Non-Cooperative End-to-End Path Characterisation

Size: px
Start display at page:

Download "Non-Cooperative End-to-End Path Characterisation"

Transcription

1 Non-Cooperative End-to-End Path Characterisation Kapil Bajaj, Balaji Kasal, Harshal Ninawe, Sriharsha and D. Manjunath Indian Institute of Technology, Bombay Powai Mumbai INDIA 1 Abstract We describe algorithms to obtain one way bandwidth and loss characteristics of Internet paths in the forward and reverse direction from a measuring node to target Internet host. A non cooperative framework is assumed where the target host is not aware of the measurement process. Bandwidth measurements use the well known packet-train method and loss measurements are performed on TCP type or rate controlled flows. These techniques are used in the tools ipathmeter-b and ipathmeter-l that is now being distributed. We also describe some of our early experiences in using these tools. Keywords Non Cooperative Measurement, Path Characterisation, Loss Characterisation, Bandwidth Characterisation, Packet Pair. I. Introduction We consider the problem of estimating one way bandwidth and loss characteristics of Internet path in a non-cooperative setting. To estimate bandwidth we use the packet-pair technique which was originally described [4] for rate controlled networks. [2] uses the packet-pair technique in bprobe to estimate the bottleneck bandwidth and cprobe to estimate the available bandwidth. Though these tools work in a noncooperative environment, they assume symmetric network behavior, which is rarely the case. [3] discusses pathrate, a cooperative bandwidth measurement tool. These tools measure bandwidth in only one direction. [6] describes a passive bottleneck bandwidth measurement tool Nettimer. Here it is necessary to filter out bad samples which gives inconsistent bandwidth estimation. ICMP based loss measurements may not reflect loss characteristics of the paths because many nodes rate limit ICMP responses. Further, it is important to characterise paths as they would be seen by applications, much of which have TCP/UDP for their trans- This work was funded by a grant from the Department of Science and Technology. Balaji Kasal was supported by this grant. Kapil Bajaj and Harshal Ninawe are with Dept of Comp. Sc & Engg. Balaji Kasal, Sriharsha and D. Manjunath are with Dept of Elecl Engg port protocol. In this paper we also address the problem of one way loss characterisation [1], [5] of Internet paths for TCP/UDP type and rate controlled traffic. The rest of the paper is organised as follows: In Section II we describe bandwidth measurement using packet-pair and packet-train techniques and its implementation in ipathmeter-b. In Section III we describe the measurement technique for packet loss statistics and its implementation in ipathmeter-l. Section IV describes some sample results. In Section V we discuss limitations of ipathmeter-b and ipathmeter-l and future work. II. Bandwidth Measurement The principle behind the packet-pair technique is that if two large back-to-back packets (assuming no time delay between them) traverse the bottleneck link, they will be queued and their time dispersion will increase according to the relation (refer Fig. 1), t d sec = P bytes B bl bytes/sec (1) where t d is the time dispersion after the passing bottleneck link, P is the size of the packet and B bl is Packet-1 Packet-2 td Bottleneck Link Packet-1 Packet-2 Time Fig. 1. Timing diagram for bottleneck bandwidth measurement using packet pair. Two back-to-back packets from the source get dispersed at the bottleneck link because of queuing. This dispersion is maintained up to the target host. td

2 2 the bottleneck link bandwidth. It is assumed that this dispersion is maintained as they traversed higher bandwidth links further along the path. Thus the dispersion measured at the destination will be t d and Eqn. 1 can be used. First we describe the packet-pair technique for the forward (from source to target) path. We send two back-to-back TCP SYN packets with large payload to increase the probability of the packets getting queued at the bottleneck link. The destination port number of these packets is some unlikely value, assumed to be not in use at the destination. Target host will respond with TCP RST packets which, being small packets, is assumed to traverse the path without being queued. This implies that the time dispersion between the received RST packets is the same as that of the time dispersion of the SYN packets at the bottleneck link. This dispersion can be used in the Eqn. 1. This packet-pair technique can be extended to a packettrain of length N (N > 2) packets. Using the experimental setup shown in Fig. 2 we sent eight back-toback SYN packets and received the eight RSTs. The resulting trace is shown in Fig. 3. The dispersion between first and last packet of the train will account for competing traffic and we can estimate available bandwidth along the path using relation [2] T sec = (N 1)P bytes B a bytes/sec (2) where T is the time dispersion between first and last packet measured at the source host, N is train length, P is the size of packet and B a is available bandwidth. To measure the bottleneck bandwidth in the reverse path (from target to source) it is necessary to invoke two back-to-back packets from the target host. We will make the target host send these packets from a specified URL using a HTTP style mechanism. Since the target host uses TCP, this task becomes nontrivial and is accomplished as follows. We first set up a TCP connection with a three way handshake. We start receiving base page of the target host after sending HTTP GET. To receive packets of the required size we use the Maximum Segment Size (MSS) parameter. The target host is made to send these packets back-to-back by controlling the advertised window of Experimental Setup 10Mbps 10Mbps 1Gbps 10Mbps Router - 1 Router - 2 Router - 3 Fig. 2. Experimental setup (msec) Time SYN (500) SYN (500) RST (0) Fig. 3. Timing diagram of packet train generation in forward path. Source host sends eight back-to-back large SYN packets to an unused port in the target host. For each SYN, the target host responds with a RST. The times shown are relative to the first packet. the TCP. To make the target host transmit a packettrain of the required length we group the s appropriately. We each received data packet from target host with zero advertised window, but for last we maximize the advertised window size so that target host sends all the packets back-to-back. Fig. 4 describes the algorithm to generate a packet-train on the reverse path. Program runs for user specified number of rounds. For any abnormal response we break the connection and discard those corresponding measurement. Fig. 5 is an example output. This technique assumes FIFO scheduling at the routers, no competing traffic in between packet pair and no downstream congestion. In the presence of competing traffic, Eqn 1 can underestimate the bottleneck link bandwidth. Further, if there is congestion after the bottleneck link, it can overestimate the bottleneck link bandwidth. A. ipathmeter-b ipathmeter-b estimates bottleneck bandwidth and available bandwidth in both reverse and forward direction for a given target host. It takes remote host name/ip address, packet size (in Bytes), train length (number of packets), number of measurements and direction as the command line parameters. For forward measurements, program first sets the BPF [7] filter for the target host, sends back-to-back TCP SYN packets equal to the train length using raw sockets, to some random port uses libpcap to capture the returning

