Network Measurement. Xu Zhang Vision & CITE Lab, Nanjing University 2018/10/17 1

Size: px
Start display at page:

Download "Network Measurement. Xu Zhang Vision & CITE Lab, Nanjing University 2018/10/17 1"

Transcription

1 Network Measurement Xu Zhang Vision & CITE Lab, Nanjing University 2018/10/17 1

2 Last Time Basics for Network Transmission Network overview What is a network Circuit Switching Packet Switching Network protocol What is a protocol Protocol stacks Protocol for media transport 2018/10/17 2

3 This Time Last time: network overview Today: Network measurement Today s specifics: Delay measurements Bandwidth measurements 2018/10/17 3

4 Why do we measure the Internet? We cannot improve the Internet if we don t understand it We cannot understand it if we don t measure We cannot build effective models or simulators if we don t measure

5 Long term objectives Monitor the Internet at real time Manage the Internet Monitor and react before things go bad

6 What can we measure in the Internet? Structure Topology (router/network) connectivity, link capacities, link loss, available bandwidth, routing Traffic End-to-end performance, packet arrival process (congestion built-up) Users and applications WWW, peer-to-peer, streaming Malicious behavior Attack patterns, port scans

7 Internet Measurement Challenges (1) Network size: 100,000,000s hosts, 1,000,000s routers, ~30,000 ASes Network Complexity Interaction between components, protocols, applications, users All change over time New applications are added New protocol versions (TCP) New router design (AQM)

8 Internet Measurement Challenges (2) Not engineered for measurement: Initial design had no measurement thinking Distributed management Tendency not to share data Blocking measurement attempts ( don t ping my network ) NATs, Firewalls,

9 End-to-end Delay

10 End-to-end Delay The time required to transmit a packet along its entire path Created by an application, handed over to the OS, passed to a network card (NIC), encoded, transmitted over a physical medium (copper, fibre, air), received by an intermediate device (switch, router), analyzed, retransmitted over another medium, etc. The most common measurement uses ping for total roundtriptime (RTT).

11 Types of Delay Causes of end-to-end delay: Processing delay Buffer delays Transmission delays Propagation delays

12 Processing Delay Required time to analyze a packet header and decide where to send the packet (e.g. a routing decision) Inside a router this depends on the number of entries in the routing table, the implementation of data structures, hardware in use, etc. This can include error verification, such as IPv4, IPv6 header checksum calculations.

13 Queuing Delay The time a packet is enqueued until it is transmitted The number of packets waiting in the queue will depend on traffic intensity and of the type of traffic (bursty or sustained) Router queue algorithms try to adapt delays to specific preferences, or impose equal delay on all traffic.

14 Transmission Delay The time required to push all the bits in a packet on the transmission medium in use For N=Number of sent bits per second, S=Size of packet, d=delay d = S/N For example, to transmit 1024 bits using Fast Ethernet (100Mbps): d = 1024/1x10e8 = micro seconds

15 Propagation Delay Once a bit is 'pushed' on to the transmission medium, the time required for the bit to propagate to the end of its physical trajectory In the majority of cases the propagation velocity is close to the speed of light. The delay of propagation in the circuit depends mainly on the actual distance of the physical circuit For d = distance, s = propagation velocity PD = d/s

16 Sending a 100B packet from A to B? A 1Mbps, 1ms B time=0 Time to transmit one bit = 1/10 6 s Time to transmit 800 bits=800x1/10 6 s 100Byte packet Time when that bit reaches B = 1/ /10 3 s The last bit reaches B at Delay Time = (800x1/10 6 )+1/10 3 s Delay = Transmission Delay + Propagation Delay (Packet Size Link Bandwidth) + Link Latency = 1.8ms

17 Sending a 100B packet from A to B? A 1Gbps, 1Mbps, 1ms? B 1GB file in 100B packets 100Byte packet 10 7 x 100B packets The last bit in the file reaches B at (10 7 x800x1/10 9 )+1/10 3 s = 8001ms The last bit Timereaches B at (800x1/10 9 )+1/10 3 s = ms The last bit reaches B at (800x1/10 6 )+1/10 3 s = 1.8ms

18 Active measurement

19 Simple delay/loss probing with ping 2018/10/17 19

20 Traceroute Regular UDP packets successive TTLs time A B C D E ICMP TTL expired message ICMP port unreachable message

21 C:\>tracert Tracing route to [ ] over a maximum of 30 hops: 1 <1 ms <1 ms <1 ms ms 20 ms 19 ms vxr.tau.ac.il [ ] 3 17 ms 22 ms 20 ms c6509.tau.ac.il [ ] 4 21 ms 19 ms 19 ms tel-aviv.tau.ac.il [ ] 5 19 ms 23 ms 18 ms gp1-tau-fe.ilan.net.il [ ] 6 20 ms 20 ms 20 ms iucc.il1.il.geant.net [ ] 7 69 ms 69 ms 69 ms il.it1.it.geant.net [ ] 8 82 ms 82 ms 82 ms it.ch1.ch.geant.net [ ] ms 98 ms 98 ms ch.at1.at.geant.net [ ] ms 105 ms 105 ms at.hu1.hu.geant.net [ ] ms 112 ms 113 ms hu.hr1.hr.geant.net [ ] ms 115 ms 115 ms carnet-gw.hr1.hr.geant.net [ ] ms 122 ms 123 ms ms 112 ms 119 ms ms 119 ms 119 ms ms 114 ms 113 ms duality.cc.fer.hr [ ] Trace complete.

