Bandwidth measurement & Multicast

Size: px
Start display at page:

Download "Bandwidth measurement & Multicast"

Transcription

1 Capacity vs. Available Bandwidth Capacity: Maximum throughput without cross-traffic Bandwidth measurement & Multicast Available bandwidth: Maximum throughput given crosstraffic A A A A 4 EECS 49 Computer Networks Z. Morley Mao Tuesday Nov, 004 Source Destination C C C C 4 Acknowledgement: Some slides taken from Kurose&Ross and Katz& Stoica Applications Existing Methods Efficiency of application Choose the best server Congestion control Multicast routing Etc Pathchar based (Jacobson) Packet pair based (Bolot) Nettimer (Lai and Baker) AMP (NLANR) OCXmon (NLANR) MRTG (Oetiker) Pathload (Dovrolis and Jain) 4 Current Techniques Pathchar pathchar Measures bandwidth of every link accurately Requires special software on only one host Slow Can consume significant amounts of network bandwidth Lots of UDP probes with different sizes and TTLs Estimates latency and bandwidth q q q 4 q n- n rtt from (n-)th to n-th *lat + ip_size / bw Dynamic behavior hard as queues neglected and various other assumptions Link-by -link measurement 5

2 Bandwidth Measurement Algorithms pathchar Packet-pair s = MTU Number of different packet sizes: h Total time: p s l i where h: number of i = hops, l i : round trip latency from sender to hop i, p: number of packets sent per size () 0-hop Ethernet network,0ms avglatency 44s s Avg bandwidth + to avg packet size probe a hop = roundtriplatency l i Total data transferred: s ( i) i = p h Send packets back-to-back and estimate the narrow link capacity from the packet dispersion C L/C Only measures end-to-end capacity while neglecting cross-traffic C L/C L/C C Packet Pair Bandwidth Measurement Algorithms Packet Pair Not statistically robust kernel density estimator Not scalable passive implementation Slow gradual packet pair implementation Not robust on all traffic Potential Bandwidth Filtering (PBF) Not flexible to bandwidth changes window Difficult to deploy Receiver Only Packet Pair Not studied under controlled conditions Simulation Two packets queued next to each other at bottleneck link exit the link t seconds apart: Assuming constant bottleneck separation: s t = s : size of second packet b bnl b bnl : bottleneck bandwidth If a packet queues in between: s = t b bnl s + s = t b bnl Bandwidth Measurement Algorithms Packet Pair Filtering (MBF) Bandwidth Measurement Algorithms Receiver and Sender Based PP How to filter noise caused by time compressed and extended packets? - Use mean or median of samples No! - Use histogram to find point of greatest density - Kernel density estimator algorithm: gives greater weight to samples closer to the point at which we want to estimate the density Simple and fast to compute Makes no assumption about distribution it operates on RBPP t is measured at the receiver: s = a a a i : arrival time of packet i SBPP uses round trip time: s b bnl = r i : arrival time of ACK of packet i r r Filtering techniques can be used to reject incorrect estimates RBPP is more accurate but harder to deploy ROPP sacrifices a little accuracy for ease of deployment b bnl

3 Bandwidth Measurement Algorithms Timeliness versus Accuracy Potential Bandwidth Filtering PP usually implemented to run over a fixed number of packets before providing estimate Solution: Calculate bandwidth gradually - Converges to correct bandwidth within packets - Problem: slow to detect bandwidth change - Solution: use packet window (size: w); BUT, may reduce stability Potential Bandwidth Problem: PP cannot measure a higher bandwidth than that at which the sender sends PBF correlate the potential bandwidth and measured bandwidth of a sample in deciding how to filter 4 Nettimer AMP by NLANR Packet pair technique can not measure more than the rate of transmission (potential bandwidth problem ) Solves the above problem using potential bandwidth filtering Active Measurement Project (AMP) monitors installed at critical points in the network. Measure RTT, Loss, Topology IPMP to remove problems due to ICMP Measured bandwidth Costly to install at each router Can become highly intrusive Potential bandwidth Only measures end-to-end capacity while neglecting cross-traffic Link-by -link measurement 5 OCXmon MRTG Passive network measurement tool by NLANR MRTG to monitor the traffic load on network links Deployed at strategic network locations Highly portable SNMP based tool A PC connected to a router via an optical splitter Specific hardware needs to be installed at the measurement points Available only for optical, DS, FDDI interfaces Provides only 5 min averages of link utilization Used by the network operators only as router SNMP community string information required Link-by -link measurement Link-by -link measurement

