Network Measurement. Xu Zhang Vision & CITE Lab, Nanjing University 2018/10/17 1
|
|
- Justina McKenzie
- 5 years ago
- Views:
Transcription
1 Network Measurement Xu Zhang Vision & CITE Lab, Nanjing University 2018/10/17 1
2 Last Time Basics for Network Transmission Network overview What is a network Circuit Switching Packet Switching Network protocol What is a protocol Protocol stacks Protocol for media transport 2018/10/17 2
3 This Time Last time: network overview Today: Network measurement Today s specifics: Delay measurements Bandwidth measurements 2018/10/17 3
4 Why do we measure the Internet? We cannot improve the Internet if we don t understand it We cannot understand it if we don t measure We cannot build effective models or simulators if we don t measure
5 Long term objectives Monitor the Internet at real time Manage the Internet Monitor and react before things go bad
6 What can we measure in the Internet? Structure Topology (router/network) connectivity, link capacities, link loss, available bandwidth, routing Traffic End-to-end performance, packet arrival process (congestion built-up) Users and applications WWW, peer-to-peer, streaming Malicious behavior Attack patterns, port scans
7 Internet Measurement Challenges (1) Network size: 100,000,000s hosts, 1,000,000s routers, ~30,000 ASes Network Complexity Interaction between components, protocols, applications, users All change over time New applications are added New protocol versions (TCP) New router design (AQM)
8 Internet Measurement Challenges (2) Not engineered for measurement: Initial design had no measurement thinking Distributed management Tendency not to share data Blocking measurement attempts ( don t ping my network ) NATs, Firewalls,
9 End-to-end Delay
10 End-to-end Delay The time required to transmit a packet along its entire path Created by an application, handed over to the OS, passed to a network card (NIC), encoded, transmitted over a physical medium (copper, fibre, air), received by an intermediate device (switch, router), analyzed, retransmitted over another medium, etc. The most common measurement uses ping for total roundtriptime (RTT).
11 Types of Delay Causes of end-to-end delay: Processing delay Buffer delays Transmission delays Propagation delays
12 Processing Delay Required time to analyze a packet header and decide where to send the packet (e.g. a routing decision) Inside a router this depends on the number of entries in the routing table, the implementation of data structures, hardware in use, etc. This can include error verification, such as IPv4, IPv6 header checksum calculations.
13 Queuing Delay The time a packet is enqueued until it is transmitted The number of packets waiting in the queue will depend on traffic intensity and of the type of traffic (bursty or sustained) Router queue algorithms try to adapt delays to specific preferences, or impose equal delay on all traffic.
14 Transmission Delay The time required to push all the bits in a packet on the transmission medium in use For N=Number of sent bits per second, S=Size of packet, d=delay d = S/N For example, to transmit 1024 bits using Fast Ethernet (100Mbps): d = 1024/1x10e8 = micro seconds
15 Propagation Delay Once a bit is 'pushed' on to the transmission medium, the time required for the bit to propagate to the end of its physical trajectory In the majority of cases the propagation velocity is close to the speed of light. The delay of propagation in the circuit depends mainly on the actual distance of the physical circuit For d = distance, s = propagation velocity PD = d/s
16 Sending a 100B packet from A to B? A 1Mbps, 1ms B time=0 Time to transmit one bit = 1/10 6 s Time to transmit 800 bits=800x1/10 6 s 100Byte packet Time when that bit reaches B = 1/ /10 3 s The last bit reaches B at Delay Time = (800x1/10 6 )+1/10 3 s Delay = Transmission Delay + Propagation Delay (Packet Size Link Bandwidth) + Link Latency = 1.8ms
17 Sending a 100B packet from A to B? A 1Gbps, 1Mbps, 1ms? B 1GB file in 100B packets 100Byte packet 10 7 x 100B packets The last bit in the file reaches B at (10 7 x800x1/10 9 )+1/10 3 s = 8001ms The last bit Timereaches B at (800x1/10 9 )+1/10 3 s = ms The last bit reaches B at (800x1/10 6 )+1/10 3 s = 1.8ms
18 Active measurement
19 Simple delay/loss probing with ping 2018/10/17 19
20 Traceroute Regular UDP packets successive TTLs time A B C D E ICMP TTL expired message ICMP port unreachable message
21 C:\>tracert Tracing route to [ ] over a maximum of 30 hops: 1 <1 ms <1 ms <1 ms ms 20 ms 19 ms vxr.tau.ac.il [ ] 3 17 ms 22 ms 20 ms c6509.tau.ac.il [ ] 4 21 ms 19 ms 19 ms tel-aviv.tau.ac.il [ ] 5 19 ms 23 ms 18 ms gp1-tau-fe.ilan.net.il [ ] 6 20 ms 20 ms 20 ms iucc.il1.il.geant.net [ ] 7 69 ms 69 ms 69 ms il.it1.it.geant.net [ ] 8 82 ms 82 ms 82 ms it.ch1.ch.geant.net [ ] ms 98 ms 98 ms ch.at1.at.geant.net [ ] ms 105 ms 105 ms at.hu1.hu.geant.net [ ] ms 112 ms 113 ms hu.hr1.hr.geant.net [ ] ms 115 ms 115 ms carnet-gw.hr1.hr.geant.net [ ] ms 122 ms 123 ms ms 112 ms 119 ms ms 119 ms 119 ms ms 114 ms 113 ms duality.cc.fer.hr [ ] Trace complete.