22 C:\Users\xzhang17>tracert 通过最多 30 个跃点跟踪到 google-public-dns-a.google.com [ ] 的路由 : 1 <1 毫秒 <1 毫秒 <1 毫秒 RT-AC68U-E740 [ ] 2 1 ms <1 毫秒 <1 毫秒 ms 4 ms 3 ms ms * 4 ms ms 2 ms 3 ms ms 29 ms 29 ms ms 36 ms 38 ms ms 41 ms 35 ms ms 46 ms 38 ms ms 33 ms * ms 40 ms 37 ms * * 51 ms ms * 156 ms * 150 ms 151 ms * * * 请求超时 16 * * * 请求超时 17 * * * 请求超时 18 * * * 请求超时 19 * * * 请求超时 20 * * * 请求超时 21 * * * 请求超时 22 * * * 请求超时 23 * * * 请求超时 24 * * * 请求超时 25 * 45 ms * google-public-dns-a.google.com [ ] 26 * * 46 ms google-public-dns-a.google.com [ ] 跟踪完成

23 Active measurement Infrastructure-based Path-fitting-based Coordinate-based

24 Infrastructure-based

25 Triangulation AP1 a b Tracer1 c AP2 a-c < b < a+c? Feasible to estimate distance? -- APs -- Tracers

26 King King estimates RTT between any two hosts in the Internet by estimating the RTT between their domain name servers.

27 King King try to trick name server A into directly querying name server B.

28 Path-fitting-based

29 IDMaps Servers maintain simplified topological map

30 iplane The path from S to D is obtained by composing a path from S with a path going into D from a vantage point close to S (V1). BGP1 and BGP2 are destinations in two random prefixes to which S performs traceroutes.

31 Coordinate-based

32 Global Network Positioning (GNP) Model the Internet as a geometric space (e.g. 3-D Euclidean) Characterize the position of any end host with coordinates Use computed distances to predict actual distances (x 1,y 1,z 1 ) y (x 2,y 2,z 2 ) x z (x 3,y 3,z 3 ) (x 4,y 4,z 4 ) 32

33 Landmark Coordinate y (x 2,y 2 ) L 1 (x 1,y 1 ) L 2 L 3 L 2 Internet L 1 x (x 3,y 3 ) Small number of distributed hosts called Landmarks measure inter-landmark distances L 3 Min. where 33

34 Ordinary Host Coordinate Each ordinary host measures its distances to the Landmarks, Landmarks just reflect pings (x 1,y 1 ) y L 2 (x 2,y 2 ) L 1 L 1 L 3 L 2 Internet x L 3 (x 3,y 3 ) (x 4,y 4 ) Min. 34

35 IDES An N N matrix whose rows are not linearly independent has rank strictly less than and can be expressed as the product of two smaller matrices. we can estimate the network distance from H i to H j by where is X i the i th row vector of the matrix X and Y j is the j th row vector of the matrix Y.

36 2018/10/17 36

37 Bandwidth Metrics NMWG divide bandwidth into four sub-metrics: Bandwidth Capacity Achievable Bandwidth Available Bandwidth Bandwidth Utilization

38 Other Metric Terms Throughput Throughput is the same as achievable bandwidth. Bulk Transfer Capacity (BTC) Defined by RFC 3148 BTC = data_sent / elapsed_time The throughput of a persistent TCP transfer. Each of these metrics can be used to describe the entire path (end-to-end) as well as path s link (hop-by-hop)characteristics.

39 Bandwidth Capacity vs. Achievable Bandwidth Capacity is the maximum amount of data per time unit that the link or path has available, when there is no competing traffic. Achievable bandwidth is the maximum amount of data per time unit that a link or path can provide to an application, given the current utilization, the protocol and operating system used, and the end-host performance capability and load. (Throughput)

40 Bandwidth Capacity vs. Achievable Bandwidth Cont. If a path consists of several links, the link with the minimum transmission rate determines the capacity of the path. While the link with the minimum unused capacity limits the achievable bandwidth. i.e. at high-speed networks, hardware configuration or software load on the end hosts actually limit the bandwidth delivered to the application.

41 Available Bandwidth vs. Bandwidth Utilization Available bandwidth is the maximum amount of data per time unit that a link or path can provide, given the current utilization. Utilization is the aggregate capacity currently being consumed on a link or path. Available Bandwidth = Bandwidth Capacity Bandwidth Utilization

42 BTC vs. Available Bandwidth Available Bandwidth is the amount of usable bandwidth without affecting cross-traffic, whereas, the BTC is measured by sending as much packets as possible, limiting other traffic. BTC is simulating steady state persistent flow, taking considerable time and overhead.