4 Pathload Motivation Sends Self-Loading Periodic Streams at increasing rates till the rate is larger than the tight link available bandwidth and the relative one way delays of packets show an increasing trend. This scheme is highly intrusive even though the scheme measures the available bandwidth of the tight link End-to-end available bandwidth measurement Combine active and passive approaches Most tools estimate narrow link capacity Accuracy Scalability Statistical robustness Not intrusive 9 0 Tight Link Identification Tight Link Identification (Contd.) Measurement packets Data record Version Type Length Checksum IP address Data Record (optional) Counter Data Record (optional) Timestamp 0 measurement packets sent in a second, to make the tool non-intrusive Speed Inserted/modified by the hops of the path Counter information from MIB-II in router Tight Link Identification (Contd.) Tight Link Identification (Contd.) 0 0 checksum S checksum B A... B... C... D checksum B D D 0 packets in one second Utilization of I-th interface at time t k U Ik c = t c t I ( k ) ( k ) Available bandwidth AIk = S I U Ik At least agree link of the estimates should concur about the tight link identity. Otherwise the next batch of 0 packets is sent. Ik k 4 4

5 Resource Route Available Bandwidth Estimation Method: ABEst ABEst (Contd.) More accurate, reliable estimate of the available bandwidth of the identified tight link Based on MRTG++ Reliably predicts the utilization of the link for a future interval, that varies in size k-p+ k k+h We use the past p samples to predict the utilization for the next h samples Utilize the covariance method for prediction Values of p and h varied according to the estimation error 5 Performance Evaluation Performance Evaluation (Contd.) Tight link identification ABEst Framework The Definition Bottleneck Traffic Engineering Automated Manager Management Plane Simulation Tool DiffServ/ MPLS Domain a_bw bottleneck LSP Routing Traffic Routing LSP Setup/ Dimensioning LSP Capacity Allocation LSP Preemption Traffic Engineering Tool (TET) Measurement/ Performance Evaluation Tool TEAM Network Planning 9 0 hop choke points 0 5

6 measurement packets Recursive Packet Train (RPT) 0 55 Load packets measurement packets 0 pkts, 0 B 0 pkts, 500 B 0 pkts, 0 B TTL S g R g R g R Transmission of RPT g g g Properties of Pathneck Issues of Pathneck Single end control - Relies on ICMP responses Low overhead - Load packets: 0 x 500B = 0KB - Measurement packets: x 0 x 0B =.KB - Instantaneous load (.4 TCP pkts) == TCP slow start Directly comparable - All the gap measurements are from the same packet train Firewall ICMP packet generation time Reverse path congestion Packet loss Route change Last hop 4 gap Choke Point choke points bottleneck point gap Confidence sv i- sv i 0 Choke point is a hop where is the gap value changes significantly hop 0 hop conf: The percentage of available bandwidth change - Assume node i is a choke point, it s confidence is Bottleneck point is the top ranked choke point We use dynamic algorithm to detect the choke points - Threshold is empirically selected as 0. 5

7 Ranking Patheneck: Algorithm Available bandwidth based ranking - The choke point that has the smallest available bandwidth is the bottleneck Hop position based ranking - The choke point that is closest to the destination is the bottleneck They are not equivalent - Because of the packet train squeezing. Probe the same dst N times (N=0). For each probing, label the choke points, and compute their conf values. If a hop appears in over N/ probings as a choke point candidate with conf > 0., it is a real choke point 4. The top ranked choke point is the bottleneck point Motivation Example: Internet Radio This approach does not scale (techno station) - Sends out Kb/s MP music streams - Peak usage ~9000 simultaneous streams only 5 unique streams (trance, hard trance, hard house, eurodance, classical) - Consumes ~.Gb/s bandwidth costs are large fraction of their expenditures (maybe 50%?) - If 000 people are getting their groove on in Berkeley, 000 unicast streams are sent from NYC to Berkeley Broadcast Center Backbone ISP 9 40 Instead build trees Multicast Routing Approaches Broadcast Center Copy data at routers At most one copy of a data packet per link Backbone ISP Kinds of Trees - Source Specific Trees - Shared Tree Tree Computation Methods - Link state - Distance vector Routers keep track of groups in real-time Routers compute trees and forward packets along them LANs implement link layer multicast by broadcasting 4 4