22 C:\Users\xzhang17>tracert 通过最多 30 个跃点跟踪到 google-public-dns-a.google.com [ ] 的路由 : 1 <1 毫秒 <1 毫秒 <1 毫秒 RT-AC68U-E740 [ ] 2 1 ms <1 毫秒 <1 毫秒 ms 4 ms 3 ms ms * 4 ms ms 2 ms 3 ms ms 29 ms 29 ms ms 36 ms 38 ms ms 41 ms 35 ms ms 46 ms 38 ms ms 33 ms * ms 40 ms 37 ms * * 51 ms ms * 156 ms * 150 ms 151 ms * * * 请求超时 16 * * * 请求超时 17 * * * 请求超时 18 * * * 请求超时 19 * * * 请求超时 20 * * * 请求超时 21 * * * 请求超时 22 * * * 请求超时 23 * * * 请求超时 24 * * * 请求超时 25 * 45 ms * google-public-dns-a.google.com [ ] 26 * * 46 ms google-public-dns-a.google.com [ ] 跟踪完成
23 Active measurement Infrastructure-based Path-fitting-based Coordinate-based
24 Infrastructure-based
25 Triangulation AP1 a b Tracer1 c AP2 a-c < b < a+c? Feasible to estimate distance? -- APs -- Tracers
26 King King estimates RTT between any two hosts in the Internet by estimating the RTT between their domain name servers.
27 King King try to trick name server A into directly querying name server B.
28 Path-fitting-based
29 IDMaps Servers maintain simplified topological map
30 iplane The path from S to D is obtained by composing a path from S with a path going into D from a vantage point close to S (V1). BGP1 and BGP2 are destinations in two random prefixes to which S performs traceroutes.
31 Coordinate-based
32 Global Network Positioning (GNP) Model the Internet as a geometric space (e.g. 3-D Euclidean) Characterize the position of any end host with coordinates Use computed distances to predict actual distances (x 1,y 1,z 1 ) y (x 2,y 2,z 2 ) x z (x 3,y 3,z 3 ) (x 4,y 4,z 4 ) 32
33 Landmark Coordinate y (x 2,y 2 ) L 1 (x 1,y 1 ) L 2 L 3 L 2 Internet L 1 x (x 3,y 3 ) Small number of distributed hosts called Landmarks measure inter-landmark distances L 3 Min. where 33
34 Ordinary Host Coordinate Each ordinary host measures its distances to the Landmarks, Landmarks just reflect pings (x 1,y 1 ) y L 2 (x 2,y 2 ) L 1 L 1 L 3 L 2 Internet x L 3 (x 3,y 3 ) (x 4,y 4 ) Min. 34
35 IDES An N N matrix whose rows are not linearly independent has rank strictly less than and can be expressed as the product of two smaller matrices. we can estimate the network distance from H i to H j by where is X i the i th row vector of the matrix X and Y j is the j th row vector of the matrix Y.
36 2018/10/17 36
37 Bandwidth Metrics NMWG divide bandwidth into four sub-metrics: Bandwidth Capacity Achievable Bandwidth Available Bandwidth Bandwidth Utilization
38 Other Metric Terms Throughput Throughput is the same as achievable bandwidth. Bulk Transfer Capacity (BTC) Defined by RFC 3148 BTC = data_sent / elapsed_time The throughput of a persistent TCP transfer. Each of these metrics can be used to describe the entire path (end-to-end) as well as path s link (hop-by-hop)characteristics.
39 Bandwidth Capacity vs. Achievable Bandwidth Capacity is the maximum amount of data per time unit that the link or path has available, when there is no competing traffic. Achievable bandwidth is the maximum amount of data per time unit that a link or path can provide to an application, given the current utilization, the protocol and operating system used, and the end-host performance capability and load. (Throughput)
40 Bandwidth Capacity vs. Achievable Bandwidth Cont. If a path consists of several links, the link with the minimum transmission rate determines the capacity of the path. While the link with the minimum unused capacity limits the achievable bandwidth. i.e. at high-speed networks, hardware configuration or software load on the end hosts actually limit the bandwidth delivered to the application.