3 3 MSS specifiedsize {Set the option} seqno random() Send TCP SYN to target host recd pkt = grab one packet() {capture packet using libpcap} if recd pkt!= SYN/ then increase seq no send and HTTP GET recd pkt grab one packet() if recd pkt == for GET then for all i such that 1 i rounds do slow win 2 i for all j such that 0 j slow win do recd pkt grab one packet() if (recd pkt) == (RST FIN) then if ((length of train! = req train length) && (pkt recd is last in round)) then send for data pkt with adv window size 0 with all except last. send with req window size for next round. if (pkts reordered retransmission) then save time stamps for future analysis send RST Fig. 4. Pseudocode for reverse packet-train generation SYN (0) SYN/ (0) GET/ (102) P1 (500) P2(500) 1 Wd(0) 2 Wd(32120) P3 (500) P4 (500) P5 (500) P6 (500) 3 Wd(0) 4 Wd(0) 5 Wd (0) 6 P7 (500) P14 (500) Wd(32120) RST Fig. 5. Timing diagram of packet train generation in reverse direction. Program at source host overrides kernel TCP and controls the packet exchange with target host. After handshaking with target host, it asks for base page with a HTTP GET. To get a packet train from the target host each packet is ed with a zero advertised window except for the last in the train. TCP RST packets. For reverse measurements, a firewall using ipchains bypasses the kernel, sets a BPF filter for the target host and opens a connection with its WWW server. It then sends a HTTP GET for the base page and s the data packets received until the specified packet train length is received. Using HTTP GET for the base page makes ipathmeter-b generic for WWW servers. Error conditions out-of-order packets, packet loss, packet retransmission and unexpected packets terminate the program. ipathmeter-b estimates the bandwidth from the time dispersions and displays these estimates as histograms. III. Loss Pattern Measurement Loss pattern analysis is based on [1], [5]. The forward path measurement procedure is straightforward and is similar to the bandwidth measurement process. For the reverse path, we follow the same initial sequence as that for bandwidth measurement and a HTTP GET request is sent. The packet flow is controlling the times that the s are sent. To be able to identify the lost packets, it is necessary to prevent the target host from retransmitting lost packets. Therefore if an expected packet is not received within a time interval of 1.5RT T, an for that packet is sent to prevent the target from timing out and retransmitting. A rate controlled path is emulated by controlling the times of the s and making the target host send according to a specified rate. See

4 4 Open Raw socket Open libpcap descriptor Set firewall to prevent packets from target host reaching local host kernel for i = 1 to i = No.ofIterations do Send TCP SYN to target host Target host IP address,port Number, MSS, Window one segment if Target host sends SYN then Send and HTTP GET request if for request is received then repeat if Sequence Numbers in correct order then for next packet Wait for RTO duration and for next packet. Assume packet is Lost until FIN sent by target host Send for target s FIN and send own FIN Send RST Send RST Fig. 6. Pseudocode for loss pattern measurement. Fig. 6 for details of the algorithm. Metrics like loss distance, loss period, and loss rate can be easily determined from the sample. A. ipathmeter-l ipathmeter-l is a tool that uses the algorithm of Fig. 6 described above. A raw socket is opened and a limited TCP functionality is implemented. To avoid the local host kernel reset connection to target host, an IP chain filter for the desired IP address and port number is introduced. Packets from the target host are captured via libpcap implementation. ipathmeter- L reports loss rate, loss distance and loss period during a HTTP like transaction with a target WWW server. It can be configured to perform these measurements over TCP like or rate controlled flow from the target host. Input parameters are the target host name or the IP address, packet size in bytes, number of packets, number of iterations and mode of data flow control (TCP-like or rate control). Fig. 7 shows a sample sequence from an experiment. We must mention here Local Host lost SYN(0) SYN/(0) GET/(102) P1(90) P2(1460) P3(1460) P4(1460) P5(1460) P6(1460) P7(1460) P20(1460) RST Remote Host Fig. 7. Timing diagram of data flow from WWW server to ipathmeter-l and corresponding s. Program at source host masks the kernel TCP and assumes control of data exchange with WWW server. After establishing connection with the WWW server, requests the base page with a HTTP GET. To enforce rate control the s may be sent after a chosen delay after the data packet is received. One packet marked with dashed line was lost and is thus indicated. that we also need to continuously estimate the RTT and hence the target host s RTO. Estimates of the loss distance and loss period are displayed as histograms. IV. Sample Results Fig. 8 (a),(b) shows measurements taken in forward path from measuring (source) host to target host for bottleneck and available bandwidth respectively. Similarly, Fig. 8 (c),(d) shows the measurement for the reverse path. It is observed that forward measurement results are more prone to errors than reverse measurement results. This may be because of returning s from target host got queued. Fig. 9 shows loss measurement in which vertical bar indicate loss of a particular packet.