8 Source Specific Trees Source Specific Trees 4 5 Each source is the root of its own tree One tree per source Tree can consists of shortest paths to each receiver 4 5 Each source is the root of its own tree One tree per source Tree can consists of shortest paths to each receiver 0 0 Members of the multicast tree Sender 4 Very good performance but expensive to construct/maintain; routers need to manage a tree per source 44 Shared Tree Shared Tree Easier to construct/maintain but hard to pick good trees for everyone! 4 5 One tree used by all members in a group Ideally, find asteiner tree - the minimum-weighted tree connecting onlythe multicast members 5 0 The Steiner tree problem, succintly, is a minimum interconnection problem. The most basic version is in a graph: given a weighted graph in which a subset of vertices are identified as terminals, find a minimumweight connected subgraph that includes all the terminals. If the edge weights are all positive, then the resulting subgraph is obviously a tree. 4 Shared Tree Shared Tree Ideally, find a Steiner tree minimum-weighted tree connecting only the multicast members Finding Steiner Tree is NP hard Heuristics are known Alternatively, find a minimum-spanning tree minimum-weighted tree connecting all nodes in the network Finding a minimum spanning tree is much easier 0 4 4

9 Shared Tree Shared Tree Alternatively, find a minimum-spanning tree minimum-weighted tree connecting all nodes in the network Finding a minimum spanning tree is much easier. How? Alternatively, find a minimum-spanning tree minimum-weighted tree connecting all nodes in the network Finding a minimum spanning tree is easier. How? Prune back to get multicast tree Multicast Service Model Multicast Service Model (cont d) S [G, data] Net [G, data] R joins G [G, data] R 0 joins G [G, data] R n- joins G Receivers join a multicast group which is identified by a multic ast address (e.g. G) Sender(s) send data to address G Network routes data to each of the receivers R 0 R... R n- Membership access control - open group: anyone can join - closed group: restrictions on joining Sender access control - anyone can send to group - anyone in group can send to group - restrictions one which host can send to group Note: multicast vs. broadcast - Broadcast: packets are delivered to all end-hosts in the network - Multicast: packets are delivered only to end- hosts that are in (have joined) the multicast group 5 5 Multicast and Layering Multicast Implementation Issues Multicast can be implemented at different layers - data link layer e.g. Ethernet multicast - network layer e.g. IP multicast - application layer e.g. End system multicast Which layer is best? How are multicast packets addressed? How is join implemented? How is send implemented? How much state is kept and who keeps it?

10 Data Link Layer Multicast Problems with Data Link Layer Multicast Recall: end-hosts in the same local area network (LAN) can hear from each other at the data link layer (e.g., Ethernet) Reserve some data link layer addresses for multicast Join group at multicast address G - Network interface card (NIC) normally only listens for packets s ent to unicast address A and broadcast address B - To join group G, NIC also listens for packets sent to multicast address G (NIC limits number of groups joined) - Implemented in hardware, thus efficient Send to group G - Packet is flooded on all LAN segments, like broadcast - Can waste bandwidth, but LANs should not be very large Only host NICs keep state about who has joined scalable to large number of receivers, groups Single data link technology Single LAN - limited to small number of hosts - limited to low diameter latency - essentially all the limitations of LANs compared to internetworks 55 5 Network Layer (IP) Multicast IP Multicast Routing Overcomes limitations of data link layer multicast Performs inter-network multicast routing - relies on data link layer multicast for intra-network routing Portion of IP address space defined as multicast addresses - addresses for entire Internet through Open group membership Anyone can send to group - flexible, but leads to problems Intra-domain - Distance-vector multicast - Link-state multicast Inter-domain - Protocol Independent Multicast - Single Source Multicast 5 5 Distance Vector Multicast Routing Protocol (DVRMP) Reverse Path Flooding (RPF) An elegant extension to DV routing Use shortest path DV routes to determine if link is on the source-rooted spanning tree Three steps in developing DVRMP - Reverse Path Flooding - Reverse Path Broadcasting - Truncated Reverse Path Broadcasting Extension to DV unicast routing Packet forwarding - If incoming link is shortest path to source - Send on all links except incoming - Packets always take shortest path assuming delay is symmetric Issues - Some links (LANs) may receive multiple copies - Every link receives each multicast packet, even if no interested hosts s: s: s: s: s: s: s: s: s: s: s s r r