41 Available Bandwidth vs. Bandwidth Utilization Available bandwidth is the maximum amount of data per time unit that a link or path can provide, given the current utilization. Utilization is the aggregate capacity currently being consumed on a link or path. Available Bandwidth = Bandwidth Capacity Bandwidth Utilization
42 BTC vs. Available Bandwidth Available Bandwidth is the amount of usable bandwidth without affecting cross-traffic, whereas, the BTC is measured by sending as much packets as possible, limiting other traffic. BTC is simulating steady state persistent flow, taking considerable time and overhead.
43 BTC vs. Available Bandwidth Cont. The BTC definition assumes an ideal TCP implementation, actually, this doesn t exist, and what BTC measured is the variant of achievable bandwidth.
44 Passive vs. Active measurement Active measurement means that the tool actively sends probing packets into the network. Passive measurement tools monitors the passing traffic without interfering. Passive measurement is appreciated, however, less reliable than active, as it can t extract any data pass through it.
45 Receiver-based vs. Sender-based techniques Receiver-based (end-to-end) techniques usually use the one-direction TCP stream to probe the path bandwidth. Sender-based (echo-based) techniques force the receiver to reply the ICMP query, UDP echo or TCP-FIN.
46 Sender-based technique Advantage: Flexible deployment. Clock needn t synchronized at two ends. Disadvantage: ICMP and UDP echo packets usually be rate-limited or filtered out by some routers. Round-trip is much more possibility influenced by cross-traffic than that of one-way delay Response packets may come back through a different path
47 Receiver-based technique Advantage: More accurate than sender-based technique. Disadvantage: Difficult to deployment. The clock have to be synchronized at two ends.
48 Bandwidth Measurement Technology Packet Dispersion technology packet pair and packet train Self-Loading Periodic streams (SLOPS) Variable Packet Size (VPS) technology VPS even/odd Tailgating technique
49 Packet Dispersion Technique Sender sends two same-size packets back-to-back from source to sink. The packets will reach the sink dispersed by the transmission delay of the bottleneck links if there is no cross traffic. Measuring the dispersion can infer the bottleneck link bandwidth capacity. Note: Bottleneck link can refer to the link with smallest transmission rate, it s also can refer to the link with minimum available bandwidth. We refer the bottleneck link to the first case.
50 Packet Dispersion Technique Cont. Bottleneck bandwidth = packet size/ t
51 Packet Dispersion Technique Cont. If sender sends the packets as one observation sample more than two, called packet train. Tools usually apply robust statistical filtering techniques to find valid samples.
52 Packet pair vs. packet train Packet train is more likely to be interfered by cross traffic than packet pair. Packet train can be used to measure the bottleneck link that is multichannel while packet pair can t deal with. Packet train can reduce the limitation of clock resolution. Sophisticated tools apply both methods in their implementation. i.e. Pathrate
53 Packet Dispersion Technique Cont. Tool Name Active/ Passive bprobe Active Packet pair cprobe Active Packet pair Netest Active Packet pair Protocol Metrics ICMP ICMP UDP Bandwidth Capacity Bandwidth utilization Bandwidth capacity Methodology Path/Perlink Path Path Path FOR MORE INFO... Bprobe and cprobe Nettest
54 Packet Dispersion Technique Cont. Pathrate Active Packet pair, packet train UDP Bandwidth capacity Path Pipechar Active Packet train UDP Available bandwidth Per-link Sprobe Active Packet pair TCP Bandwidth capacity Path FOR MORE INFO... Pathrate Pipechar SProbe
55 Self-Loading Periodic Streams(SLOPS) Sender sends series of packets to the sink at the rate of larger than the bottleneck link available bandwidth. Every packets get a timestamp at sender side. Compare the difference of successive packets timestamp and their arrival times to infer the available bandwidth. Rate-adjustment adaptive algorithm to converge to the available bandwidth.
56 Self-Loading Periodic Streams Cont. Tool Name Active/ Passive Methodology Protocol Metrics pathload Active SLOPS UDP Available bandwidth Path/Per -link Path FOR MORE INFO... Pathload
57 VPS technique cont. Assumption: At least one packet, together with the ICMP reply it generates, will not encounter any queuing delays.
