 feature provides a method for decreasing
More informationFramework and Model for Automated Interoperability Test and Its Application to ROHC
Framework and Model for Automated Interoperability Test and Its Application to Sarolta Dibuz and Péter Krémer Ericsson Telecommunications Hungary P.O. Box 107, H-1300, Budapest 3, Hungary {Sarolta.Dibuz,Peter.Kremer}@eth.ericsson.se
More informationConfiguring Class-Based RTP and TCP Header Compression
Configuring Class-Based RTP and TCP Header Compression Last Updated: December 5, 2011 Header compression is a mechanism that compresses the IP header in a packet before the packet is transmitted. Header
More informationWhitePaper: XipLink Real-Time Optimizations
WhitePaper: XipLink Real-Time Optimizations XipLink Real Time Optimizations Header Compression, Packet Coalescing and Packet Prioritization Overview XipLink Real Time ( XRT ) is an optimization capability
More informationFundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,
Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure
More informationCCNA Exploration1 Chapter 7: OSI Data Link Layer
CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the
More informationIPSec. Slides by Vitaly Shmatikov UT Austin. slide 1
IPSec Slides by Vitaly Shmatikov UT Austin slide 1 TCP/IP Example slide 2 IP Security Issues Eavesdropping Modification of packets in transit Identity spoofing (forged source IP addresses) Denial of service
More informationAdvanced Communication Networks
Advanced Communication Networks Advanced Transport Issues Prof. Ana Aguiar University of Porto, FEUP 2010-2011 Contents Congestion in Best-effort Networks TCP Congestion Control Congestion Avoidance Mechanisms
More informationOSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1
OSI Network Layer Network Fundamentals Chapter 5 Version 4.0 1 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Mobile IP 2 Mobile Network Layer: Problems and Concerns Entities and Terminology in Mobile IP Mobile Indirect Routing Mobile IP Agent Advertisement Registration
More informationCompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch 3.1.5 & 3.2 Xiaowei Yang xwy@cs.duke.edu Review Past lectures Single link networks Point-to-point,
More informationEnd-to-End QoS Improvement using IPv6 Header Reduction over MPLS
End-to-End QoS Improvement using IPv6 Header Reduction over MPLS Imad J. Mohamad, PhD Dept. of Computer Science College of Science University of Baghdad Iraq ABSTRACT In 802.16 standards, PHS suppresses
More informationSirindhorn International Institute of Technology Thammasat University
Name.............................. ID............... Section...... Seat No...... Thammasat University Final Exam: Semester, 205 Course Title: Introduction to Data Communications Instructor: Steven Gordon
More informationIntroduction to TCP/IP networking
Introduction to TCP/IP networking TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute TCP : Transmission Control Protocol HTTP, FTP, ssh What is an internet? A set
More informationDigital Asset Management 5. Streaming multimedia
Digital Asset Management 5. Streaming multimedia 2015-10-29 Keys of Streaming Media Algorithms (**) Standards (*****) Complete End-to-End systems (***) Research Frontiers(*) Streaming... Progressive streaming
More informationChapter 12 Network Protocols
Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)
More informationNetworks Fall This exam consists of 10 problems on the following 13 pages.
CSCI 466 Final Networks Fall 2011 Name: This exam consists of 10 problems on the following 13 pages. You may use your two- sided hand- written 8 ½ x 11 note sheet during the exam and a calculator. No other
More informationCS 455: INTRODUCTION TO DISTRIBUTED SYSTEMS [NETWORKING] Frequently asked questions from the previous class surveys
CS 455: INTRODUCTION TO DISTRIBUTED SYSTEMS [NETWORKING] The Receiver's Buffer Small it may be But throttle the mightiest sender It can Not just the how much But also the when Or if at all Shrideep Pallickara
More information