43 BTC vs. Available Bandwidth Cont. The BTC definition assumes an ideal TCP implementation, actually, this doesn t exist, and what BTC measured is the variant of achievable bandwidth.

44 Passive vs. Active measurement Active measurement means that the tool actively sends probing packets into the network. Passive measurement tools monitors the passing traffic without interfering. Passive measurement is appreciated, however, less reliable than active, as it can t extract any data pass through it.

45 Receiver-based vs. Sender-based techniques Receiver-based (end-to-end) techniques usually use the one-direction TCP stream to probe the path bandwidth. Sender-based (echo-based) techniques force the receiver to reply the ICMP query, UDP echo or TCP-FIN.

46 Sender-based technique Advantage: Flexible deployment. Clock needn t synchronized at two ends. Disadvantage: ICMP and UDP echo packets usually be rate-limited or filtered out by some routers. Round-trip is much more possibility influenced by cross-traffic than that of one-way delay Response packets may come back through a different path

47 Receiver-based technique Advantage: More accurate than sender-based technique. Disadvantage: Difficult to deployment. The clock have to be synchronized at two ends.

48 Bandwidth Measurement Technology Packet Dispersion technology packet pair and packet train Self-Loading Periodic streams (SLOPS) Variable Packet Size (VPS) technology VPS even/odd Tailgating technique

49 Packet Dispersion Technique Sender sends two same-size packets back-to-back from source to sink. The packets will reach the sink dispersed by the transmission delay of the bottleneck links if there is no cross traffic. Measuring the dispersion can infer the bottleneck link bandwidth capacity. Note: Bottleneck link can refer to the link with smallest transmission rate, it s also can refer to the link with minimum available bandwidth. We refer the bottleneck link to the first case.

50 Packet Dispersion Technique Cont. Bottleneck bandwidth = packet size/ t

51 Packet Dispersion Technique Cont. If sender sends the packets as one observation sample more than two, called packet train. Tools usually apply robust statistical filtering techniques to find valid samples.

52 Packet pair vs. packet train Packet train is more likely to be interfered by cross traffic than packet pair. Packet train can be used to measure the bottleneck link that is multichannel while packet pair can t deal with. Packet train can reduce the limitation of clock resolution. Sophisticated tools apply both methods in their implementation. i.e. Pathrate

53 Packet Dispersion Technique Cont. Tool Name Active/ Passive bprobe Active Packet pair cprobe Active Packet pair Netest Active Packet pair Protocol Metrics ICMP ICMP UDP Bandwidth Capacity Bandwidth utilization Bandwidth capacity Methodology Path/Perlink Path Path Path FOR MORE INFO... Bprobe and cprobe Nettest

54 Packet Dispersion Technique Cont. Pathrate Active Packet pair, packet train UDP Bandwidth capacity Path Pipechar Active Packet train UDP Available bandwidth Per-link Sprobe Active Packet pair TCP Bandwidth capacity Path FOR MORE INFO... Pathrate Pipechar SProbe

55 Self-Loading Periodic Streams(SLOPS) Sender sends series of packets to the sink at the rate of larger than the bottleneck link available bandwidth. Every packets get a timestamp at sender side. Compare the difference of successive packets timestamp and their arrival times to infer the available bandwidth. Rate-adjustment adaptive algorithm to converge to the available bandwidth.

56 Self-Loading Periodic Streams Cont. Tool Name Active/ Passive Methodology Protocol Metrics pathload Active SLOPS UDP Available bandwidth Path/Per -link Path FOR MORE INFO... Pathload

57 VPS technique cont. Assumption: At least one packet, together with the ICMP reply it generates, will not encounter any queuing delays.

58 Variable Packet Size (VPS) Technique Step1. Sender set TTL=1, send out the packet, and wait for the ICMP TTL-exceeded packet back. Step2. Upon receiving ICMP, estimate the RTT. Estimate the RTT multiple times for various size packets. The minimum RTT of various packets are believed to be the valid sample. Step3. The first link capacity is C=1/b, b is slope of RTT graph. Set the TTL=2,3 n, repeat the process of step1 to 3, to Calculate the C=1/ bi bi-1

59 VPS technique cont.

60 Even-odd VPS The VPS probing technique is not altered, Mathematical trick to improve reliability. For each of the probing sizes, divide the set of samples into even and odd numbers. Calculation is based on even-odd samples. i.e. the even sample of link i, the odd sample of link i+1.

61 Tailgating Technique Tailgating technique divides into two phrase: Phase one: (Sigma phase) Like VPS probing, but for entire path instead of per link. Phase two: (tailgating phase) The largest possible nonfragmented packet (the tailgated) followed by the smallest possible packet (i.e 40 bytes). This causes the smaller packet (the tailgater) always queue behind the larger packet. Reference: Kevin Lai, Mary Baker Measuring Link Bandwidths Using a Deterministic Model of Packet Delay ACM SIGCOMM 2000

62 Tailgating Technique cont. The following condition should met: The large packet should not be queued due to cross traffic. The large packet should have a TTL field set to L (1 n). The tailgater packet should be queued directly after the large packet on link L. The tailgater packet should not queued after having passing link L.