58 Variable Packet Size (VPS) Technique Step1. Sender set TTL=1, send out the packet, and wait for the ICMP TTL-exceeded packet back. Step2. Upon receiving ICMP, estimate the RTT. Estimate the RTT multiple times for various size packets. The minimum RTT of various packets are believed to be the valid sample. Step3. The first link capacity is C=1/b, b is slope of RTT graph. Set the TTL=2,3 n, repeat the process of step1 to 3, to Calculate the C=1/ bi bi-1
59 VPS technique cont.
60 Even-odd VPS The VPS probing technique is not altered, Mathematical trick to improve reliability. For each of the probing sizes, divide the set of samples into even and odd numbers. Calculation is based on even-odd samples. i.e. the even sample of link i, the odd sample of link i+1.
61 Tailgating Technique Tailgating technique divides into two phrase: Phase one: (Sigma phase) Like VPS probing, but for entire path instead of per link. Phase two: (tailgating phase) The largest possible nonfragmented packet (the tailgated) followed by the smallest possible packet (i.e 40 bytes). This causes the smaller packet (the tailgater) always queue behind the larger packet. Reference: Kevin Lai, Mary Baker Measuring Link Bandwidths Using a Deterministic Model of Packet Delay ACM SIGCOMM 2000
62 Tailgating Technique cont. The following condition should met: The large packet should not be queued due to cross traffic. The large packet should have a TTL field set to L (1 n). The tailgater packet should be queued directly after the large packet on link L. The tailgater packet should not queued after having passing link L.
63 VPS Technology Tool Name Active/ Passive Methodology Protocol Metrics bing Active VPS ICMP Bandwidth capacity, loss, delay clink Active VPS/ even-odd UDP Pchar Active VPS UDP, ICMP Bandwidth capacity, Loss Bandwidth capacity, Loss, delay Path/Per -link Path Path Per-link Bing Clink Pchar
64 VPS Technology Cont. Tool Name Nettimer Active/ Passive Active, Passive Methodology VPS/tail gating pathchar Active VPS/eve n-odd Protocol Metrics TCP UDP, ICMP Bandwidth capacity Bandwidth capacity, Loss, delay Path/Per -link Per-link Per-link FOR MORE INFO... Nettimer Pathchar ftp://ftp.ee.lbl.gov/pathchar/
65 Thank you! Q & A! 2018/10/17 65
Network Management & Monitoring Network Delay
Network Management & Monitoring Network Delay These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) End-to-end
More informationThe effect of layer-2 store-and-forward devices. per-hop capacity estimation. Ravi S. Prasad, Constantinos Dovrolis
The effect of layer-2 store-and-forward devices on per-hop capacity estimation Ravi S. Prasad, Constantinos Dovrolis and Bruce A. Mah University of Delaware Packet Design Ravi S. Prasad - rsp@udel.edu,
More informationNetwork Management & Monitoring
Network Management & Monitoring Network Delay These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) End-to-end
More informationPer-hop and end-to-end capacity estimation
Per-hop and end-to-end capacity estimation Fall 2003 CS 8803: Network Measurement Seminar Ravi S. Prasad Outline! Introduction! Definitions! Capacity estimation methodologies " Hop capacity! Variable packet
More informationECE 697J Advanced Topics in Computer Networks
ECE 697J Advanced Topics in Computer Networks Network Measurement 12/02/03 Tilman Wolf 1 Overview Lab 3 requires performance measurement Throughput Collecting of packet headers Network Measurement Active
More informationInvestigating the Use of Synchronized Clocks in TCP Congestion Control
Investigating the Use of Synchronized Clocks in TCP Congestion Control Michele Weigle (UNC-CH) November 16-17, 2001 Univ. of Maryland Symposium The Problem TCP Reno congestion control reacts only to packet
More informationLecture 21: Congestion Control" CSE 123: Computer Networks Alex C. Snoeren
Lecture 21: Congestion Control" CSE 123: Computer Networks Alex C. Snoeren Lecture 21 Overview" How fast should a sending host transmit data? Not to fast, not to slow, just right Should not be faster than
More informationProblems of IP. Unreliable connectionless service. Cannot acquire status information from routers and other hosts
Chapter 09 ICMP Problems of IP Unreliable connectionless service Best effort service IP datagrams are discarded If destination is not found If TTL becomes 0 If reassembly timer expires Cannot acquire status
More informationInternet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP) 1 Overview The IP (Internet Protocol) relies on several other protocols to perform necessary control and routing functions: Control functions (ICMP) Multicast signaling
More informationAvailable Bandwidth Estimation. Probing Packet Train in Pathneck. Transmission of RPT. Choke Point Detection. Packet train probing
Measuring the Path Network Measurement: Measuring the Path Available Bandwidth/Bottleneck BFind,Pathchar,Cartouche Pathneck Link Capacity: Pathchar CapProbe Loss/Delay/Re-ording Tulip Joy Zhang Pathneck
More informationEnd-to-end available bandwidth estimation
End-to-end available bandwidth estimation Constantinos Dovrolis Computer and Information Sciences University of Delaware Constantinos Dovrolis - dovrolis@cis.udel.edu, IPAM workshop, March 2002 1 of 28%
More informationThe Measurement Manager Modular End-to-End Measurement Services