11 Example Reverse Path Broadcasting (RPB) Flooding can cause a given packet to be sent multiple times over the same link SS a b x z z y duplicate packet Chose parent of each link along reverse shortest path to source Only parent forward to a link (child link) Identify Child Links. Routing updates identify parent. Since distances are known, each router can easily figure out if it's the parent for a given link. In case of tie, lower address wins forward only to child link child link of x for S a b x SS 5 z z y Solution: Reverse Path Broadcasting Don t Really Want to Flood! Truncated Reverse Path Broadcasting (TRPB) This is still a broadcast algorithm the traffic goes everywhere Need to Prune the tree when there are subtrees with no group members Solution: Truncated Reverse Path Broadcasting Extend DV/RPB to eliminate unneeded forwarding Identify leaves - Routers announce that a link is their next link to source S - Parent router can determine that it is not a leaf Explicit group joining on LAN - Members periodically (with random offset) multicast report locally - Hear an report, then suppress own Packet forwarding - If not a leaf router or have members - Out all links except incoming r r NL L r r NL SS NL L 4 Pruning Details Pruning Details Prune (Source,Group) at leaf if no members - Send Non-Membership Report (NMR) up tree If all children of router R send NRM, prune (S,G) - Propagate prune for (S,G) to parent R On timeout: - Prune dropped - Flow is reinstated - Down stream routers re-prune Note: a soft-state approach How to pick prune timers? - Too long large join time - Too short highcontrol overhead What do you do when a member of a group (re)joins? - Issue prune-cancellation message (grafts) 5

12 Distance Vector Multicast Scaling Core Based Trees (CBT) State requirements: - O(Sources Groups) active state How to get better scaling? - Hierarchical Multicast - Core-based Trees Pick a rendevouz point for the group called the core. - Shared tree Unicast packet to core and bounce it back to multicast group Tree construction is receiver-based - Joins can be tunneled if required - Only nodes on One tree per group tree involved Reduce routing table state from O(S xg) to O(G) Core-Based Tree A tree rooted at the core is constructed for the group. State is maintained on a per-group basis. That is, each router keeps (G, list of interfaces to send). The notion of upstream/downstream interfaces is defined w.r.t. the core. Packets are forwarded by a router to its parent and children except the one on which the packets arrive. Core-Based Tree Core On tree relay router On tree router Sender Router with directly attached group member 9 0 Example Disadvantages Group members: M, M, M M sends data M root Sub-optimal delay Single point of failure - Core goes out and everything lost until error recovery elects a new core Small, local groups with non-local core - Need good core selection - Optimal choice (computing topological center) is NP hard M M control (join) messages data

13 Problems with Network Layer Multicast (NLM) NLM Reliability Scales poorly with number of groups - A router must maintain state for every group that traverses it - Many groups traverse core routers Supporting higher level functionality is difficult - NLM: best-effort multi-point deliveryservice - Reliability and congestion control for NLM complicated Deployment is difficult and slow - ISP s reluctant to turn on NLM Assume reliability through retransmission Sender can not keep state about each receiver - E.g., what receivers have received - Number of receivers unknown and possibly very large Sender can not retransmit every lost packet - Even if only one receiver misses packet, sender must retransmit, lowering throughput N(ACK) implosion - Described next 4 (N)ACK Implosion NACK Implosion (Positive) acknowledgements - Ack every n received packets - What happens for multicast? Negative acknowledgements - Only ack when data is lost - Assume packet is lost S R R R When a packet is lost all receivers in the sub-tree originated at the link where the packet is lost send NACKs S??? R R R 5 Barriers to Multicast Application Layer Multicast (ALM) Hard to change IP - Multicast means change to IP - Details of multicast were very hard to get right Not always consistent with ISP economic model - Charging done at edge, but single packet from edge can explode into millions of packets within network Let the hosts do all the special work - Only require unicast from infrastructure Basic idea: - Hosts do the copying of packets - Set up tree between hosts Troublesome security model - Anyone can send to a group - Denial-of-service attacks on known groups Example: Narada [Yang-hua et al, 000] - Small group sizes <= hundreds of nodes - Typical application: chat