63 VPS Technology Tool Name Active/ Passive Methodology Protocol Metrics bing Active VPS ICMP Bandwidth capacity, loss, delay clink Active VPS/ even-odd UDP Pchar Active VPS UDP, ICMP Bandwidth capacity, Loss Bandwidth capacity, Loss, delay Path/Per -link Path Path Per-link Bing Clink Pchar

64 VPS Technology Cont. Tool Name Nettimer Active/ Passive Active, Passive Methodology VPS/tail gating pathchar Active VPS/eve n-odd Protocol Metrics TCP UDP, ICMP Bandwidth capacity Bandwidth capacity, Loss, delay Path/Per -link Per-link Per-link FOR MORE INFO... Nettimer Pathchar ftp://ftp.ee.lbl.gov/pathchar/

65 Thank you! Q & A! 2018/10/17 65

Network Management & Monitoring Network Delay

Network Management & Monitoring Network Delay Network Management & Monitoring Network Delay These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) End-to-end

More information

The effect of layer-2 store-and-forward devices. per-hop capacity estimation. Ravi S. Prasad, Constantinos Dovrolis

The effect of layer-2 store-and-forward devices. per-hop capacity estimation. Ravi S. Prasad, Constantinos Dovrolis The effect of layer-2 store-and-forward devices on per-hop capacity estimation Ravi S. Prasad, Constantinos Dovrolis and Bruce A. Mah University of Delaware Packet Design Ravi S. Prasad - rsp@udel.edu,

More information

Network Management & Monitoring

Network Management & Monitoring Network Management & Monitoring Network Delay These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) End-to-end

More information

Per-hop and end-to-end capacity estimation

Per-hop and end-to-end capacity estimation Per-hop and end-to-end capacity estimation Fall 2003 CS 8803: Network Measurement Seminar Ravi S. Prasad Outline! Introduction! Definitions! Capacity estimation methodologies " Hop capacity! Variable packet

More information

ECE 697J Advanced Topics in Computer Networks

ECE 697J Advanced Topics in Computer Networks ECE 697J Advanced Topics in Computer Networks Network Measurement 12/02/03 Tilman Wolf 1 Overview Lab 3 requires performance measurement Throughput Collecting of packet headers Network Measurement Active

More information

Investigating the Use of Synchronized Clocks in TCP Congestion Control

Investigating the Use of Synchronized Clocks in TCP Congestion Control Investigating the Use of Synchronized Clocks in TCP Congestion Control Michele Weigle (UNC-CH) November 16-17, 2001 Univ. of Maryland Symposium The Problem TCP Reno congestion control reacts only to packet

More information

Lecture 21: Congestion Control" CSE 123: Computer Networks Alex C. Snoeren

Lecture 21: Congestion Control CSE 123: Computer Networks Alex C. Snoeren Lecture 21: Congestion Control" CSE 123: Computer Networks Alex C. Snoeren Lecture 21 Overview" How fast should a sending host transmit data? Not to fast, not to slow, just right Should not be faster than

More information

Problems of IP. Unreliable connectionless service. Cannot acquire status information from routers and other hosts

Problems of IP. Unreliable connectionless service. Cannot acquire status information from routers and other hosts Chapter 09 ICMP Problems of IP Unreliable connectionless service Best effort service IP datagrams are discarded If destination is not found If TTL becomes 0 If reassembly timer expires Cannot acquire status

More information

Internet Control Message Protocol (ICMP)

Internet Control Message Protocol (ICMP) Internet Control Message Protocol (ICMP) 1 Overview The IP (Internet Protocol) relies on several other protocols to perform necessary control and routing functions: Control functions (ICMP) Multicast signaling

More information

Available Bandwidth Estimation. Probing Packet Train in Pathneck. Transmission of RPT. Choke Point Detection. Packet train probing

Available Bandwidth Estimation. Probing Packet Train in Pathneck. Transmission of RPT. Choke Point Detection. Packet train probing Measuring the Path Network Measurement: Measuring the Path Available Bandwidth/Bottleneck BFind,Pathchar,Cartouche Pathneck Link Capacity: Pathchar CapProbe Loss/Delay/Re-ording Tulip Joy Zhang Pathneck

More information

End-to-end available bandwidth estimation

End-to-end available bandwidth estimation End-to-end available bandwidth estimation Constantinos Dovrolis Computer and Information Sciences University of Delaware Constantinos Dovrolis - dovrolis@cis.udel.edu, IPAM workshop, March 2002 1 of 28%

More information

The Measurement Manager Modular End-to-End Measurement Services

The Measurement Manager Modular End-to-End Measurement Services The Measurement Manager Modular End-to-End Measurement Services Ph.D. Research Proposal Department of Electrical and Computer Engineering University of Maryland, College Park, MD Pavlos Papageorgiou pavlos@eng.umd.edu

More information

Computer Communication Networks Midterm Review

Computer Communication Networks Midterm Review Computer Communication Networks Midterm Review ICEN/ICSI 416 Fall 2018 Prof. Aveek Dutta 1 Instructions The exam is closed book, notes, computers, phones. You can use calculator, but not one from your

More information

ICMP (Internet Control Message Protocol)

