A Review of IP Packet Compression Techniques

Size: px
Start display at page:

Download "A Review of IP Packet Compression Techniques"

Transcription

1 A Review of IP Packet Compression Techniques Ching Shen Tye and Dr. G. Fairhurst Electronics Research Group, Department of Engineering, Aberdeen University, Scotland, AB24 3UE. {c.tye, Abstract This paper investigates several compression techniques may improve the IP packet delivery process and identifies their limitations. The recent emergence and popularity of wireless Internet has triggered a demand for improved transmission efficiency, especially where the link has a high cost per transmitted byte. Packet compression at the link layer may speed up the delivery process and provide more efficient use of available capacity. However, the success of compression depends on several factors the protocol headers present, the use of encryption, and the type of data being sent. 1 INTRODUCTION IP networking is replacing many existing networks, e.g. IP telephony may replace a circuit switched telephone network. However, IP introduces packet overhead, and this raises the question of efficiency (defined as the ratio between the total number of information bytes and the total number of received bytes). Efficiency is important were the cost of transmission is high. Examples include fixed rate links where the speed of transmission is limited or wireless links were there is a cost for using the radio bandwidth. One effect of a low efficiency is that there is less capacity available for other services. It also increases the transit delay of the packets across the link (a larger packet takes longer to serialise). Furthermore, IP version 6 (IPv6) [1] is being deployed in many next generation networks, and especially in broadband wireless networks. This increases the size of an IP address from 32 bits in IPv4 [2] to 128 bits, resulting in a doubling of the minimum IP header to 40 B in IPv6. 2 LINK COMPRESSION One well known way to improve efficiency is use data compression [3]. This process attempts to yield a compact digital representation of the information, and send this in place of the original information. When compression is used at the link layer, it can improve transmission efficiency. There are two implications: First, there is a computational cost associated with algorithms for compression (at the sender side of the link) and decompression (at the link receiver). This may require additional processor hardware, and may introduce extra delay. In some cases this cost can be justified in terms of the improved efficiency and reduced bandwidth. A second drawback arises from the way in which compression is performed. To decompress a packet, the decompressor also needs to obtain information about the way in which the compression was performed, which we call this the context [4]. For correct decompression, this context information needs to be reliably sent by the compressor to the decompressor. In this paper, we assume that successfully decompressed packets are semantically identical to the original packets. In practice, this means that the decompressed packets must exactly match the original packets. This implies the use of lossless data compression techniques. 3 COMPRESSION TECHNIQUES 3.1 Bulk Compression The most common form of compression used in computer software is bulk compression. In this technique, all the information in the packets are treated as a block of information and are compressed using a compression algorithm. The compressor constructs a dictionary of common sequences within the information, and matches each sequence to a shorter compressed representation (key strings). Bulk compression may use a pre-defined dictionary (static context for all IP flows) or a running dictionary based on the compression algorithm (i.e. optimised for a particular IP flow). The receiver must use an identical dictionary for decompression. This method can achieve high compression ratios; however, it has two major drawbacks: ISBN: PGNet

2 The dictionary requires a large memory. The dictionaries at the compressor and decompressor must be synchronised. A running dictionary system may loose synchronisation (or context ) when used over a link subject to packet loss. A loss of synchronisation will cause the receiver to discard all packets, until the receive dictionary is re-synchronised. To overcome the limitations on memory and link quality, packet by packet dictionary [5] algorithms were invented. This compresses each packet individually, sending the context with the packet. This prevents a loss of synchronisation. This also requires a smaller dictionary (less memory). The trade off is this achieves lower compression ratios. using the CID in each packet to refer to the context state at the decompressor). VJHC compresses the IPv4 and TCP header together as a combined set of fields. Figure 1 shows the TCP/IPv4 header fields. Within an IP flow, more then half of the fields are unchanged between successive packets. The total length and identification field are expected to be handled by link framing protocols. The IP checksum can also re-calculate at the receiver. By suppressing these fields at the compressor and restoring them at the decompressor, VJHC can significantly improve transmission efficiency for the packet header. Another kind of compression technique is the Guess-Table-Based compression [5] algorithm. At the sender, this uses an algorithm to guess the next byte(s) of data based on previous data. If the guess is correct, the byte is not transmitted on the link. Both receiver and transmitter must use the same algorithm (context) to successfully decompress data at the receiver. 4. HEADER COMPRESSION Bulk compression achieves little benefit when used on protocol header information. The structure of this information varies from packet to packet and from field to field within the packet headers. Standard bulk compression algorithms can not take advantage of this structure, however a compression algorithm that understands the syntax (and possibly semantics) of the packet headers may be able to achieve considerable benefit by exploiting the redundancy which is often present in successive packets in the same IP flow. This is called Header Compression. 4.1 Van Jacobson Header Compression (VJHC) The Van Jacobson Header Compression scheme [6] relies on knowledge of the TCP/IPv4 headers. The algorithm first classifies packets into individual flows (i.e. packets that share the same set of {IP addresses, IP protocol type, and TCP port numbers}). State (a context) is then created for each flow and a Context ID (CID) assigned to identify the flow at the compressor and decompressor. The sender then omits fields in the header that remain unchanged between successive packets in an IP flow (these may be deduced by Figure 1 TCP/IPv4 s header behaviour Furthermore, the remaining changing fields do not frequently change at the same time, and the compressed header can thus omit these in most cases. The remaining fields usually change only by a small amount in successive packets. A further saving can be achieved by transmitting the difference (i.e. differential encoding) in the value of the field rather then the entire fields. VJHC relies on two types of error detection: A CRC at the link layer (to detect corruption of the compressed packet) and the TCP checksum at the transport layer (to detect corruption in the compressed packet). When errors are detected, the receiver discards the erroneous packet. This creates another problem in the decompression process. Since the differential compression techniques are applied, the receiver also looses the context state. The next following packet after the discarded packet can not therefore be decompressed correctly. It must also be discarded. All subsequent packets will therefore be discarded until the next synchronisation (i.e. uncompressed packet is received, restoring the context state). To overcome this error propagation, receiver should use the differential sequence number change from the incoming compressed packet to the sequence number of the last correctly received packet, and