14 Narada: End System Multicast Algorithmic Challenge Gatech Stanford Stan CMU Stan Berk Choosing replication/forwarding points among hosts - how do the hosts know about each other - and know which hosts should forward to other hosts Berkeley Berk Gatech Overlay Tree Stan Stan CMU Berk Berk 9 0 Advantages of ALM Performance Concerns No need for changes to IP or routers No need for ISP cooperation End hosts can prevent other hosts from sending Easy to implement reliability - use hop-by-hop retransmissions Stretch - ratio of latency in the overlay to latency in the underlying network Stress - number of duplicate packets sent over the same physical link Performance Concerns Single Sender Multicast Gatech Delay from CMU to Berk increases Stan Stan Many problems with IP multicast disappear if each group is associated with a single source Duplicate Packets: Bandwidth Wastage CMU CMU Gatech Berk Stanford Berkeley Berk Stan Stan Berk Berk Hosts joining multicast group can send join messages to source - this sets up delivery tree - no worry about root being in wrong place This solves several problems: - better security and charging model - simple algorithm 4 4

15 Example What s Wrong with SSM? Group members: M, M, M source Multiple sources? - Can set up group per source, or... - Source can serve as relay for other senders M Algorithm? - Trivial M M So, why isn t SSM the answer? - Multicast no longer serves as rendezvous - Ok for broadcast apps, not good for meeting apps control (join) messages data 5 What Do You Need to Know? DVRMP CBT SSM How they compare 5

Bandwidth measurement & Multicast

Bandwidth measurement & Multicast Bandwidth measurement & Multicast EECS 489 Computer Networks http://www.eecs.umich.edu/~zmao/eecs489 Z. Morley Mao Tuesday Nov 11, 004 Acknowledgement: Some slides taken from Kurose&Ross and Katz&Stoica

More information

EE122: Multicast. Kevin Lai October 7, 2002

EE122: Multicast. Kevin Lai October 7, 2002 EE122: Multicast Kevin Lai October 7, 2002 Internet Radio www.digitallyimported.com (techno station) - sends out 128Kb/s MP3 music streams - peak usage ~9000 simultaneous streams only 5 unique streams

More information

EE122: Multicast. Internet Radio. Multicast Service Model 1. Motivation

EE122: Multicast. Internet Radio. Multicast Service Model 1. Motivation Internet Radio EE122: Multicast Kevin Lai October 7, 2002 wwwdigitallyimportedcom (techno station) - sends out 128Kb/s MP music streams - peak usage ~9000 simultaneous streams only 5 unique streams (trance,

More information

Announcements. EECS 122: Introduction to Computer Networks Multicast and Overlay Networks. Motivational Example: Streaming Media

Announcements. EECS 122: Introduction to Computer Networks Multicast and Overlay Networks. Motivational Example: Streaming Media Announcements EEC : Introduction to Computer Networks Multicast and Overlay Networks Ion toica (and Brighten Godfrey) TAs: Lucian Popa, David Zats and Ganesh Ananthanarayanan http://inst.eecs.berkeley.edu/~ee/

More information

Multicast EECS 122: Lecture 16

Multicast EECS 122: Lecture 16 Multicast EECS 1: Lecture 16 Department of Electrical Engineering and Computer Sciences University of California Berkeley Broadcasting to Groups Many applications are not one-one Broadcast Group collaboration

More information

CS 268: IP Multicast Routing

CS 268: IP Multicast Routing Motivation CS 268: IP Multicast Routing Ion Stoica April 8, 2003 Many applications requires one-to-many communication - E.g., video/audio conferencing, news dissemination, file updates, etc. Using unicast