ICMP (Internet Control Message Protocol) Today s Lecture ICMP (Internet Control Message Protocol) Internet Protocols CSC / C 573 I. ICMP Overview II. ICMP rror Reporting III. ICMP Query / Response Messages IV. ICMP Message Processing Fall, 2005

More information

Network Layer (4): ICMP

Network Layer (4): ICMP 1 Network Layer (4): ICMP Required reading: Kurose 4.4.3, 4.4.4 CSE 4213, Fall 2006 Instructor: N. Vlajic 2 1. Introduction 2. Network Service Models 3. Architecture 4. Network Layer Protocols in the Internet

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

User Datagram Protocol

User Datagram Protocol Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram

More information

CS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control

CS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control : Computer Networks Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control TCP performance We ve seen how TCP the protocol works Sequencing, receive window, connection setup and teardown And

More information

Lecture 14: Congestion Control"

Lecture 14: Congestion Control Lecture 14: Congestion Control" CSE 222A: Computer Communication Networks George Porter Thanks: Amin Vahdat, Dina Katabi and Alex C. Snoeren Lecture 14 Overview" TCP congestion control review Dukkipati

More information

On Network Dimensioning Approach for the Internet

On Network Dimensioning Approach for the Internet On Dimensioning Approach for the Internet Masayuki Murata ed Environment Division Cybermedia Center, (also, Graduate School of Engineering Science, ) e-mail: murata@ics.es.osaka-u.ac.jp http://www-ana.ics.es.osaka-u.ac.jp/

More information

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols Integrated services Reading: S. Keshav, An Engineering Approach to Computer Networking, chapters 6, 9 and 4 Module objectives Learn and understand about: Support for real-time applications: network-layer

More information

CMSC 332 Computer Networks Network Layer

CMSC 332 Computer Networks Network Layer CMSC 332 Computer Networks Network Layer Professor Szajda CMSC 332: Computer Networks Where in the Stack... CMSC 332: Computer Network 2 Where in the Stack... Application CMSC 332: Computer Network 2 Where

More information

Generic Architecture. EECS 122: Introduction to Computer Networks Switch and Router Architectures. Shared Memory (1 st Generation) Today s Lecture

Generic Architecture. EECS 122: Introduction to Computer Networks Switch and Router Architectures. Shared Memory (1 st Generation) Today s Lecture Generic Architecture EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California,

More information

Introduction to Networking and Systems Measurements

Introduction to Networking and Systems Measurements Introduction to Networking and Systems Measurements Lecture 2: Basic Network Measurements Dr Noa Zilberman noa.zilberman@cl.cam.ac.uk Networking and Systems Measurements(L50) 1 Terminology Matters! in

More information

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Lecture 3. The Network Layer (cont d) Network Layer 1-1 Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets

More information

Transport layer. UDP: User Datagram Protocol [RFC 768] Review principles: Instantiation in the Internet UDP TCP

Transport layer. UDP: User Datagram Protocol [RFC 768] Review principles: Instantiation in the Internet UDP TCP Transport layer Review principles: Reliable data transfer Flow control Congestion control Instantiation in the Internet UDP TCP 1 UDP: User Datagram Protocol [RFC 768] No frills, bare bones Internet transport

More information

Transport layer. Review principles: Instantiation in the Internet UDP TCP. Reliable data transfer Flow control Congestion control

Transport layer. Review principles: Instantiation in the Internet UDP TCP. Reliable data transfer Flow control Congestion control Transport layer Review principles: Reliable data transfer Flow control Congestion control Instantiation in the Internet UDP TCP 1 UDP: User Datagram Protocol [RFC 768] No frills, bare bones Internet transport

More information

Expected Time: 90 min PART-A Max Marks: 42

Expected Time: 90 min PART-A Max Marks: 42 Birla Institute of Technology & Science, Pilani First Semester 2010-2011 Computer Networks (BITS C481) Comprehensive Examination Thursday, December 02, 2010 (AN) Duration: 3 Hrs Weightage: 40% [80M] Instructions-:

More information

Lecture 11: Fragmentation & Addressing. CSE 123: Computer Networks Stefan Savage

Lecture 11: Fragmentation & Addressing. CSE 123: Computer Networks Stefan Savage Lecture 11: Fragmentation & Addressing CSE 123: Computer Networks Stefan Savage So what does IP do? Addressing Fragmentation E.g. FDDI s maximum packet is 4500 bytes while Ethernet is 1500 bytes, how to

More information

Evaluation of BART: a real-time available bandwidth measurement method

Evaluation of BART: a real-time available bandwidth measurement method Master Thesis (D Level) Evaluation of BART: a real-time available bandwidth measurement method By: Daniel Rodriguez Retamosa M.Sc. Computer Science with Software Engineering Profile Department of Computer

More information

CHAPTER-2 IP CONCEPTS

CHAPTER-2 IP CONCEPTS CHAPTER-2 IP CONCEPTS Page: 1 IP Concepts IP is a very important protocol in modern internetworking; you can't really comprehend modern networking without a good understanding of IP. Unfortunately, IP

More information

Chapter 4 Network Layer: The Data Plane

Chapter 4 Network Layer: The Data Plane Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see

More information

Computer Networks CS 552

Computer Networks CS 552 Computer Networks CS 552 Badri Nath Rutgers University badri@cs.rutgers.edu Internet measurements-why? Why measure? What s the need? Do we need to measure? Can we just google it? What is the motivation?