3 generate a correct sequence number for the packet after discard packet. Errors in the value of the TCP checksum errors of packets received by the destination end host must also be considered. When the end host fails to receive TCP data segments (forward path), no TCP acknowledgement is sent. The sender eventually suffers a TCP timeout, and resends the missing segment(s), these also trigger the compressor to resynchronise the context state. The combined IPv4 and TCP headers the two header can typically be reduced using VJHC from 40B to 4B (i.e. 10% of the original size). The technique significantly improves performance over low speed (300 to 19,200bps) serial links. The main disadvantages of VJHC are the impact of loss of synchronisation (when not used with a reliable link protocol) and the combined compression of the TCP and IPv4 headers. The scheme does not support recent changes to IP (e.g. ECN, Diffserv), or TCP (e.g. SACK, ECN, TS option, LFN). It also prevents the VJHC algorithm from compressing packets with additional headers placed between the IP and TCP headers (e.g. IPSEC AH, or tunnel encapsulations). It also will not compress either IPv6 and/or for other transport protocols (such as UDP). 4.2 IP Header Compression (IPHC) Internet Protocol Header Compression [7] is another uses the same mechanism as VJHC by omitting the unchanged fields in the header. The main difference between IPHC and VJHC, is IPHC compresses only the IP header. This supports any transport protocol or tunnel encapsulation also ECN and IPv6. IPHC also allows extension to multicast, multi-access links. Like VJHC, a 16 bit CID is used for TCP flows, but a larger CID is assigned to non-tcp flows. IPHC handles errors in a similar way to VJHC. IPHC can also use other recovery methods to recover TCP checksum failure (e.g. TWICE algorithm [8]). For non-tcp packets, a periodical uncompressed packet is sent to improve the probability of the context information being correct. This additional information reduces efficiency, but helps bound the impact of packet loss. IPHC may reduce the IP header to 2 bytes for non- TCP session and 4 bytes for TCP session. The main advantage of IPHC is independence of the transport layer protocols. The drawback is IPHC is only half as efficient as VJHC for TCP packets. 5. ROBUST HEADER COMPRESSION (ROHC) The RObust Header Compression scheme [4] is a new header compression scheme, being developed in the ROHC Working Group of the IETF. Compared with the previous schemes (in section 4), the major advantages are high robustness and improved efficiency. A key feature is that the ROHC framework is extensible. This means that new protocols can be added without the need to design a completely new compression protocol. The monolithic approach of VJHC now seems inappropriate, considering the widespread use of tunnel encapsulations, increasing use of security protocols and the emergence of IPv6. The penalty for flexibility is that ROHC is a complicated technique, absorbing all the existing compression techniques, and adding a more sophisticated mechanism to achieve robustness and reliability. Compression and Decompression are treated as finite state machines and can be broken into a series of states. At the compressor, these are Initialization & Refresh (IR), First Order (FO) and Second Order (SO). At the decompressor these three sates: No Context (NO), Static Context (SC) and Full Context (FC). The link starts with no context state for a flow (CID), and therefore can only perform limited compression. Once the compressor has successfully installed context state at the receiver, it may transits to the next state. (E.g. the compressor will gradually transit forward from IR FO SO when it gets sufficiently confident that decompressor has all the information to decompress the header). ROHC defines three operation modes [4], they are: Unidirectional (U-mode), Bidirectional Optimistic (O-mode) and Bidirectional Reliable (R-mode). All ROHC operations start from U-mode, and then may transit to O-mode or R-mode depending on the feedback information. U-mode makes a periodic refresh and time out to update the context (as in IPHC for UDP), O-mode uses the feedback channel for error correction and R-mode utilises all the available resources to prevent from any context loss or loss synchronisation.