5 5 4 No. of Iterations Packet Sequence Fig. 9. Loss pattern for four iterations with as target, observed 50 packets of size 400 bytes. Each box indicates the loss pattern observed for single iteration. Fig. 8. Sample results with as target host, 50 iterations of 16-packet-trains, packet size of 500 bytes. (a) Bottleneck bandwidth in forward path, (b) Available bandwidth in forward path, (c) Bottleneck bandwidth in reverse path and (d) Available bandwidth in reverse path. V. Discussion and Future Work We have introduced the concepts of bandwidth and loss measurements of Internet paths in a noncooperative setting and described algorithms to perform these measurements. ipathmeter-b and ipathmeter-l that can perform such measurements is also described. The ipathmeter has been tested over a number of experiments carried out with different WWW servers and the results thus obtained were consistent. This tool can be downloaded from balaji/ipathmeter/. In the current implementation of ipathmeter-b redirected WWW servers, web pages having frames and servers for which cookies need to set return an error condition. We are addressing this at this time. We have also observed that for forward measurements, some of the servers do not respond to TCP SYN for random ports. This may be because servers use a specially compiled kernel that does not respond to requests other than that to port 80. We are also working towards making ipathmeter-l characterise paths with traffic shapers. Various models of traffic shaping may be employed which generally involve allowing a burst of the users traffic every few seconds (or milliseconds). This requires buffering the users traffic until his time slot and thereafter transmit the buffered data. The measures of interest will be the size of the buffer and the policy for handling users data when the buffer size is exceeded. If these packets are dropped, the loss pattern observed would be definitely different from what would have been otherwise. The ipathmeter-l in its present form would handle the study of traffic shapers for outgoing traffic from the user and not the other way around. References [1] G. Almes, S. Kalidindi, and M. Zekauskas, A One-Way Packet Loss Metric for IPPM, IETF RFC 2680, Sept. 1999, [2] R. Carter and M. Crovella, Measuring Bottleneck Link Speed in Packet-Switched Networks, Tech. Report , Computer Sc Dept, Boston University, [3] C. Dovrolis, P. Ramanathan, and D. Moore, What do Packet Dispersion Techniques Measure? in Proc of IEEE INFOCOM, pages , [4] S. Keshav, Packet-pair flow control, Technical report, AT&T Bell Labs, Murray Hill, New Jersey, [5] S. Koodli. and R. Ravikanth, One Way Loss Pattern Sample Metrics, IETF RFC 3357, August 2002, [6] K. Lai and M. Baker, Nettimer: A Tool for Measuring Bottleneck Link Bandwidth, in Proc. of USENIX Symposium on Internet Technologies and Systems, March [7] S. McCanne, V. Jacobson, The BSD Packet Filter: A New Architecture for User-level Packet Capture, in Proc. of Winter USENIX, pp , [8] J. Padhye and S. Floyd, On Inferring TCP Behavior, in Proc. of ACM SIGCOMM 01, pp 27 31, San Diego, Cal. USA, August [9] V. Paxson, G. Almes, J. Mahdavi, M. Mathis, Framework for IP Performance Metrics, IETF RFC 2330, May 1998,

CS 349/449 Internet Protocols Final Exam Winter /15/2003. Name: Course:

CS 349/449 Internet Protocols Final Exam Winter /15/2003. Name: Course: CS 349/449 Internet Protocols Final Exam Winter 2003 12/15/2003 Name: Course: Instructions: 1. You have 2 hours to finish 2. Question 9 is only for 449 students 3. Closed books, closed notes. Write all

More information

QUIZ: Longest Matching Prefix

QUIZ: Longest Matching Prefix QUIZ: Longest Matching Prefix A router has the following routing table: 10.50.42.0 /24 Send out on interface Z 10.50.20.0 /24 Send out on interface A 10.50.24.0 /22 Send out on interface B 10.50.20.0 /22

More information

TBIT: TCP Behavior Inference Tool

TBIT: TCP Behavior Inference Tool TBIT: TCP Behavior Inference Tool Jitendra Padhye Sally Floyd AT&T Center for Internet Research at ICSI (ACIRI) http://www.aciri.org/tbit/ 1 of 24 Outline of talk Motivation Description of the tool Results

More information

Programming Assignment 3: Transmission Control Protocol

Programming Assignment 3: Transmission Control Protocol CS 640 Introduction to Computer Networks Spring 2005 http://www.cs.wisc.edu/ suman/courses/640/s05 Programming Assignment 3: Transmission Control Protocol Assigned: March 28,2005 Due: April 15, 2005, 11:59pm

More information

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 25, 2018

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 25, 2018 CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet IP

More information

CS 716: Introduction to communication networks th class; 7 th Oct Instructor: Sridhar Iyer IIT Bombay

CS 716: Introduction to communication networks th class; 7 th Oct Instructor: Sridhar Iyer IIT Bombay CS 716: Introduction to communication networks - 18 th class; 7 th Oct 2011 Instructor: Sridhar Iyer IIT Bombay Reliable Transport We have already designed a reliable communication protocol for an analogy

More information

CS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control

CS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control : Computer Networks Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control TCP performance We ve seen how TCP the protocol works Sequencing, receive window, connection setup and teardown And

More information

CS457 Transport Protocols. CS 457 Fall 2014

CS457 Transport Protocols. CS 457 Fall 2014 CS457 Transport Protocols CS 457 Fall 2014 Topics Principles underlying transport-layer services Demultiplexing Detecting corruption Reliable delivery Flow control Transport-layer protocols User Datagram

More information

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

Transmission Control Protocol. ITS 413 Internet Technologies and Applications Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion

More information

Chapter 3 outline. 3.5 Connection-oriented transport: TCP. 3.6 Principles of congestion control 3.7 TCP congestion control

Chapter 3 outline. 3.5 Connection-oriented transport: TCP. 3.6 Principles of congestion control 3.7 TCP congestion control Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer 3.5 Connection-oriented transport: TCP segment

More information

CS 640 Introduction to Computer Networks Spring 2009

CS 640 Introduction to Computer Networks Spring 2009 CS 640 Introduction to Computer Networks Spring 2009 http://pages.cs.wisc.edu/~suman/courses/wiki/doku.php?id=640-spring2009 Programming Assignment 3: Transmission Control Protocol Assigned: March 26,

More information

Performance of an Adaptive Routing Overlay under Dynamic Link Impairments

Performance of an Adaptive Routing Overlay under Dynamic Link Impairments Submitted to IEEE Milcom 27 Performance of an Adaptive Routing Overlay under Dynamic Link Impairments Brian L. Mark, Shidong Zhang, George Mason University Rick McGeer, Jack Brassil Puneet Sharma, Praveen

More information

SSFNET TCP Simulation Analysis by tcpanaly

SSFNET TCP Simulation Analysis by tcpanaly SSFNET TCP Simulation Analysis by tcpanaly Hongbo Liu hongbol@winlabrutgersedu Apr 16, 2000 Abstract SSFNET is a collection of SSF-based models for simulating Internet protocols and networks It is designed

More information

CSCD 330 Network Programming

CSCD 330 Network Programming CSCD 330 Network Programming Lecture 10 Transport Layer Continued Spring 2018 Reading: Chapter 3 Some Material in these slides from J.F Kurose and K.W. Ross All material copyright 1996-2007 1 Last Time.