More information

Computer Networks CS 552

Computer Networks CS 552 Computer Networks CS 552 Badri Nath Rutgers University badri@cs.rutgers.edu 1. Measurements 1 Internet measurements-why? Why measure? What s the need? Do we need to measure? Can we just google it? What

More information

Lecture 19: Network Layer Routing in the Internet

Lecture 19: Network Layer Routing in the Internet Lecture 19: Network Layer Routing in the Internet COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F

More information

EECS 122: Introduction to Computer Networks Switch and Router Architectures. Today s Lecture

EECS 122: Introduction to Computer Networks Switch and Router Architectures. Today s Lecture EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley,

More information

8. TCP Congestion Control

8. TCP Congestion Control 8. TCP Congestion Control 1 TCP Congestion Control Slow-start increase Multiplicative decrease Congestion avoidance Measurement of variation Exponential timer backoff 2002 Yanghee Choi 2 Congestion Control

More information

ICS 451: Today's plan

ICS 451: Today's plan ICS 451: Today's plan ICMP ping traceroute ARP DHCP summary of IP processing ICMP Internet Control Message Protocol, 2 functions: error reporting (never sent in response to ICMP error packets) network

More information

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015 Paper solution Subject: Computer Networks (TE Computer- 2012 pattern) Marks : 30 Date: 5/2/2015 Q1 a) What is difference between persistent and non persistent HTTP? Also Explain HTTP message format. [6]

More information

CSC 4900 Computer Networks: Network Layer

CSC 4900 Computer Networks: Network Layer CSC 4900 Computer Networks: Network Layer Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences Review What is AIMD? When do we use it? What is the steady state profile

More information

(ICMP), RFC

(ICMP), RFC Internet et Control o Message Protocol (ICMP), RFC 792 http://icourse.cuc.edu.cn/networkprogramming/ linwei@cuc.edu.cn Nov. 2009 Overview The IP (Internet Protocol) relies on several other protocols to

More information

NET ID. CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17

NET ID. CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17 CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17 Q1. 2 points Write your NET ID at the top of every page of this test. Q2. X points Name 3 advantages of a circuit network

More information

Lecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen

Lecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen Lecture 4 - Network Layer Networks and Security Jacob Aae Mikkelsen IMADA September 23, 2013 September 23, 2013 1 / 67 Transport Layer Goals understand principles behind network layer services: network

More information

Bandwidth Allocation & TCP

Bandwidth Allocation & TCP Bandwidth Allocation & TCP The Transport Layer Focus Application Presentation How do we share bandwidth? Session Topics Transport Network Congestion control & fairness Data Link TCP Additive Increase/Multiplicative

More information

ECE 428 Internet Protocols (Network Layer: Layer 3)

ECE 428 Internet Protocols (Network Layer: Layer 3) ECE 428 Internet Protocols (Network Layer: Layer 3) 1 Done so far MAC protocols (with PHYsical layer) Transport bits from one node to another. Key element: Determine WHEN to transmit DLC protocol (running

More information

CSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1. Brian Harrington. February 13, University of Toronto Scarborough

CSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1. Brian Harrington. February 13, University of Toronto Scarborough CSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1 Brian Harrington University of Toronto Scarborough February 13, 2018 ADMIN Assignments Midterm after reading week (Feb 27) In class Covering everything

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology 2017 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Network Layer The majority of slides presented in

More information

IP Packet Switching. Goals of Todayʼs Lecture. Simple Network: Nodes and a Link. Connectivity Links and nodes Circuit switching Packet switching

IP Packet Switching. Goals of Todayʼs Lecture. Simple Network: Nodes and a Link. Connectivity Links and nodes Circuit switching Packet switching IP Packet Switching CS 375: Computer Networks Dr. Thomas C. Bressoud Goals of Todayʼs Lecture Connectivity Links and nodes Circuit switching Packet switching IP service model Best-effort packet delivery

More information

Network Architecture

Network Architecture Unit 7 Network Architecture Acknowledgments: These slides were originally developed by Prof. Jean Walrand for EE122. The past and current EE122 instructors including Kevin Fall, Abhay Parekh, Shyam Parekh,

More information

CSCI-GA Operating Systems. Networking. Hubertus Franke

CSCI-GA Operating Systems. Networking. Hubertus Franke CSCI-GA.2250-001 Operating Systems Networking Hubertus Franke frankeh@cs.nyu.edu Source: Ganesh Sittampalam NYU TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute

More information

Vorlesung Kommunikationsnetze

Vorlesung Kommunikationsnetze Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

TCP Nice: A Mechanism for Background Transfers

TCP Nice: A Mechanism for Background Transfers Improving Internet Availability and Reliability TCP : A Mechanism for Background Transfers Z. Morley Mao Lecture 7 Feb 2, 2004 Arun Venkataramani, Ravi Kokku, Mike Dahlin Laboratory of Advanced Systems