4 Each operation mode contains all three states; IR, FO and SO, as shown in the Figure 2 below. Any errors that occur will force each state to return back to a lower compression state or gradually to lower the operation mode if more errors are detected or propagated. Figure 2 ROHC Operation modes The ROHC basic packet format is shown in Figure 3; it consists of padding, feedback, header information and payload. These four generic fields allow the decompressor to generate feedback information quickly and send this back to compressor quickly. Figure 3 ROHC basic packet structure Padding: Padding is located at the beginning of the compressed header; this aligns headers to byte boundaries. Feedback: Feedback information travels from the de-compressor to compressor, to assist in synchronisation of the context state. Header : Compressed header information Payload: Packet payload data As earlier header compression techniques (section 4), ROHC still relies on a Link Layer CRC to verify integrity of the compressed packet. To gain the full benefit, ROHC relies on a feedback acknowledgment channel for error discovery and recovery. In some cases, a CRC also used protects the entire segment such as the initialisation and refresh header and ROHC fragmentation. The main benefit of ROHC is that it may be designed to compress any type of header. For links that may experience loss, it may also be made more robust than exiting schemes such as VJHC and IPHC. Moreover it offer significant benefits for small packets such as TCP ACKs or VoIP packets when sent over a link with limited capacity or low transmission speed. 6 EXPERIMENTAL RESULTS 6.1 Packet by packet bulk compression This section investigates the performance of several bulk compression algorithms (section 3), when use over the entire IP packet. 10,000 TCP/IPv4 packets were captured from an Ethernet LAN and compressed by both the Huffman [3] and Lempel-Ziv Welch (LZW) [9] algorithms. The relationship between compression ratio and original packet length for each compression algorithm is shown in Figure 7(a), (b) respectively. Figure 7(a) shows two curves corresponding to two distinct types of packet payloads. The compression ratio of the packets in the lower curve are consistently lower than 1 throughout the entire range of packet length, (i.e. these packets are expanded in size by the compression algorithm, rather than being reduced). Packets in this class include packets that contain random (or precompressed) data, which can not be successfully compressed by the link compressor using the dictionary based compression techniques, such as Huffman coding and LZW. The upper curve in Figure 7(a) shows an increase in the compression ratio with the packet length increase, yielding a compression gain for packets whose original length is larger than 550 B. In Huffman coding, variable length packets are represented by a fixed size entry in the dictionary, so the data is are smaller than the corresponding code size at the beginning of dictionary, whereas near the end of dictionary, the data size is much bigger than the code size. When the packet size is small, most data in a packet are represented by the first entries in the dictionary, thus, the compression ratio is less then 1. For larger packet sizes, good compression ratios are achieved. Similar result can be found for LZW coding in Figure 7(b) however LZW maps blocks of variable length into blocks of fixed size which allow it to obtain better compression than Huffman coding.

5 Figure 8 plots the compression ratio against packet size for 10,000 UDP/IPv4 packets compressed by either the Huffman or LZW algorithms. The compression ratio is below 1 through the entire range of original packet size, which means no compression gain is obtained. Further analysis showed that most UDP traffic captured was steaming data (e.g. audio or video) which is already compressed by video/audio codec. Some small (control) packets were compressible. 6.2 Comparison of techniques Figure 4 presents a theoretical comparison of the original packet length and compressed packet length with several types of header. ROHC shows considerable advantage and is constantly capable of compression of all headers to less than 10 B. Header Lengths (bytes) Compression Ratio IPv4 IPv6 IPv4/TCP IPv6/TCP IPv4/UDP IPv6/UDP IPv4/UDP/RTP IPv6/UDP/RTP Figure 4 Length of original packets and compressed packet by several compression schemes Original Packet Length (bytes) Original BULK VJHC IPHC ROHC BULK VJHC IPHC ROHC Figure 5 Comparison of compression ratio of several compression schemes The compression ratio of several compression schemes are compared in Figure 5. VJHC, IPHC and ROHC show a similar relationship between compression ratio and original packets length. When the packet length is less then 180 bytes header compression schemes achieve a higher compression ratio then bulk compression. In the case of larger packets, bulk compression can outperform the other compression schemes, but only where data has not already been compressed. The use of IPSEC encryption (ESP with encrypted payload) is also an obstacle to compression. This prevents use of VJHC, and forces ROHC to only compress the outer (unencrypted) packet headers. Bulk compression will also fail to compress an encrypted payload. One mitigation, is to use a bulk compression algorithm prior to applying the IPSEC encryption. 6.3 Application performance Header compression increases the efficiency of information delivery, and for low speed transmission may also reduce the packet transit time. The benefit when using small packets (such as VoIP or TCP ACKs) may be very noticeable. Multimedia HTTP Telnet FTP Bit saving percentage (%) Figure 6 Bit rate saving base on application Bit saving (%) To investigate the overall benefit, requires a study of the range of packet sizes encountered for different applications. 10,000 packets were captured from an Ethernet LAN corresponding to IP flows between several applications, and the resulting data analysed to determine the distribution of packet sizes. Figure 6 shows the predicted bit rate saving of header compression utilised by application. Since Telnet sessions packets are usually small, they offer good compression. HTTP, FTP and multimedia packet usually consist of large packets, thus significant efficiency savings cannot be obtained by solely compressing protocol headers. 7 CONCLUSION Bulk compression is useful when packets carry large volumes of uncompressed data (especially when the payload is larger than 500 bytes). However, when the IP traffic uses encryption or higher layer compression (e.g. ZIP files, IPCOMP, or multimedia CODECs) there is no benefit from

6 compression. In fact, attempted compression simply wastes sender computing resources Header compression is an effective way to reduce the packet header size for small packets (less than approximately 200 B) where compression can provide a significant saving in overall packet size. VJHC can only be applied on TCP/IPv4 packet with no any options. IPHC can not achieve high compression ratio by just compressing IP header, since IP header is one of multiple headers used in a packet. The existing schemes have a number of weaknesses in the packet headers they can compress, and their robustness to loss of packets. In the future, it can be expected that header compression techniques based on the ROHC framework will be able to achieve a reasonable compression ratio but without necessarily a significant loss of robustness to packet loss. At the moment, compression schemes for TCP using ROHC have not been defined, and their behaviour with loss is still to be examined. The practical performance of ROHC is therefore an item of further work. REFERENCES [1] S. Deering and R. Hinden, Internet Protocol Version 6 (IPv6) Specification, RFC 1883, [2] U. o. S. California and C. Marina del Rey, Internet Protocol Specification, RFC 0791, [3] D. A. Huffman, A Method for the Construction of Minimum Redundancy Codes, Proceedings of the IRE, [4] C. Bormann, et al RObust Header Compression (ROHC): Framework and four profiles: RTP, UDP, ESP, and uncompressed, RFC 3095, [5] HP Company, HP Case Study: WAN Link Compression on HP Routers, [6] V. Jacobson, Compression TCP/IP for Low-Speed Serial Link, RFC 1144, [7] M. Degermark, B. Nordgren, and S. Pink, IP Header Compression, RFC 2507, [8] M. Degermark, M. Engan, B. Nordgren, and S. Pink, Low-loss TCP/IP header compression for wireless networks, at ACM MobiCom, [9] T. A. Welch, A Technique for High- Performance Data Compression, Computer, pp. 8-18, (a) Huffman Coding (b) Lempel-Ziv Welch Figure 7 Packet by packet compression on TCP/IP packets (a) Huffman Coding (b) Lempel-Ziv Welch Figure 8 Packet by packet compression on UDP/IP packets