The Measurement Manager Modular End-to-End Measurement Services Ph.D. Research Proposal Department of Electrical and Computer Engineering University of Maryland, College Park, MD Pavlos Papageorgiou pavlos@eng.umd.edu
More informationComputer Communication Networks Midterm Review
Computer Communication Networks Midterm Review ICEN/ICSI 416 Fall 2018 Prof. Aveek Dutta 1 Instructions The exam is closed book, notes, computers, phones. You can use calculator, but not one from your
More informationICMP (Internet Control Message Protocol)
Today s Lecture ICMP (Internet Control Message Protocol) Internet Protocols CSC / C 573 I. ICMP Overview II. ICMP rror Reporting III. ICMP Query / Response Messages IV. ICMP Message Processing Fall, 2005
More informationNetwork Layer (4): ICMP
1 Network Layer (4): ICMP Required reading: Kurose 4.4.3, 4.4.4 CSE 4213, Fall 2006 Instructor: N. Vlajic 2 1. Introduction 2. Network Service Models 3. Architecture 4. Network Layer Protocols in the Internet
More informationII. Principles of Computer Communications Network and Transport Layer
II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part
More informationUser Datagram Protocol
Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram
More informationCS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control
: Computer Networks Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control TCP performance We ve seen how TCP the protocol works Sequencing, receive window, connection setup and teardown And
More informationLecture 14: Congestion Control"
Lecture 14: Congestion Control" CSE 222A: Computer Communication Networks George Porter Thanks: Amin Vahdat, Dina Katabi and Alex C. Snoeren Lecture 14 Overview" TCP congestion control review Dukkipati
More informationOn Network Dimensioning Approach for the Internet
On Dimensioning Approach for the Internet Masayuki Murata ed Environment Division Cybermedia Center, (also, Graduate School of Engineering Science, ) e-mail: murata@ics.es.osaka-u.ac.jp http://www-ana.ics.es.osaka-u.ac.jp/
More informationModule objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols
Integrated services Reading: S. Keshav, An Engineering Approach to Computer Networking, chapters 6, 9 and 4 Module objectives Learn and understand about: Support for real-time applications: network-layer
More informationCMSC 332 Computer Networks Network Layer
CMSC 332 Computer Networks Network Layer Professor Szajda CMSC 332: Computer Networks Where in the Stack... CMSC 332: Computer Network 2 Where in the Stack... Application CMSC 332: Computer Network 2 Where
More informationGeneric Architecture. EECS 122: Introduction to Computer Networks Switch and Router Architectures. Shared Memory (1 st Generation) Today s Lecture
Generic Architecture EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California,
More informationIntroduction to Networking and Systems Measurements
Introduction to Networking and Systems Measurements Lecture 2: Basic Network Measurements Dr Noa Zilberman noa.zilberman@cl.cam.ac.uk Networking and Systems Measurements(L50) 1 Terminology Matters! in
More informationLecture 3. The Network Layer (cont d) Network Layer 1-1
Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets
More informationTransport layer. UDP: User Datagram Protocol [RFC 768] Review principles: Instantiation in the Internet UDP TCP
Transport layer Review principles: Reliable data transfer Flow control Congestion control Instantiation in the Internet UDP TCP 1 UDP: User Datagram Protocol [RFC 768] No frills, bare bones Internet transport
More informationTransport layer. Review principles: Instantiation in the Internet UDP TCP. Reliable data transfer Flow control Congestion control
Transport layer Review principles: Reliable data transfer Flow control Congestion control Instantiation in the Internet UDP TCP 1 UDP: User Datagram Protocol [RFC 768] No frills, bare bones Internet transport
More informationExpected Time: 90 min PART-A Max Marks: 42
Birla Institute of Technology & Science, Pilani First Semester 2010-2011 Computer Networks (BITS C481) Comprehensive Examination Thursday, December 02, 2010 (AN) Duration: 3 Hrs Weightage: 40% [80M] Instructions-:
More informationLecture 11: Fragmentation & Addressing. CSE 123: Computer Networks Stefan Savage
Lecture 11: Fragmentation & Addressing CSE 123: Computer Networks Stefan Savage So what does IP do? Addressing Fragmentation E.g. FDDI s maximum packet is 4500 bytes while Ethernet is 1500 bytes, how to
More informationEvaluation of BART: a real-time available bandwidth measurement method
Master Thesis (D Level) Evaluation of BART: a real-time available bandwidth measurement method By: Daniel Rodriguez Retamosa M.Sc. Computer Science with Software Engineering Profile Department of Computer
More informationCHAPTER-2 IP CONCEPTS
CHAPTER-2 IP CONCEPTS Page: 1 IP Concepts IP is a very important protocol in modern internetworking; you can't really comprehend modern networking without a good understanding of IP. Unfortunately, IP
More informationChapter 4 Network Layer: The Data Plane
Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see
More informationComputer Networks CS 552
Computer Networks CS 552 Badri Nath Rutgers University badri@cs.rutgers.edu Internet measurements-why? Why measure? What s the need? Do we need to measure? Can we just google it? What is the motivation?