More information

Lecture 16: Network Layer Overview, Internet Protocol

Lecture 16: Network Layer Overview, Internet Protocol Lecture 16: Network Layer Overview, Internet Protocol COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,

More information

ICS 351: Networking Protocols

ICS 351: Networking Protocols ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol

More information

Just enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL

Just enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL Just enough TCP/IP Borrowed from my ITS475/575 class the ITL 1 Protocol Overview E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP RTP RTCP SCTP IP ICMP ARP RARP (Auxiliary Services) Ethernet, X.25,

More information

Chapter 4 Network Layer: The Data Plane. Part A. Computer Networking: A Top Down Approach

Chapter 4 Network Layer: The Data Plane. Part A. Computer Networking: A Top Down Approach Chapter 4 Network Layer: The Data Plane Part A All material copyright 996-06 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th Edition, Global Edition Jim Kurose,

More information

Lecture 5 The Network Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 5 The Network Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 5 The Network Layer part II Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it IP datagram format IP protocol version number header length (bytes) type of data max number remaining

More information

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4 CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication

More information

CSCI Computer Networks

CSCI Computer Networks CSCI-1680 - Computer Networks Link Layer III: LAN & Switching Chen Avin Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti, Peterson & Davie, Rodrigo Fonseca Today: Link Layer (cont.)

More information

CS519: Computer Networks. Lecture 2: Feb 2, 2004 IP (Internet Protocol)

CS519: Computer Networks. Lecture 2: Feb 2, 2004 IP (Internet Protocol) : Computer Networks Lecture 2: Feb 2, 2004 IP (Internet Protocol) A hypothetical service You want a mail delivery service You have two choices: Acme Guaranteed Mail Delivery Service We never fail Rocko

More information

Internet Control Message Protocol (ICMP), RFC 792. Prof. Lin Weiguo Copyleft 2009~2017, School of Computing, CUC

Internet Control Message Protocol (ICMP), RFC 792. Prof. Lin Weiguo Copyleft 2009~2017, School of Computing, CUC Internet Control Message Protocol (ICMP), RFC 79 Prof Lin Weiguo Copyleft 009~07, School of Computing, CUC Oct 07 Overview } The IP (Internet Protocol) relies on several other protocols to perform necessary

More information

Homework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca

Homework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca CSCI 1680 Computer Networks Fonseca Homework 1 Due: 27 September 2012, 4pm Question 1 - Layering a. Why are networked systems layered? What are the advantages of layering? Are there any disadvantages?

More information

CSE 123A Computer Networks

CSE 123A Computer Networks CSE 123A Computer Networks Winter 2005 Lecture 14 Congestion Control Some images courtesy David Wetherall Animations by Nick McKeown and Guido Appenzeller The bad news and the good news The bad news: new

More information

EECS 3214: Computer Network Protocols and Applications. Final Examination. Department of Computer Science and Engineering

EECS 3214: Computer Network Protocols and Applications. Final Examination. Department of Computer Science and Engineering Department of Computer Science and Engineering EECS 3214: Computer Network Protocols and Applications Final Examination Instructor: N. Vlajic Date: April 9, 2016 Instructions: Examination time: 180 min.

More information

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross

More information

Non-Cooperative End-to-End Path Characterisation

Non-Cooperative End-to-End Path Characterisation Non-Cooperative End-to-End Path Characterisation Kapil Bajaj, Balaji Kasal, Harshal Ninawe, Sriharsha and D. Manjunath Indian Institute of Technology, Bombay Powai Mumbai 400 076 INDIA Email: {kapil@cse,balaji@ee,hani@cse,harsha@ee,dmanju@ee}.iitb.ac.in

More information

Computer Networking

Computer Networking 15-441 Computer Networking Lecture 17 TCP Performance & Future Eric Anderson Fall 2013 www.cs.cmu.edu/~prs/15-441-f13 Outline TCP modeling TCP details 2 TCP Performance Can TCP saturate a link? Congestion

More information

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

Transmission Control Protocol. ITS 413 Internet Technologies and Applications Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion

More information

MESSAGES error-reporting messages and query messages. problems processes IP packet specific information

MESSAGES error-reporting messages and query messages. problems processes IP packet specific information ICMP ICMP ICMP is mainly used by operating systems of networked computers to send error messages indicating that a requested service is not available or that host/ router could not be reached. ICMP MESSAGES

More information

Topics for This Week

Topics for This Week Topics for This Week Routing Protocols in the Internet OSPF, BGP More on IP Fragmentation and Reassembly ICMP Readings Sections 5.6.4-5.6.5 1 Hierarchical Routing aggregate routers into regions, autonomous

More information

CSCD 330 Network Programming Winter 2015

CSCD 330 Network Programming Winter 2015 CSCD 330 Network Programming Winter 2015 Lecture 11a Transport Layer Reading: Chapter 3 Some Material in these slides from J.F Kurose and K.W. Ross All material copyright 1996-2007 1 Chapter 3 Sections