More information

Analysis of Captured Data on a Typical Tcp Connection

Analysis of Captured Data on a Typical Tcp Connection IOSR Journal Of Environmental Science, Toxicology And Food Technology (IOSR-JESTFT) e-issn: 2319-2402,p- ISSN: 2319-2399. Volume 4, Issue 4 (May. - Jun. 2013), PP 75-80 www.iosrjournals.org Analysis of

More information

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014 1 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2014 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion

More information

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014 1 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2014 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion

More information

Network Independent Available Bandwidth Sampling and Measurement

Network Independent Available Bandwidth Sampling and Measurement Network Independent Available Bandwidth Sampling and Measurement Manthos Kazantzidis, Dario Maggiorini, and Mario Gerla Computer Science Department, University of California, Los Angeles, CA 99 {kazantz,dario,gerla}@cs.ucla.edu

More information

On the Transition to a Low Latency TCP/IP Internet

On the Transition to a Low Latency TCP/IP Internet On the Transition to a Low Latency TCP/IP Internet Bartek Wydrowski and Moshe Zukerman ARC Special Research Centre for Ultra-Broadband Information Networks, EEE Department, The University of Melbourne,

More information

CSE/EE 461 Lecture 12 TCP. A brief Internet history...

CSE/EE 461 Lecture 12 TCP. A brief Internet history... CSE/EE 461 Lecture 12 TCP Tom Anderson tom@cs.washington.edu Peterson, Chapter 5.2, 6 A brief Internet history... 1991 WWW/HTTP 1969 ARPANET created 1972 TELNET RFC 318 1973 FTP RFC 454 1977 MAIL RFC 733

More information

TCP : Fundamentals of Computer Networks Bill Nace

TCP : Fundamentals of Computer Networks Bill Nace TCP 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia Lab #1 due now! Reminder: Paper Review

More information

TCP Basics : Computer Networking. Overview. What s Different From Link Layers? Introduction to TCP. TCP reliability Assigned reading

TCP Basics : Computer Networking. Overview. What s Different From Link Layers? Introduction to TCP. TCP reliability Assigned reading TCP Basics 15-744: Computer Networking TCP reliability Assigned reading [FF96] Simulation-based Comparisons of Tahoe, Reno, and SACK TCP L-9 TCP Basics 2 Key Things You Should Know Already Port numbers

More information

Lecture 11. Transport Layer (cont d) Transport Layer 1

Lecture 11. Transport Layer (cont d) Transport Layer 1 Lecture 11 Transport Layer (cont d) Transport Layer 1 Agenda The Transport Layer (continue) Connection-oriented Transport (TCP) Flow Control Connection Management Congestion Control Introduction to the

More information

On the use of TCP's Initial Congestion Window in IPv4 and by Content Delivery Networks

On the use of TCP's Initial Congestion Window in IPv4 and by Content Delivery Networks On the use of TCP's Initial Congestion Window in IPv4 and by Content Delivery Networks Jan Rüth, Christian Bormann, Oliver Hohlfeld http://comsys.rwth-aachen.de/ London / IETF-11, March 218 Why look at

More information

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015 1 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2015 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion

More information

Fast Retransmit. Problem: coarsegrain. timeouts lead to idle periods Fast retransmit: use duplicate ACKs to trigger retransmission

Fast Retransmit. Problem: coarsegrain. timeouts lead to idle periods Fast retransmit: use duplicate ACKs to trigger retransmission Fast Retransmit Problem: coarsegrain TCP timeouts lead to idle periods Fast retransmit: use duplicate ACKs to trigger retransmission Packet 1 Packet 2 Packet 3 Packet 4 Packet 5 Packet 6 Sender Receiver

More information

Performance Evaluation of Controlling High Bandwidth Flows by RED-PD

Performance Evaluation of Controlling High Bandwidth Flows by RED-PD Performance Evaluation of Controlling High Bandwidth Flows by RED-PD Osama Ahmed Bashir Md Asri Ngadi Universiti Teknology Malaysia (UTM) Yahia Abdalla Mohamed Mohamed Awad ABSTRACT This paper proposed

More information

Transport: How Applications Communicate

Transport: How Applications Communicate Transport: How Applications Communicate Week 2 Philip Levis 1 7 Layers (or 4) 7. 6. 5. 4. 3. 2. 1. Application Presentation Session Transport Network Link Physical segments packets frames bits/bytes Application

More information

To see the details of TCP (Transmission Control Protocol). TCP is the main transport layer protocol used in the Internet.

To see the details of TCP (Transmission Control Protocol). TCP is the main transport layer protocol used in the Internet. Lab Exercise TCP Objective To see the details of TCP (Transmission Control Protocol). TCP is the main transport layer protocol used in the Internet. The trace file is here: https://kevincurran.org/com320/labs/wireshark/trace-tcp.pcap

More information

Overview. TCP & router queuing Computer Networking. TCP details. Workloads. TCP Performance. TCP Performance. Lecture 10 TCP & Routers

Overview. TCP & router queuing Computer Networking. TCP details. Workloads. TCP Performance. TCP Performance. Lecture 10 TCP & Routers Overview 15-441 Computer Networking TCP & router queuing Lecture 10 TCP & Routers TCP details Workloads Lecture 10: 09-30-2002 2 TCP Performance TCP Performance Can TCP saturate a link? Congestion control

More information

Announcements Computer Networking. Outline. Transport Protocols. Transport introduction. Error recovery & flow control. Mid-semester grades

Announcements Computer Networking. Outline. Transport Protocols. Transport introduction. Error recovery & flow control. Mid-semester grades Announcements 15-441 Computer Networking Lecture 16 Transport Protocols Mid-semester grades Based on project1 + midterm + HW1 + HW2 42.5% of class If you got a D+,D, D- or F! must meet with Dave or me