Robust Header Compression for Multimedia Services

Robust Header Compression for Multimedia Services Robust Header Compression for Multimedia Services Frank Fitzek Arizona State University 06/03/2002 Content Motivation, Introduction, Problems Related Work Robust Header Compression Wireless JSQ Testbed

More information

Adaptive Header Compression for Wireless Networks

Adaptive Header Compression for Wireless Networks Adaptive Header Compression for Wireless Networks Changli Jiao Department of Electrical and Computer Engineering Wayne State University Detroit, MI 48202 Email: changli@katha.eng.wayne.edu Loren Schwiebert

More information

Configuring RTP Header Compression

Configuring RTP Header Compression Header compression is a mechanism that compresses the IP header in a packet before the packet is transmitted. Header compression reduces network overhead and speeds up the transmission of either Real-Time

More information

Configuring RTP Header Compression

Configuring RTP Header Compression Configuring RTP Header Compression First Published: January 30, 2006 Last Updated: July 23, 2010 Header compression is a mechanism that compresses the IP header in a packet before the packet is transmitted.

More information

Robust Header Compression (ROHC)

Robust Header Compression (ROHC) Robust Header Compression (ROHC) A step towards all-ip wireless networks Carsten Bormann TZI ISSLOW: Integrated Services over slow links Background: RTP is replacing TDM ISSLOW: 1996 initiative for packet

More information

MILCOM October 2002 (Anaheim, California) Subject

MILCOM October 2002 (Anaheim, California) Subject MILCOM 2002 7-10 October 2002 (Anaheim, California) Subject PERFORMANCE ANALYSIS OF A NEW HEADER COMPRESSION SCHEME FOR TCP STREAMS IN IP BASED WIRELESS NETWORKS Authors: Prof. Pietro Camarda, Ing.. Sandro

More information

Robust Header Compression (RoHC) over Multiprotocol Label Switching (MPLS) Networks

Robust Header Compression (RoHC) over Multiprotocol Label Switching (MPLS) Networks Computer Science Mohammad Ahsan Chishti / Shaima Quershi / Ajaz Hussain Mir Robust Header Compression (RoHC) over Multiprotocol Label Switching (MPLS) Networks Bibliographic information published by the

More information

Background: IP Protocol Stack

Background: IP Protocol Stack Networking and protocols for real-time signal transmissions by Hans-Peter Schwefel & Søren Vang Andersen Mm1 Introduction & simple performance models (HPS) Mm2 Real-time Support in Wireless Technologies

More information

IPv6 Header Compression

IPv6 Header Compression IPv6 Header Compression North American IPv6 Summit, June 2004 Emre Ertekin Christos Christou Booz Allen Hamilton {ertekin_emre, christou_chris}@bah.com 1 Outline Introduction Background on IETF Hop-by-Hop

More information

Performance Evaluation of Robust Header Compression Protocol for Low Data Rate Networks

Performance Evaluation of Robust Header Compression Protocol for Low Data Rate Networks Performance Evaluation of Robust Header Compression Protocol for Low Data Rate Networks Author: Faraz Iqbal Supervisor: Frank Y. Li (UIA) Co-Supervisors: Marrian Hauge & Margrete Allern Brose (FFI) A thesis

More information

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print, ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure

More information

Internet Engineering Task Force (IETF) Category: Standards Track. M. West Siemens/Roke Manor January 2013

Internet Engineering Task Force (IETF) Category: Standards Track. M. West Siemens/Roke Manor January 2013 Internet Engineering Task Force (IETF) Request for Comments: 6846 Obsoletes: 4996 Category: Standards Track ISSN: 2070-1721 G. Pelletier InterDigital Communications K. Sandlund Ericsson L-E. Jonsson M.

More information

Performance Analysis of Header Compression Schemes in Heterogeneous Wireless Multi Hop Networks

Performance Analysis of Header Compression Schemes in Heterogeneous Wireless Multi Hop Networks Wireless Personal Communications (2006) 38: 203 232 DOI: 10.1007/s11277-005-9012-7 C Springer 2006 Performance Analysis of Header Compression Schemes in Heterogeneous Wireless Multi Hop Networks PATRICK

More information

Configuring TCP Header Compression

Configuring TCP Header Compression Configuring TCP Header Compression First Published: January 30, 2006 Last Updated: May 5, 2010 Header compression is a mechanism that compresses the IP header in a packet before the packet is transmitted.