More information

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang CS 356: Computer Network Architectures Lecture 10: IP Fragmentation, ARP, and ICMP Xiaowei Yang xwy@cs.duke.edu Overview Homework 2-dimension parity IP fragmentation ARP ICMP Fragmentation and Reassembly

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

Real-Time Protocol (RTP)

Real-Time Protocol (RTP) Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of

More information

The Network Layer and Routers

The Network Layer and Routers The Network Layer and Routers Daniel Zappala CS 460 Computer Networking Brigham Young University 2/18 Network Layer deliver packets from sending host to receiving host must be on every host, router in

More information

Performance Modeling

Performance Modeling Performance Modeling EECS 489 Computer Networks http://www.eecs.umich.edu/~zmao/eecs489 Z. Morley Mao Tuesday Sept 14, 2004 Acknowledgement: Some slides taken from Kurose&Ross and Katz&Stoica 1 Administrivia

More information

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

Transport Over IP. CSCI 690 Michael Hutt New York Institute of Technology

Transport Over IP. CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP What is a transport protocol? Choosing to use a transport protocol Ports and Addresses Datagrams UDP What is a

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking

More information

Information Network Systems The network layer. Stephan Sigg

Information Network Systems The network layer. Stephan Sigg Information Network Systems The network layer Stephan Sigg Tokyo, November 1, 2012 Error-detection and correction Decoding of Reed-Muller codes Assume a second order (16, 11) code for m = 4. The r-th order

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 20 MIDTERM EXAMINATION #1 - B COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 20 MIDTERM EXAMINATION #1 - A COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document

More information

Operational Security Capabilities for IP Network Infrastructure

Operational Security Capabilities for IP Network Infrastructure Operational Security Capabilities F. Gont for IP Network Infrastructure G. Gont (opsec) UTN/FRH Internet-Draft September 1, 2008 Intended status: Informational Expires: March 5, 2009 Status of this Memo

More information

Network layer: Overview. Network Layer Functions

Network layer: Overview. Network Layer Functions Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START MIDTERM EXAMINATION #2 NETWORKING CONCEPTS 03-60-367-01 U N I V E R S I T Y O F W I N D S O R - S c h o o l o f C o m p u t e r S c i e n c e Fall 2011 Question Paper NOTE: Students may take this question

More information

UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING

UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING ECE361 Computer Networks Midterm March 09, 2016, 6:15PM DURATION: 75 minutes Calculator Type: 2 (non-programmable calculators) Examiner:

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for

More information

Review problems (for no credit): Transport and Network Layer

Review problems (for no credit): Transport and Network Layer Review problems (for no credit): Transport and Network Layer V. Arun CS 653, Fall 2018 09/06/18 Transport layer 1. Protocol multiplexing: (a) If a web server has 100 open connections, how many sockets

More information

Lecture 2 Communication services The Trasport Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 2 Communication services The Trasport Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 2 Communication services The Trasport Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it The structure edge: applications and hosts core: routers of s access s, media:

More information

Investigating the Use of Synchronized Clocks in TCP Congestion Control

Investigating the Use of Synchronized Clocks in TCP Congestion Control Investigating the Use of Synchronized Clocks in TCP Congestion Control Michele Weigle Dissertation Defense May 14, 2003 Advisor: Kevin Jeffay Research Question Can the use of exact timing information improve

More information

ICMP (Internet Control Message Protocol)

ICMP (Internet Control Message Protocol) ABSTRACT : ICMP stands for internet control message protocol it is a vital protocol of network layer among the seven layers of OSI(open system interconnection). Here we deal with the several situations

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 16, 2013 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2013-75 minutes This examination

More information

UCLA Computer Science Department Technical Report CSD-TR No

UCLA Computer Science Department Technical Report CSD-TR No UCLA Computer Science Department Technical Report CSD-TR No. 4 CapProbe: A Simple and Accurate Technique to Measure Path Capacity Rohit Kapoor, Ling-Jyh Chen, M. Y. Sanadidi, Mario Gerla University of

More information

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS 1. General (5p) a) The so-called hourglass model (sometimes referred to as a wine-glass ) has been used

More information

Part 1: Introduction. Goal: Review of how the Internet works Overview

Part 1: Introduction. Goal: Review of how the Internet works Overview Part 1: Introduction Goal: Review of how the Internet works Overview Get context Get overview, feel of the Internet Application layer protocols and addressing Network layer / Routing Link layer / Example

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Chapter 7 - Network Measurements Introduction Architecture & Mechanisms

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Dr. Nils

More information

Network Performance: Queuing

Network Performance: Queuing Network Performance: Queuing EE 122: Intro to Communication Networks Fall 2007 (WF 4-5:30 in Cory 277) Vern Paxson TAs: Lisa Fowler, Daniel Killebrew & Jorge Ortiz http://inst.eecs.berkeley.edu/~ee122/

More information

TCP/IP Performance ITL

TCP/IP Performance ITL TCP/IP Performance ITL Protocol Overview E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP IP ICMP ARP RARP (Auxiliary Services) Ethernet, X.25, HDLC etc. ATM 4/30/2002 Hans Kruse & Shawn Ostermann,

More information