More informationComputer Networks CS 552
Computer Networks CS 552 Badri Nath Rutgers University badri@cs.rutgers.edu 1. Measurements 1 Internet measurements-why? Why measure? What s the need? Do we need to measure? Can we just google it? What
More informationLecture 19: Network Layer Routing in the Internet
Lecture 19: Network Layer Routing in the Internet COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F
More informationEECS 122: Introduction to Computer Networks Switch and Router Architectures. Today s Lecture
EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley,
More information8. TCP Congestion Control
8. TCP Congestion Control 1 TCP Congestion Control Slow-start increase Multiplicative decrease Congestion avoidance Measurement of variation Exponential timer backoff 2002 Yanghee Choi 2 Congestion Control
More informationICS 451: Today's plan
ICS 451: Today's plan ICMP ping traceroute ARP DHCP summary of IP processing ICMP Internet Control Message Protocol, 2 functions: error reporting (never sent in response to ICMP error packets) network
More informationPaper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015
Paper solution Subject: Computer Networks (TE Computer- 2012 pattern) Marks : 30 Date: 5/2/2015 Q1 a) What is difference between persistent and non persistent HTTP? Also Explain HTTP message format. [6]
More informationCSC 4900 Computer Networks: Network Layer
CSC 4900 Computer Networks: Network Layer Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences Review What is AIMD? When do we use it? What is the steady state profile
More information(ICMP), RFC
Internet et Control o Message Protocol (ICMP), RFC 792 http://icourse.cuc.edu.cn/networkprogramming/ linwei@cuc.edu.cn Nov. 2009 Overview The IP (Internet Protocol) relies on several other protocols to
More informationNET ID. CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17
CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17 Q1. 2 points Write your NET ID at the top of every page of this test. Q2. X points Name 3 advantages of a circuit network
More informationLecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen
Lecture 4 - Network Layer Networks and Security Jacob Aae Mikkelsen IMADA September 23, 2013 September 23, 2013 1 / 67 Transport Layer Goals understand principles behind network layer services: network
More informationBandwidth Allocation & TCP
Bandwidth Allocation & TCP The Transport Layer Focus Application Presentation How do we share bandwidth? Session Topics Transport Network Congestion control & fairness Data Link TCP Additive Increase/Multiplicative
More informationECE 428 Internet Protocols (Network Layer: Layer 3)
ECE 428 Internet Protocols (Network Layer: Layer 3) 1 Done so far MAC protocols (with PHYsical layer) Transport bits from one node to another. Key element: Determine WHEN to transmit DLC protocol (running
More informationCSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1. Brian Harrington. February 13, University of Toronto Scarborough
CSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1 Brian Harrington University of Toronto Scarborough February 13, 2018 ADMIN Assignments Midterm after reading week (Feb 27) In class Covering everything
More informationinternet technologies and standards
Institute of Telecommunications Warsaw University of Technology 2017 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Network Layer The majority of slides presented in
More informationIP Packet Switching. Goals of Todayʼs Lecture. Simple Network: Nodes and a Link. Connectivity Links and nodes Circuit switching Packet switching
IP Packet Switching CS 375: Computer Networks Dr. Thomas C. Bressoud Goals of Todayʼs Lecture Connectivity Links and nodes Circuit switching Packet switching IP service model Best-effort packet delivery
More informationNetwork Architecture
Unit 7 Network Architecture Acknowledgments: These slides were originally developed by Prof. Jean Walrand for EE122. The past and current EE122 instructors including Kevin Fall, Abhay Parekh, Shyam Parekh,
More informationCSCI-GA Operating Systems. Networking. Hubertus Franke
CSCI-GA.2250-001 Operating Systems Networking Hubertus Franke frankeh@cs.nyu.edu Source: Ganesh Sittampalam NYU TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute
More informationVorlesung Kommunikationsnetze
Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen
More informationTCP Nice: A Mechanism for Background Transfers
Improving Internet Availability and Reliability TCP : A Mechanism for Background Transfers Z. Morley Mao Lecture 7 Feb 2, 2004 Arun Venkataramani, Ravi Kokku, Mike Dahlin Laboratory of Advanced Systems
More informationLecture 16: Network Layer Overview, Internet Protocol
Lecture 16: Network Layer Overview, Internet Protocol COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,
More informationICS 351: Networking Protocols
ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol
More informationJust enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL
Just enough TCP/IP Borrowed from my ITS475/575 class the ITL 1 Protocol Overview E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP RTP RTCP SCTP IP ICMP ARP RARP (Auxiliary Services) Ethernet, X.25,
More informationChapter 4 Network Layer: The Data Plane. Part A. Computer Networking: A Top Down Approach
Chapter 4 Network Layer: The Data Plane Part A All material copyright 996-06 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th Edition, Global Edition Jim Kurose,
More informationLecture 5 The Network Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 5 The Network Layer part II Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it IP datagram format IP protocol version number header length (bytes) type of data max number remaining
More informationCCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4
CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication
More informationCSCI Computer Networks
CSCI-1680 - Computer Networks Link Layer III: LAN & Switching Chen Avin Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti, Peterson & Davie, Rodrigo Fonseca Today: Link Layer (cont.)
More informationCS519: Computer Networks. Lecture 2: Feb 2, 2004 IP (Internet Protocol)
: Computer Networks Lecture 2: Feb 2, 2004 IP (Internet Protocol) A hypothetical service You want a mail delivery service You have two choices: Acme Guaranteed Mail Delivery Service We never fail Rocko
More informationInternet Control Message Protocol (ICMP), RFC 792. Prof. Lin Weiguo Copyleft 2009~2017, School of Computing, CUC
Internet Control Message Protocol (ICMP), RFC 79 Prof Lin Weiguo Copyleft 009~07, School of Computing, CUC Oct 07 Overview } The IP (Internet Protocol) relies on several other protocols to perform necessary
More informationHomework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca
CSCI 1680 Computer Networks Fonseca Homework 1 Due: 27 September 2012, 4pm Question 1 - Layering a. Why are networked systems layered? What are the advantages of layering? Are there any disadvantages?
More informationCSE 123A Computer Networks
CSE 123A Computer Networks Winter 2005 Lecture 14 Congestion Control Some images courtesy David Wetherall Animations by Nick McKeown and Guido Appenzeller The bad news and the good news The bad news: new
More informationEECS 3214: Computer Network Protocols and Applications. Final Examination. Department of Computer Science and Engineering
Department of Computer Science and Engineering EECS 3214: Computer Network Protocols and Applications Final Examination Instructor: N. Vlajic Date: April 9, 2016 Instructions: Examination time: 180 min.
More informationCommunication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner
Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross
More informationNon-Cooperative End-to-End Path Characterisation
Non-Cooperative End-to-End Path Characterisation Kapil Bajaj, Balaji Kasal, Harshal Ninawe, Sriharsha and D. Manjunath Indian Institute of Technology, Bombay Powai Mumbai 400 076 INDIA Email: {kapil@cse,balaji@ee,hani@cse,harsha@ee,dmanju@ee}.iitb.ac.in
More informationComputer Networking
15-441 Computer Networking Lecture 17 TCP Performance & Future Eric Anderson Fall 2013 www.cs.cmu.edu/~prs/15-441-f13 Outline TCP modeling TCP details 2 TCP Performance Can TCP saturate a link? Congestion
More informationTransmission Control Protocol. ITS 413 Internet Technologies and Applications
Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion
More informationMESSAGES error-reporting messages and query messages. problems processes IP packet specific information
ICMP ICMP ICMP is mainly used by operating systems of networked computers to send error messages indicating that a requested service is not available or that host/ router could not be reached. ICMP MESSAGES
More informationTopics for This Week
Topics for This Week Routing Protocols in the Internet OSPF, BGP More on IP Fragmentation and Reassembly ICMP Readings Sections 5.6.4-5.6.5 1 Hierarchical Routing aggregate routers into regions, autonomous
More informationCSCD 330 Network Programming Winter 2015
CSCD 330 Network Programming Winter 2015 Lecture 11a Transport Layer Reading: Chapter 3 Some Material in these slides from J.F Kurose and K.W. Ross All material copyright 1996-2007 1 Chapter 3 Sections
More informationCS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang
CS 356: Computer Network Architectures Lecture 10: IP Fragmentation, ARP, and ICMP Xiaowei Yang xwy@cs.duke.edu Overview Homework 2-dimension parity IP fragmentation ARP ICMP Fragmentation and Reassembly
More informationFundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,
Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure
More informationReal-Time Protocol (RTP)
Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of
More informationThe Network Layer and Routers
The Network Layer and Routers Daniel Zappala CS 460 Computer Networking Brigham Young University 2/18 Network Layer deliver packets from sending host to receiving host must be on every host, router in
More informationPerformance Modeling