More information

UDP Lite for Real Time Multimedia Applications

UDP Lite for Real Time Multimedia Applications UDP Lite for Real Time Multimedia Applications Lars-Åke Larzon*, Mikael Degermark*, Stephen Pink* Extended Enterprise Laboratory HP Laboratories Bristol HPL-IRI-1999-001 April, 1999 E-mail: [11n,micke,steve]@cdt.luth.se

More information

Configuring TCP Header Compression

Configuring TCP Header Compression Header compression is a mechanism that compresses the IP header in a packet before the packet is transmitted. Header compression reduces network overhead and speeds up the transmission of either Real-Time

More information

Header Compression Schemes for Wireless Internet Access

Header Compression Schemes for Wireless Internet Access Header Compression Schemes for Wireless Internet Access Frank Fitzek, Stefan Hendrata, Patrick Seeling, and Martin Reisslein July 30, 2003 Contents 1 Introduction 6 1.1 Motivation for Header Compression......................

More information

ONLINE GAMES: IS THE INTERNET PREPARED FOR

ONLINE GAMES: IS THE INTERNET PREPARED FOR ONLINE GAMES: IS THE INTERNET PREPARED FOR THEM? GTC Communication Technologies Group Jose Saldana University of Zaragoza Spain Index - I. The two problems - II. Online games - III. Multiplexing FPS -

More information

RObust Header Compression (ROHC): Framework and four profiles: RTP, UDP, ESP, and uncompressed

RObust Header Compression (ROHC): Framework and four profiles: RTP, UDP, ESP, and uncompressed Network Working Group Request for Comments: 3095 Category: Standards Track C. Bormann, Editor, TZI/Uni Bremen C. Burmeister, Matsushita M. Degermark, Univ. of Arizona H. Fukushima, Matsushita H. Hannu,

More information

Category: Standards Track Lulea University of Technology/Telia Research AB S. Pink. Lulea University of Technology/SICS.

Category: Standards Track Lulea University of Technology/Telia Research AB S. Pink. Lulea University of Technology/SICS. Network Working Group M. Degermark Request for Comments: 2507 Lulea University of Technology/SICS Category: Standards Track B. Nordgren Lulea University of Technology/Telia Research AB S. Pink Lulea University

More information

Network Layer (1) Networked Systems 3 Lecture 8

Network Layer (1) Networked Systems 3 Lecture 8 Network Layer (1) Networked Systems 3 Lecture 8 Role of the Network Layer Application Application The network layer is the first end-to-end layer in the OSI reference model Presentation Session Transport

More information

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication

More information

Request for Comments: 5225 Category: Standards Track April 2008

Request for Comments: 5225 Category: Standards Track April 2008 Network Working Group Request for Comments: 5225 Category: Standards Track G. Pelletier K. Sandlund Ericsson April 2008 Status of This Memo RObust Header Compression Version 2 (ROHCv2): Profiles for RTP,

More information

Position of IP and other network-layer protocols in TCP/IP protocol suite

Position of IP and other network-layer protocols in TCP/IP protocol suite Position of IP and other network-layer protocols in TCP/IP protocol suite IPv4 is an unreliable datagram protocol a best-effort delivery service. The term best-effort means that IPv4 packets can be corrupted,

More information

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015 Paper solution Subject: Computer Networks (TE Computer- 2012 pattern) Marks : 30 Date: 5/2/2015 Q1 a) What is difference between persistent and non persistent HTTP? Also Explain HTTP message format. [6]

More information

ETSF10 Internet Protocols Transport Layer Protocols

ETSF10 Internet Protocols Transport Layer Protocols ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.2 Kaan Bür, Jens Andersson Transport Layer Protocols Special Topic: Quality of Service (QoS) [ed.4 ch.24.1+5-6] [ed.5 ch.30.1-2]

More information

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6. Transport Layer 6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6.1 Internet Transport Layer Architecture The

More information

IP Packet Switching. Goals of Todayʼs Lecture. Simple Network: Nodes and a Link. Connectivity Links and nodes Circuit switching Packet switching

IP Packet Switching. Goals of Todayʼs Lecture. Simple Network: Nodes and a Link. Connectivity Links and nodes Circuit switching Packet switching IP Packet Switching CS 375: Computer Networks Dr. Thomas C. Bressoud Goals of Todayʼs Lecture Connectivity Links and nodes Circuit switching Packet switching IP service model Best-effort packet delivery

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

Does current Internet Transport work over Wireless? Reviewing the status of IETF work in this area

Does current Internet Transport work over Wireless? Reviewing the status of IETF work in this area Does current Internet Transport work over Wireless? Reviewing the status of IETF work in this area Sally Floyd March 2, 2000 IAB Workshop on Wireless Internetworking 1 Observations: Transport protocols

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

A Hybrid ARQ Scheme for Resilient Packet Header Compression

A Hybrid ARQ Scheme for Resilient Packet Header Compression A Hybrid ARQ Scheme for Resilient Packet Compression Vijay A Suryavanshi and Aria Nosratinia Multimedia Communications Laboratory, The University of Texas at Dallas Richardson, TX 7083-0688, USA E-mail:

More information

Transporting Voice by Using IP

Transporting Voice by Using IP Transporting Voice by Using IP National Chi Nan University Quincy Wu Email: solomon@ipv6.club.tw 1 Outline Introduction Voice over IP RTP & SIP Conclusion 2 Digital Circuit Technology Developed by telephone

More information

A Lossless Compression Method for Internet Packet Headers

A Lossless Compression Method for Internet Packet Headers A Lossless Compression Method for Internet Packet Headers Raimir Holanda and Jorge García Computer Architecture Dept. Technical University of Catalonia Barcelona, Spain Email: {rholanda,jorge}@ac.upc.edu

More information

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks

More information

Communication Systems DHCP

Communication Systems DHCP Communication Systems DHCP Computer Science Copyright Warning This lecture is already stolen If you copy it please ask the author Prof. Dr. Gerhard Schneider like I did 2 Internet Protocol the Universal