More information

RED behavior with different packet sizes

RED behavior with different packet sizes RED behavior with different packet sizes Stefaan De Cnodder, Omar Elloumi *, Kenny Pauwels Traffic and Routing Technologies project Alcatel Corporate Research Center, Francis Wellesplein, 1-18 Antwerp,

More information

Lecture 10: TCP Friendliness, DCCP, NATs, and STUN

Lecture 10: TCP Friendliness, DCCP, NATs, and STUN Lecture 10: TCP Friendliness, DCCP, NATs, and STUN TCP Friendliness Congestion Control TCP dynamically adapts its rate in response to congestion AIMD causes flows to converge to fair goodput But how do

More information

Lecture 12: TCP Friendliness, DCCP, NATs, and STUN

Lecture 12: TCP Friendliness, DCCP, NATs, and STUN Lecture 12: TCP Friendliness, DCCP, NATs, and STUN Congestion Control TCP dynamically adapts its rate in response to congestion AIMD causes flows to converge to fair goodput But how do losses (e.g., bit

More information

Computer Communication Networks Midterm Review

Computer Communication Networks Midterm Review Computer Communication Networks Midterm Review ICEN/ICSI 416 Fall 2018 Prof. Aveek Dutta 1 Instructions The exam is closed book, notes, computers, phones. You can use calculator, but not one from your

More information

Fall 2012: FCM 708 Bridge Foundation I

Fall 2012: FCM 708 Bridge Foundation I Fall 2012: FCM 708 Bridge Foundation I Prof. Shamik Sengupta Instructor s Website: http://jjcweb.jjay.cuny.edu/ssengupta/ Blackboard Website: https://bbhosted.cuny.edu/ Intro to Computer Networking Transport

More information

Report on Transport Protocols over Mismatched-rate Layer-1 Circuits with 802.3x Flow Control

Report on Transport Protocols over Mismatched-rate Layer-1 Circuits with 802.3x Flow Control Report on Transport Protocols over Mismatched-rate Layer-1 Circuits with 82.3x Flow Control Helali Bhuiyan, Mark McGinley, Tao Li, Malathi Veeraraghavan University of Virginia Email: {helali, mem5qf, taoli,

More information

How to measure available bandwidth on the Internet Manthos Kazantzidis

How to measure available bandwidth on the Internet Manthos Kazantzidis 1 How to measure available bandwidth on the Internet Manthos Kazantzidis Technical Report #132 Advisor: Dr. Mario Gerla UCLA CS WAM Lab Abstract-: Available bandwidth is the most useful measurement to

More information

Reliable Transport I: Concepts and TCP Protocol

Reliable Transport I: Concepts and TCP Protocol Reliable Transport I: Concepts and TCP Protocol Stefano Vissicchio UCL Computer Science COMP0023 Today Transport Concepts Layering context Transport goals Transport mechanisms and design choices TCP Protocol

More information

Intro to LAN/WAN. Transport Layer

Intro to LAN/WAN. Transport Layer Intro to LAN/WAN Transport Layer Transport Layer Topics Introduction (6.1) Elements of Transport Protocols (6.2) Internet Transport Protocols: TDP (6.5) Internet Transport Protocols: UDP (6.4) socket interface

More information

Accuracy of Link Capacity Estimates using Passive and Active Approaches with CapProbe

Accuracy of Link Capacity Estimates using Passive and Active Approaches with CapProbe Accuracy of Link Capacity Estimates using Passive and Active Approaches with CapProbe Rohit Kapoor, Ling-Jyh Chen, M. Y. Sanadidi, Mario Gerla UCLA Computer Science Department, Los Angeles, CA 9009, USA

More information

User Datagram Protocol

User Datagram Protocol Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram

More information

A Survey on Quality of Service and Congestion Control

A Survey on Quality of Service and Congestion Control A Survey on Quality of Service and Congestion Control Ashima Amity University Noida, U.P, India batra_ashima@yahoo.co.in Sanjeev Thakur Amity University Noida, U.P, India sthakur.ascs@amity.edu Abhishek

More information

Achieving Efficient Parallelism in Transport Layer using P-TCP

Achieving Efficient Parallelism in Transport Layer using P-TCP International Journal of Computer Applications in Engineering Sciences [VOL II, ISSUE I, MARCH 2012] [ISSN: 2231-4946] Achieving Efficient Parallelism in Transport Layer using P-TCP Kamalakshi N 1, H Naganna

More information

Performance Enhancement Of TCP For Wireless Network

Performance Enhancement Of TCP For Wireless Network P a g e 32 Vol. 10 Issue 12 (Ver. 1.0) October 2010 Global Journal of Computer Science and Technology Performance Enhancement Of TCP For Wireless Network 1 Pranab Kumar Dhar, 2 Mohammad Ibrahim Khan, 3

More information

Congestion Avoidance and Control. Rohan Tabish and Zane Ma

Congestion Avoidance and Control. Rohan Tabish and Zane Ma Congestion Avoidance and Control Rohan Tabish and Zane Ma TCP is self-clocking Self-clocking systems should be robust Congestion collapse Internet had first of what became a series of congestion collapses

More information

Modeling the Goodput of TCP NewReno in Cellular Environments

Modeling the Goodput of TCP NewReno in Cellular Environments Modeling the Goodput of TCP NewReno in Cellular Environments Sushant Sharma, Donald. Gillies, u-chun Feng Corporate R&D, Qualcomm San Diego, CA Synergy Lab, Virginia Tech Blacksburg, VA Abstract In this

More information

TCP/IP Performance ITL

TCP/IP Performance ITL TCP/IP Performance ITL Protocol Overview E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP IP ICMP ARP RARP (Auxiliary Services) Ethernet, X.25, HDLC etc. ATM 4/30/2002 Hans Kruse & Shawn Ostermann,

More information

Correcting mistakes. TCP: Overview RFCs: 793, 1122, 1323, 2018, TCP seq. # s and ACKs. GBN in action. TCP segment structure