Performance Modeling EECS 489 Computer Networks http://www.eecs.umich.edu/~zmao/eecs489 Z. Morley Mao Tuesday Sept 14, 2004 Acknowledgement: Some slides taken from Kurose&Ross and Katz&Stoica 1 Administrivia
More informationNetwork layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing
Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every
More informationTransport Over IP. CSCI 690 Michael Hutt New York Institute of Technology
Transport Over IP CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP What is a transport protocol? Choosing to use a transport protocol Ports and Addresses Datagrams UDP What is a
More informationGuide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols
Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP
More informationNetworking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ
Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking
More informationInformation Network Systems The network layer. Stephan Sigg
Information Network Systems The network layer Stephan Sigg Tokyo, November 1, 2012 Error-detection and correction Decoding of Reed-Muller codes Assume a second order (16, 11) code for m = 4. The r-th order
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 20 MIDTERM EXAMINATION #1 - B COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 20 MIDTERM EXAMINATION #1 - A COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document
More informationOperational Security Capabilities for IP Network Infrastructure
Operational Security Capabilities F. Gont for IP Network Infrastructure G. Gont (opsec) UTN/FRH Internet-Draft September 1, 2008 Intended status: Informational Expires: March 5, 2009 Status of this Memo
More informationNetwork layer: Overview. Network Layer Functions
Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every
More informationPLEASE READ CAREFULLY BEFORE YOU START
MIDTERM EXAMINATION #2 NETWORKING CONCEPTS 03-60-367-01 U N I V E R S I T Y O F W I N D S O R - S c h o o l o f C o m p u t e r S c i e n c e Fall 2011 Question Paper NOTE: Students may take this question
More informationUNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING
UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING ECE361 Computer Networks Midterm March 09, 2016, 6:15PM DURATION: 75 minutes Calculator Type: 2 (non-programmable calculators) Examiner:
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for
More informationReview problems (for no credit): Transport and Network Layer
Review problems (for no credit): Transport and Network Layer V. Arun CS 653, Fall 2018 09/06/18 Transport layer 1. Protocol multiplexing: (a) If a web server has 100 open connections, how many sockets
More informationLecture 2 Communication services The Trasport Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 2 Communication services The Trasport Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it The structure edge: applications and hosts core: routers of s access s, media:
More informationInvestigating the Use of Synchronized Clocks in TCP Congestion Control
Investigating the Use of Synchronized Clocks in TCP Congestion Control Michele Weigle Dissertation Defense May 14, 2003 Advisor: Kevin Jeffay Research Question Can the use of exact timing information improve
More informationICMP (Internet Control Message Protocol)
ABSTRACT : ICMP stands for internet control message protocol it is a vital protocol of network layer among the seven layers of OSI(open system interconnection). Here we deal with the several situations
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 16, 2013 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2013-75 minutes This examination
More informationUCLA Computer Science Department Technical Report CSD-TR No
UCLA Computer Science Department Technical Report CSD-TR No. 4 CapProbe: A Simple and Accurate Technique to Measure Path Capacity Rohit Kapoor, Ling-Jyh Chen, M. Y. Sanadidi, Mario Gerla University of
More informationInternetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS
Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS 1. General (5p) a) The so-called hourglass model (sometimes referred to as a wine-glass ) has been used
More informationPart 1: Introduction. Goal: Review of how the Internet works Overview
Part 1: Introduction Goal: Review of how the Internet works Overview Get context Get overview, feel of the Internet Application layer protocols and addressing Network layer / Routing Link layer / Example
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Chapter 7 - Network Measurements Introduction Architecture & Mechanisms
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Dr. Nils
More informationNetwork Performance: Queuing
Network Performance: Queuing EE 122: Intro to Communication Networks Fall 2007 (WF 4-5:30 in Cory 277) Vern Paxson TAs: Lisa Fowler, Daniel Killebrew & Jorge Ortiz http://inst.eecs.berkeley.edu/~ee122/
More informationTCP/IP Performance ITL
TCP/IP Performance ITL Protocol Overview E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP IP ICMP ARP RARP (Auxiliary Services) Ethernet, X.25, HDLC etc. ATM 4/30/2002 Hans Kruse & Shawn Ostermann,
More information