More information

Principles. IP QoS DiffServ. Agenda. Principles. L74 - IP QoS Differentiated Services Model. L74 - IP QoS Differentiated Services Model

Principles. IP QoS DiffServ. Agenda. Principles. L74 - IP QoS Differentiated Services Model. L74 - IP QoS Differentiated Services Model Principles IP QoS DiffServ Differentiated Services Architecture DSCP, CAR Integrated Services Model does not scale well flow based traffic overhead (RSVP messages) routers must maintain state information

More information

Multimedia in the Internet

Multimedia in the Internet Protocols for multimedia in the Internet Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ > 4 4 3 < 2 Applications and protocol stack DNS Telnet

More information

Cédric Westphal Nokia Research Center, Mountain View, CA

Cédric Westphal Nokia Research Center, Mountain View, CA Improvements on IP Header Compression: a performance study Cédric Westphal Nokia Research Center, Mountain View, CA cedric.westphal@nokia.com Abstract Due to bandwidth constraints on the wireless link

More information

8. Network Layer Contents

8. Network Layer Contents Contents 1 / 43 * Earlier Work * IETF IP sec Working Group * IP Security Protocol * Security Associations * Authentication Header * Encapsulation Security Payload * Internet Key Management Protocol * Modular

More information

Link download full: Test Bank for Business Data Networks and Security 9th Edition by Panko https://digitalcontentmarket.org/download/business-data-networks-and-security-9thedition-by-panko/ Business Data

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Configuring Class-Based RTP and TCP Header Compression

Configuring Class-Based RTP and TCP Header Compression Configuring Class-Based RTP and TCP Header Compression Header compression is a mechanism that compresses the IP header in a packet before the packet is transmitted. Header compression reduces network overhead

More information

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 25, 2018

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 25, 2018 CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet IP

More information

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates: BSc.(Hons) Computer Science with Network Security BEng (Hons) Telecommunications Cohort: BCNS/17B/FT Examinations for 2017-2018 / Semester 2 Resit Examinations for BCNS/15A/FT, BTEL/15B/FT & BTEL/16B/FT

More information

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists 3,800 116,000 120M Open access books available International authors and editors Downloads Our

More information

Computer Networking: A Top Down Approach Featuring the. Computer Networks with Internet Technology, William

Computer Networking: A Top Down Approach Featuring the. Computer Networks with Internet Technology, William Dr. John Keeney 3BA33 TCP/IP protocol architecture with IP OSI Model Layers TCP/IP Protocol Architecture Layers TCP/IP Protocol Suite Application Layer Application Layer Telnet FTP HTTP DNS RIPng SNMP

More information

CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS

CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS 18.1 (1) The communications network may only accept blocks of data up to a certain size. (2) Error control may be more efficient with a smaller PDU size.

More information

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks Verkkomedian perusteet Fundamentals of Media T-110.250 19.2.2002 Antti Ylä-Jääski 19.2.2002 / AYJ lide 1 Goals and topics protocols Discuss how packet-switching networks differ from circuit switching networks.

More information

Network-Adaptive Video Coding and Transmission

Network-Adaptive Video Coding and Transmission Header for SPIE use Network-Adaptive Video Coding and Transmission Kay Sripanidkulchai and Tsuhan Chen Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA 15213

More information

Introduction to VoIP. Cisco Networking Academy Program Cisco Systems, Inc. All rights reserved. Cisco Public. IP Telephony

Introduction to VoIP. Cisco Networking Academy Program Cisco Systems, Inc. All rights reserved. Cisco Public. IP Telephony Introduction to VoIP Cisco Networking Academy Program 1 Requirements of Voice in an IP Internetwork 2 IP Internetwork IP is connectionless. IP provides multiple paths from source to destination. 3 Packet

More information

Evaluation of CRTP Performance over Cellular Radio Links

Evaluation of CRTP Performance over Cellular Radio Links Abstract To make mobile IP telephony over cellular radio systems an economically viable alternative to circuit-switched voice, it is an absolute requirement that the 40-octet IP/UDP/RTP headers on IP telephony

More information

July 3, Diet-IPsec: ESP Payload Compression of IPv6 / UDP / TCP / UDP-Lite draft-mglt-ipsecme-diet-esp-payload-compression-00.

July 3, Diet-IPsec: ESP Payload Compression of IPv6 / UDP / TCP / UDP-Lite draft-mglt-ipsecme-diet-esp-payload-compression-00. IPSECME Internet-Draft Intended status: Standards Track Expires: January 4, 2015 D. Migault, Ed. Orange T. Guggemos, Ed. Orange / LMU Munich July 3, 2014 Diet-IPsec: ESP Payload Compression of IPv6 / UDP

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted

More information

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 30, 2018

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 30, 2018 CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala October 30, 2018 Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet

More information

RTP. Prof. C. Noronha RTP. Real-Time Transport Protocol RFC 1889

RTP. Prof. C. Noronha RTP. Real-Time Transport Protocol RFC 1889 RTP Real-Time Transport Protocol RFC 1889 1 What is RTP? Primary objective: stream continuous media over a best-effort packet-switched network in an interoperable way. Protocol requirements: Payload Type

More information

Ericsson January 2006

Ericsson January 2006 Network Working Group Request for Comments: 4224 Category: Informational G. Pelletier L-E. Jonsson K. Sandlund Ericsson January 2006 Status of This Memo RObust Header Compression (ROHC): ROHC over Channels

More information

A Packet Header Compression Algorithm based on TCP Flow Clustering and Huffman Encoding