Correcting mistakes. TCP: Overview RFCs: 793, 1122, 1323, 2018, TCP seq. # s and ACKs. GBN in action. TCP segment structure Correcting mistakes Go-back-N: big picture: sender can have up to N unacked packets in pipeline rcvr only sends cumulative acks doesn t ack packet if there s a gap sender has r for oldest unacked packet

More information

Video Streaming in Wireless Environments

Video Streaming in Wireless Environments Video Streaming in Wireless Environments Manoj Kumar C Advisor Prof. Sridhar Iyer Kanwal Rekhi School of Information Technology Indian Institute of Technology, Bombay Mumbai 1 Motivation Refers to real-time

More information

ADVANCED COMPUTER NETWORKS

ADVANCED COMPUTER NETWORKS ADVANCED COMPUTER NETWORKS Congestion Control and Avoidance 1 Lecture-6 Instructor : Mazhar Hussain CONGESTION CONTROL When one part of the subnet (e.g. one or more routers in an area) becomes overloaded,

More information

Reliable Transport I: Concepts and TCP Protocol

Reliable Transport I: Concepts and TCP Protocol Reliable Transport I: Concepts and TCP Protocol Brad Karp UCL Computer Science CS 3035/GZ01 29 th October 2013 Part I: Transport Concepts Layering context Transport goals Transport mechanisms 2 Context:

More information

Just enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL

Just enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL Just enough TCP/IP Borrowed from my ITS475/575 class the ITL 1 Protocol Overview E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP RTP RTCP SCTP IP ICMP ARP RARP (Auxiliary Services) Ethernet, X.25,

More information

EECS 122, Lecture 19. Reliable Delivery. An Example. Improving over Stop & Wait. Picture of Go-back-n/Sliding Window. Send Window Maintenance

EECS 122, Lecture 19. Reliable Delivery. An Example. Improving over Stop & Wait. Picture of Go-back-n/Sliding Window. Send Window Maintenance EECS 122, Lecture 19 Today s Topics: More on Reliable Delivery Round-Trip Timing Flow Control Intro to Congestion Control Kevin Fall, kfall@cs cs.berkeley.eduedu Reliable Delivery Stop and Wait simple

More information

Buffer Requirements for Zero Loss Flow Control with Explicit Congestion Notification. Chunlei Liu Raj Jain

Buffer Requirements for Zero Loss Flow Control with Explicit Congestion Notification. Chunlei Liu Raj Jain Buffer Requirements for Zero Loss Flow Control with Explicit Congestion Notification Chunlei Liu Raj Jain Department of Computer and Information Science The Ohio State University, Columbus, OH 432-277

More information

TCP-Peach and FACK/SACK Options: Putting The Pieces Together

TCP-Peach and FACK/SACK Options: Putting The Pieces Together TCP-Peach and FACK/SACK Options: Putting The Pieces Together Giacomo Morabito, Renato Narcisi, Sergio Palazzo, Antonio Pantò Dipartimento di Ingegneria Informatica e delle Telecomunicazioni University

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 12, NO. 6, DECEMBER

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 12, NO. 6, DECEMBER IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 12, NO. 6, DECEMBER 2004 963 Packet-Dispersion Techniques and a Capacity-Estimation Methodology Constantinos Dovrolis, Member, IEEE, Parameswaran Ramanathan, and

More information

Acknowledgment packets. Send with a specific rate TCP. Size of the required packet. XMgraph. Delay. TCP_Dump. SlidingWin. TCPSender_old.

Acknowledgment packets. Send with a specific rate TCP. Size of the required packet. XMgraph. Delay. TCP_Dump. SlidingWin. TCPSender_old. A TCP Simulator with PTOLEMY Dorgham Sisalem GMD-Fokus Berlin (dor@fokus.gmd.de) June 9, 1995 1 Introduction Even though lots of TCP simulators and TCP trac sources are already implemented in dierent programming

More information

The Present and Future of Congestion Control. Mark Handley

The Present and Future of Congestion Control. Mark Handley The Present and Future of Congestion Control Mark Handley Outline Purpose of congestion control The Present: TCP s congestion control algorithm (AIMD) TCP-friendly congestion control for multimedia Datagram

More information

Congestion Control. Lecture 12: TCP Friendliness, DCCP, NATs, and STUN. Chiu Jain Phase Plots. Fair A=B. Responding to Loss. Flow B rate (bps) t 1 t 3

Congestion Control. Lecture 12: TCP Friendliness, DCCP, NATs, and STUN. Chiu Jain Phase Plots. Fair A=B. Responding to Loss. Flow B rate (bps) t 1 t 3 Congestion Control Lecture 12: TCP Friendliness, DCCP, s, and STUN TCP dynamically adapts its rate in response to congestion AIMD causes flows to converge to fair goodput But how do losses (e.g., bit errors)

More information

CC451 Computer Networks

CC451 Computer Networks CC451 Computer Networks Lecture 6 Transport Layer (cont d) Transport Layer 3-1 Chapter 3 Transport Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty,

More information

UCLA Computer Science Department Technical Report CSD-TR No

UCLA Computer Science Department Technical Report CSD-TR No UCLA Computer Science Department Technical Report CSD-TR No. 4 CapProbe: A Simple and Accurate Technique to Measure Path Capacity Rohit Kapoor, Ling-Jyh Chen, M. Y. Sanadidi, Mario Gerla University of

More information

TCP Review. Carey Williamson Department of Computer Science University of Calgary Winter 2018

TCP Review. Carey Williamson Department of Computer Science University of Calgary Winter 2018 TCP Review Carey Williamson Department of Computer Science University of Calgary Winter 2018 Credit: Much of this content came courtesy of Erich Nahum (IBM Research) The TCP Protocol Connection-oriented,

More information

TCP Service Model. Today s Lecture. TCP Support for Reliable Delivery. EE 122:TCP, Connection Setup, Reliability

TCP Service Model. Today s Lecture. TCP Support for Reliable Delivery. EE 122:TCP, Connection Setup, Reliability Today s Lecture How does TCP achieve correct operation? EE 122:TCP, Connection Setup, Reliability Ion Stoica TAs: Junda Liu, DK Moon, David Zats Reliability in the face of IP s best effort service 3-way