A Packet Header Compression Algorithm based on TCP Flow Clustering and Huffman Encoding Anais do XXVI Congresso da SBC SEMISH l XXXIII Seminário Integrado de Software e Hardware 14 a 20 de julho de 2006 Campo Grande, MS A Packet Header Compression Algorithm based on TCP Flow Clustering and

More information

The Effnet Header & Payload Compression Solution for Industrial Communication

The Effnet Header & Payload Compression Solution for Industrial Communication The Effnet Header & Compression Solution for Industrial Communication Many industries such as oil and gas, mining, utility, public safety and military, transport and government use low bandwidth (narrowband)

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Introduction to Networked Multimedia An Introduction to RTP p. 3 A Brief History of Audio/Video Networking p. 4 Early Packet Voice and Video

Introduction to Networked Multimedia An Introduction to RTP p. 3 A Brief History of Audio/Video Networking p. 4 Early Packet Voice and Video Preface p. xi Acknowledgments p. xvii Introduction to Networked Multimedia An Introduction to RTP p. 3 A Brief History of Audio/Video Networking p. 4 Early Packet Voice and Video Experiments p. 4 Audio

More information

Packetization Layer Path Maximum Transmission Unit Discovery (PLPMTU) For IPsec Tunnels

Packetization Layer Path Maximum Transmission Unit Discovery (PLPMTU) For IPsec Tunnels Packetization Layer Path Maximum Transmission Unit Discovery (PLPMTU) For IPsec Tunnels draft-spiriyath-ipsecme-dynamic-ipsec-pmtu-01 Shibu Piriyath, Umesh Mangla, Nagavenkata Suresh Melam, Ron Bonica

More information

NT1210 Introduction to Networking. Unit 10

NT1210 Introduction to Networking. Unit 10 NT1210 Introduction to Networking Unit 10 Chapter 10, TCP/IP Transport Objectives Identify the major needs and stakeholders for computer networks and network applications. Compare and contrast the OSI

More information

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

ETSF05/ETSF10 Internet Protocols Network Layer Protocols ETSF05/ETSF10 Internet Protocols Network Layer Protocols 2016 Jens Andersson Agenda Internetworking IPv4/IPv6 Framentation/Reassembly ICMPv4/ICMPv6 IPv4 to IPv6 transition VPN/Ipsec NAT (Network Address

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

H.323. Definition. Overview. Topics

H.323. Definition. Overview. Topics H.323 Definition H.323 is a standard that specifies the components, protocols and procedures that provide multimedia communication services real-time audio, video, and data communications over packet networks,

More information

Internet Protocols (chapter 18)

Internet Protocols (chapter 18) Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005 Firewalls Lecture 33 Security April 15, 2005 Idea: separate local network from the Internet Trusted hosts and networks Intranet Firewall DMZ Router Demilitarized Zone: publicly accessible servers and networks

More information

Information Network Systems The network layer. Stephan Sigg

Information Network Systems The network layer. Stephan Sigg Information Network Systems The network layer Stephan Sigg Tokyo, November 1, 2012 Error-detection and correction Decoding of Reed-Muller codes Assume a second order (16, 11) code for m = 4. The r-th order

More information

CODING TECHNIQUES FOR RESILIENT PACKET HEADER COMPRESSION

CODING TECHNIQUES FOR RESILIENT PACKET HEADER COMPRESSION CODING TECHNIQUES FOR RESILIENT PACKET HEADER COMPRESSION APPROVED BY SUPERVISORY COMMITTEE: Dr. Aria Nosratinia, Chair Dr. Andrea Fumagalli Dr. Hlaing Minn Copyright 2005 Vijay A Suryavanshi All Rights

More information

Network Working Group. Category: Standards Track Cisco Systems February Compressing IP/UDP/RTP Headers for Low-Speed Serial Links

Network Working Group. Category: Standards Track Cisco Systems February Compressing IP/UDP/RTP Headers for Low-Speed Serial Links Network Working Group Request for Comments: 2508 Category: Standards Track S. Casner Cisco Systems V. Jacobson Cisco Systems February 1999 Compressing IP/UDP/RTP Headers for Low-Speed Serial Links Status

More information

UDP: Datagram Transport Service

UDP: Datagram Transport Service UDP: Datagram Transport Service 1 Topics Covered Introduction Transport Protocols and End-to-End Communication The User Datagram Protocol The Connectionless Paradigm Message-Oriented Interface UDP Communication

More information

Computer Communication & Networks / Data Communication & Computer Networks Week # 03

Computer Communication & Networks / Data Communication & Computer Networks Week # 03 Computer Communication & Networks / Data Communication & Computer Networks Week # 03 M.Nadeem Akhtar CS & IT Department The University of Lahore Email: nadeem.akhtar@cs.uol.edu.pk URL-https://sites.google.com/site/nadeemuolcsccn/home

More information

Business Data Networks and Security 10th Edition by Panko Test Bank

Business Data Networks and Security 10th Edition by Panko Test Bank Business Data Networks and Security 10th Edition by Panko Test Bank Chapter 2 Network Standards 1) Internet standards are published as. A) RFCs B) IETFs C) TCP/IPs D) Internet Protocols Question: 1a Objective:

More information

Data & Computer Communication

Data & Computer Communication Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects

More information

Introduction. IP Datagrams. Internet Service Paradigm. Routers and Routing Tables. Datagram Forwarding. Example Internet and Conceptual Routing Table

Introduction. IP Datagrams. Internet Service Paradigm. Routers and Routing Tables. Datagram Forwarding. Example Internet and Conceptual Routing Table Introduction Datagram Forwarding Gail Hopkins Service paradigm IP datagrams Routing Encapsulation Fragmentation Reassembly Internet Service Paradigm IP Datagrams supports both connectionless and connection-oriented