More information

Impact of transmission errors on TCP performance. Outline. Random Errors

Impact of transmission errors on TCP performance. Outline. Random Errors Impact of transmission errors on TCP performance 1 Outline Impact of transmission errors on TCP performance Approaches to improve TCP performance Classification Discussion of selected approaches 2 Random

More information

TCP based Receiver Assistant Congestion Control

TCP based Receiver Assistant Congestion Control International Conference on Multidisciplinary Research & Practice P a g e 219 TCP based Receiver Assistant Congestion Control Hardik K. Molia Master of Computer Engineering, Department of Computer Engineering

More information

Internet Engineering Task Force (IETF) Request for Comments: 6673 Category: Standards Track August 2012 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 6673 Category: Standards Track August 2012 ISSN: Internet Engineering Task Force (IETF) A. Morton Request for Comments: 6673 AT&T Labs Category: Standards Track August 2012 ISSN: 2070-1721 Abstract Round-Trip Packet Loss Metrics Many user applications

More information

Impact of Bottleneck Queue Size on TCP Protocols and Its Measurement

Impact of Bottleneck Queue Size on TCP Protocols and Its Measurement 1 PAPER Special Section/Issue on New Technologies and their Applications of the Internet III Impact of Bottleneck Queue Size on TCP Protocols and Its Measurement Masaki Hirabaru, non-member Summary The

More information

Research Article A Novel Solution based on NAT Traversal for High-speed Accessing the Campus Network from the Public Network

Research Article A Novel Solution based on NAT Traversal for High-speed Accessing the Campus Network from the Public Network Research Journal of Applied Sciences, Engineering and Technology 7(2): 221-226, 2014 DOI:10.19026/rjaset.7.244 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted: March

More information

Outline Computer Networking. Functionality Split. Transport Protocols

Outline Computer Networking. Functionality Split. Transport Protocols Outline 15-441 15 441 Computer Networking 15-641 Lecture 10: Transport Protocols Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15 441 F17 Transport introduction TCP connection establishment

More information

UDP and TCP. Introduction. So far we have studied some data link layer protocols such as PPP which are responsible for getting data

UDP and TCP. Introduction. So far we have studied some data link layer protocols such as PPP which are responsible for getting data ELEX 4550 : Wide Area Networks 2015 Winter Session UDP and TCP is lecture describes the two most common transport-layer protocols used by IP networks: the User Datagram Protocol (UDP) and the Transmission

More information

Lecture 14: Congestion Control"

Lecture 14: Congestion Control Lecture 14: Congestion Control" CSE 222A: Computer Communication Networks George Porter Thanks: Amin Vahdat, Dina Katabi and Alex C. Snoeren Lecture 14 Overview" TCP congestion control review Dukkipati

More information

CS4700/CS5700 Fundamentals of Computer Networks

CS4700/CS5700 Fundamentals of Computer Networks CS4700/CS5700 Fundamentals of Computer Networks Lecture 14: TCP Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu Northeastern

More information

Transport layer. UDP: User Datagram Protocol [RFC 768] Review principles: Instantiation in the Internet UDP TCP

Transport layer. UDP: User Datagram Protocol [RFC 768] Review principles: Instantiation in the Internet UDP TCP Transport layer Review principles: Reliable data transfer Flow control Congestion control Instantiation in the Internet UDP TCP 1 UDP: User Datagram Protocol [RFC 768] No frills, bare bones Internet transport

More information

Transport layer. Review principles: Instantiation in the Internet UDP TCP. Reliable data transfer Flow control Congestion control

Transport layer. Review principles: Instantiation in the Internet UDP TCP. Reliable data transfer Flow control Congestion control Transport layer Review principles: Reliable data transfer Flow control Congestion control Instantiation in the Internet UDP TCP 1 UDP: User Datagram Protocol [RFC 768] No frills, bare bones Internet transport

More information

COMP/ELEC 429/556 Introduction to Computer Networks

COMP/ELEC 429/556 Introduction to Computer Networks COMP/ELEC 429/556 Introduction to Computer Networks The TCP Protocol Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng at cs.rice.edu

More information

Tuning RED for Web Traffic

Tuning RED for Web Traffic Tuning RED for Web Traffic Mikkel Christiansen, Kevin Jeffay, David Ott, Donelson Smith UNC, Chapel Hill SIGCOMM 2000, Stockholm subsequently IEEE/ACM Transactions on Networking Vol. 9, No. 3 (June 2001)

More information

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2015 1 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion

More information

TCP Performance. EE 122: Intro to Communication Networks. Fall 2006 (MW 4-5:30 in Donner 155) Vern Paxson TAs: Dilip Antony Joseph and Sukun Kim

TCP Performance. EE 122: Intro to Communication Networks. Fall 2006 (MW 4-5:30 in Donner 155) Vern Paxson TAs: Dilip Antony Joseph and Sukun Kim TCP Performance EE 122: Intro to Communication Networks Fall 2006 (MW 4-5:30 in Donner 155) Vern Paxson TAs: Dilip Antony Joseph and Sukun Kim http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks

More information

CSCD 330 Network Programming Winter 2015

CSCD 330 Network Programming Winter 2015 CSCD 330 Network Programming Winter 2015 Lecture 11a Transport Layer Reading: Chapter 3 Some Material in these slides from J.F Kurose and K.W. Ross All material copyright 1996-2007 1 Chapter 3 Sections

More information

8. TCP Congestion Control

8. TCP Congestion Control 8. TCP Congestion Control 1 TCP Congestion Control Slow-start increase Multiplicative decrease Congestion avoidance Measurement of variation Exponential timer backoff 2002 Yanghee Choi 2 Congestion Control

More information

TCP Flavors Simulation Evaluations over Noisy Environment

TCP Flavors Simulation Evaluations over Noisy Environment International Journal of Information Engineering and Applications 2018; 1(1): 11-17 http://www.aascit.org/journal/information TCP Flavors Simulation Evaluations over Noisy Environment Elsadig Gamaleldeen

More information

Information Network 1 TCP 1/2. Youki Kadobayashi NAIST

Information Network 1 TCP 1/2. Youki Kadobayashi NAIST Information Network 1 TCP 1/2 Youki Kadobayashi NAIST 1 Transport layer: a birds-eye view Hosts maintain state for each transport-layer endpoint Routers don t maintain per-host state H R R R R H Transport

More information

Transport Over IP. CSCI 690 Michael Hutt New York Institute of Technology

Transport Over IP. CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP What is a transport protocol? Choosing to use a transport protocol Ports and Addresses Datagrams UDP What is a

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START MIDTERM EXAMINATION #2 NETWORKING CONCEPTS 03-60-367-01 U N I V E R S I T Y O F W I N D S O R - S c h o o l o f C o m p u t e r S c i e n c e Fall 2011 Question Paper NOTE: Students may take this question

More information

Congestion / Flow Control in TCP

Congestion / Flow Control in TCP Congestion and Flow Control in 1 Flow Control and Congestion Control Flow control Sender avoids overflow of receiver buffer Congestion control All senders avoid overflow of intermediate network buffers

More information

CSE 123A Computer Networks

CSE 123A Computer Networks CSE 123A Computer Networks Winter 2005 Lecture 14 Congestion Control Some images courtesy David Wetherall Animations by Nick McKeown and Guido Appenzeller The bad news and the good news The bad news: new

More information

A Framework For Managing Emergent Transmissions In IP Networks

A Framework For Managing Emergent Transmissions In IP Networks A Framework For Managing Emergent Transmissions In IP Networks Yen-Hung Hu Department of Computer Science Hampton University Hampton, Virginia 23668 Email: yenhung.hu@hamptonu.edu Robert Willis Department

More information

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2. Goals for Todayʼs Lecture. Role of Transport Layer

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2. Goals for Todayʼs Lecture. Role of Transport Layer Transport Protocols Reading: Sections 2.5, 5.1, and 5.2 CS 375: Computer Networks Thomas C. Bressoud 1 Goals for Todayʼs Lecture Principles underlying transport-layer services (De)multiplexing Detecting

More information

PRACTICE QUESTIONS ON RESOURCE ALLOCATION

PRACTICE QUESTIONS ON RESOURCE ALLOCATION PRACTICE QUESTIONS ON RESOURCE ALLOCATION QUESTION : Internet Versus Station Wagon A famous maxim, sometimes attributed to Dennis Ritchie, says Never underestimate the bandwidth of a station wagon full

More information

Topics. TCP sliding window protocol TCP PUSH flag TCP slow start Bulk data throughput

Topics. TCP sliding window protocol TCP PUSH flag TCP slow start Bulk data throughput Topics TCP sliding window protocol TCP PUSH flag TCP slow start Bulk data throughput 2 Introduction In this chapter we will discuss TCP s form of flow control called a sliding window protocol It allows

More information

A Report on Some Recent Developments in TCP Congestion Control

A Report on Some Recent Developments in TCP Congestion Control A Report on Some Recent Developments in TCP Congestion Control Sally Floyd June 5, 2000 Abstract This paper discusses several changes either proposed or in progress for TCP congestion control. The changes

More information

Performance Consequences of Partial RED Deployment

Performance Consequences of Partial RED Deployment Performance Consequences of Partial RED Deployment Brian Bowers and Nathan C. Burnett CS740 - Advanced Networks University of Wisconsin - Madison ABSTRACT The Internet is slowly adopting routers utilizing

More information

Lecture 21: Congestion Control" CSE 123: Computer Networks Alex C. Snoeren

Lecture 21: Congestion Control CSE 123: Computer Networks Alex C. Snoeren Lecture 21: Congestion Control" CSE 123: Computer Networks Alex C. Snoeren Lecture 21 Overview" How fast should a sending host transmit data? Not to fast, not to slow, just right Should not be faster than

More information

image 3.8 KB Figure 1.6: Example Web Page

image 3.8 KB Figure 1.6: Example Web Page image. KB image 1 KB Figure 1.: Example Web Page and is buffered at a router, it must wait for all previously queued packets to be transmitted first. The longer the queue (i.e., the more packets in the

More information

The effect of layer-2 store-and-forward devices. per-hop capacity estimation. Ravi S. Prasad, Constantinos Dovrolis

The effect of layer-2 store-and-forward devices. per-hop capacity estimation. Ravi S. Prasad, Constantinos Dovrolis The effect of layer-2 store-and-forward devices on per-hop capacity estimation Ravi S. Prasad, Constantinos Dovrolis and Bruce A. Mah University of Delaware Packet Design Ravi S. Prasad - rsp@udel.edu,

More information

Cross-layer TCP Performance Analysis in IEEE Vehicular Environments

Cross-layer TCP Performance Analysis in IEEE Vehicular Environments 24 Telfor Journal, Vol. 6, No. 1, 214. Cross-layer TCP Performance Analysis in IEEE 82.11 Vehicular Environments Toni Janevski, Senior Member, IEEE, and Ivan Petrov 1 Abstract In this paper we provide

More information

TCP Westwood: Efficient Transport for High-speed wired/wireless Networks

TCP Westwood: Efficient Transport for High-speed wired/wireless Networks TCP Westwood: Efficient Transport for High-speed wired/wireless Networks Mario Gerla, Medy Sanadidi, Ren Wang and Massimo Valla UCLA Computer Science 1 Outline 1. TCP Overview 2. Bandwidth Estimation and

More information

Configuring IP Services

Configuring IP Services CHAPTER 8 Configuring IP Services This chapter describes how to configure optional IP services supported by the Cisco Optical Networking System (ONS) 15304. For a complete description of the commands in

More information

CSCE 463/612 Networks and Distributed Processing Spring 2017

CSCE 463/612 Networks and Distributed Processing Spring 2017 CSCE 463/612 Networks and Distributed Processing Spring 2017 Transport Layer IV Dmitri Loguinov Texas A&M University March 9, 2017 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter

More information