More information

for Wireless Networks fmicke, engan, bcn, Lulea University PO box 1263 S Lulea, Sweden S Kista, Sweden 1 Introduction

for Wireless Networks fmicke, engan, bcn, Lulea University PO box 1263 S Lulea, Sweden S Kista, Sweden 1 Introduction Low-loss TCP/IP Header Compression for Wireless Networks Mikael Degermark y, Mathias Engan y, Bjorn Nordgren y, and Stephen Pink yz fmicke, engan, bcn, steveg@cdt.luth.se y CDT/Department of Computer Science

More information

SEN366 (SEN374) (Introduction to) Computer Networks

SEN366 (SEN374) (Introduction to) Computer Networks SEN366 (SEN374) (Introduction to) Computer Networks Prof. Dr. Hasan Hüseyin BALIK (12 th Week) The Internet Protocol 12.Outline Principles of Internetworking Internet Protocol Operation Internet Protocol

More information

RSVP Support for RTP Header Compression, Phase 1

RSVP Support for RTP Header Compression, Phase 1 RSVP Support for RTP Header Compression, Phase 1 The Resource Reservation Protocol (RSVP) Support for Real-Time Transport Protocol (RTP) Header Compression, Phase 1 feature provides a method for decreasing

More information

Framework and Model for Automated Interoperability Test and Its Application to ROHC

Framework and Model for Automated Interoperability Test and Its Application to ROHC Framework and Model for Automated Interoperability Test and Its Application to Sarolta Dibuz and Péter Krémer Ericsson Telecommunications Hungary P.O. Box 107, H-1300, Budapest 3, Hungary {Sarolta.Dibuz,Peter.Kremer}@eth.ericsson.se

More information

Configuring Class-Based RTP and TCP Header Compression

Configuring Class-Based RTP and TCP Header Compression Configuring Class-Based RTP and TCP Header Compression Last Updated: December 5, 2011 Header compression is a mechanism that compresses the IP header in a packet before the packet is transmitted. Header

More information

WhitePaper: XipLink Real-Time Optimizations

WhitePaper: XipLink Real-Time Optimizations WhitePaper: XipLink Real-Time Optimizations XipLink Real Time Optimizations Header Compression, Packet Coalescing and Packet Prioritization Overview XipLink Real Time ( XRT ) is an optimization capability

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CCNA Exploration1 Chapter 7: OSI Data Link Layer CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the

More information

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1 IPSec Slides by Vitaly Shmatikov UT Austin slide 1 TCP/IP Example slide 2 IP Security Issues Eavesdropping Modification of packets in transit Identity spoofing (forged source IP addresses) Denial of service

More information

Advanced Communication Networks

Advanced Communication Networks Advanced Communication Networks Advanced Transport Issues Prof. Ana Aguiar University of Porto, FEUP 2010-2011 Contents Congestion in Best-effort Networks TCP Congestion Control Congestion Avoidance Mechanisms

More information

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Network Layer Network Fundamentals Chapter 5 Version 4.0 1 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Mobile IP 2 Mobile Network Layer: Problems and Concerns Entities and Terminology in Mobile IP Mobile Indirect Routing Mobile IP Agent Advertisement Registration

More information

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch 3.1.5 & 3.2 Xiaowei Yang xwy@cs.duke.edu Review Past lectures Single link networks Point-to-point,

More information

End-to-End QoS Improvement using IPv6 Header Reduction over MPLS

End-to-End QoS Improvement using IPv6 Header Reduction over MPLS End-to-End QoS Improvement using IPv6 Header Reduction over MPLS Imad J. Mohamad, PhD Dept. of Computer Science College of Science University of Baghdad Iraq ABSTRACT In 802.16 standards, PHS suppresses

More information

Sirindhorn International Institute of Technology Thammasat University

Sirindhorn International Institute of Technology Thammasat University Name.............................. ID............... Section...... Seat No...... Thammasat University Final Exam: Semester, 205 Course Title: Introduction to Data Communications Instructor: Steven Gordon

More information

Introduction to TCP/IP networking

Introduction to TCP/IP networking Introduction to TCP/IP networking TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute TCP : Transmission Control Protocol HTTP, FTP, ssh What is an internet? A set

More information

Digital Asset Management 5. Streaming multimedia

Digital Asset Management 5. Streaming multimedia Digital Asset Management 5. Streaming multimedia 2015-10-29 Keys of Streaming Media Algorithms (**) Standards (*****) Complete End-to-End systems (***) Research Frontiers(*) Streaming... Progressive streaming

More information

Chapter 12 Network Protocols

Chapter 12 Network Protocols Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)

More information

Networks Fall This exam consists of 10 problems on the following 13 pages.

Networks Fall This exam consists of 10 problems on the following 13 pages. CSCI 466 Final Networks Fall 2011 Name: This exam consists of 10 problems on the following 13 pages. You may use your two- sided hand- written 8 ½ x 11 note sheet during the exam and a calculator. No other

More information

CS 455: INTRODUCTION TO DISTRIBUTED SYSTEMS [NETWORKING] Frequently asked questions from the previous class surveys

CS 455: INTRODUCTION TO DISTRIBUTED SYSTEMS [NETWORKING] Frequently asked questions from the previous class surveys CS 455: INTRODUCTION TO DISTRIBUTED SYSTEMS [NETWORKING] The Receiver's Buffer Small it may be But throttle the mightiest sender It can Not just the how much But also the when Or if at all Shrideep Pallickara

More information