More information

Networking Acronym Smorgasbord: , DVMRP, CBT, WFQ

Networking Acronym Smorgasbord: , DVMRP, CBT, WFQ Networking Acronym Smorgasbord: 802.11, DVMRP, CBT, WFQ EE122 Fall 2011 Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxson and other

More information

CS4700/CS5700 Fundamentals of Computer Networks

CS4700/CS5700 Fundamentals of Computer Networks CS4700/CS5700 Fundamentals of Computer Networks Lecture 19: Multicast Routing Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu

More information

Contents. Overview Multicast = Send to a group of hosts. Overview. Overview. Implementation Issues. Motivation: ISPs charge by bandwidth

Contents. Overview Multicast = Send to a group of hosts. Overview. Overview. Implementation Issues. Motivation: ISPs charge by bandwidth EECS Contents Motivation Overview Implementation Issues Ethernet Multicast IGMP Routing Approaches Reliability Application Layer Multicast Summary Motivation: ISPs charge by bandwidth Broadcast Center

More information

CSE 123A Computer Networks

CSE 123A Computer Networks CSE 123A Computer Networks Winter 2005 Lecture 12 Internet Routing: Multicast Today: Multicast routing Multicast service model Host interface Host-router interactions (IGMP) Multicast Routing Limiters

More information

Multicast service model Host interface Host-router interactions (IGMP) Multicast Routing Distance Vector Link State. Shared tree.

Multicast service model Host interface Host-router interactions (IGMP) Multicast Routing Distance Vector Link State. Shared tree. CSE 123A Computer Networks Fall 2009 Lecture 10 Internet Routing: Multicast Today: Multicast routing Multicast service model Host interface Host-router interactions (IGMP) Multicast Routing Distance Vector

More information

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting

More information

Multicast Communications

Multicast Communications Multicast Communications Multicast communications refers to one-to-many or many-tomany communications. Unicast Broadcast Multicast Dragkedja IP Multicasting refers to the implementation of multicast communication

More information

Available Bandwidth Estimation. Probing Packet Train in Pathneck. Transmission of RPT. Choke Point Detection. Packet train probing

Available Bandwidth Estimation. Probing Packet Train in Pathneck. Transmission of RPT. Choke Point Detection. Packet train probing Measuring the Path Network Measurement: Measuring the Path Available Bandwidth/Bottleneck BFind,Pathchar,Cartouche Pathneck Link Capacity: Pathchar CapProbe Loss/Delay/Re-ording Tulip Joy Zhang Pathneck

More information

Why multicast? The concept of multicast Multicast groups Multicast addressing Multicast routing protocols MBONE Multicast applications Conclusions

Why multicast? The concept of multicast Multicast groups Multicast addressing Multicast routing protocols MBONE Multicast applications Conclusions Tuomo Karhapää tuomo.karhapaa@otaverkko.fi Otaverkko Oy Why multicast? The concept of multicast Multicast groups Multicast addressing Multicast routing protocols MBONE Multicast applications Conclusions

More information

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley

More information

Multicast Communications. Slide Set were original prepared by Dr. Tatsuya Susa

Multicast Communications. Slide Set were original prepared by Dr. Tatsuya Susa Multicast Communications Slide Set were original prepared by Dr. Tatsuya Susa Outline 1. Advantages of multicast 2. Multicast addressing 3. Multicast Routing Protocols 4. Multicast in the Internet 5. IGMP

More information

Page 1. This Week. CS 269: Lecture 11 Multicast A Tale of Two Failures. Multicast and QoS: the lost decade. Irony. History. Lectures.

Page 1. This Week. CS 269: Lecture 11 Multicast A Tale of Two Failures. Multicast and QoS: the lost decade. Irony. History. Lectures. This Week CS 269: Lecture 11 Multicast A Tale of Two Failures Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California,

More information

Broadcast and Multicast Routing

Broadcast and Multicast Routing Broadcast and Multicast Routing Daniel Zappala CS 460 Computer Networking Brigham Young University Group Communication 2/34 How can the Internet provide efficient group communication? send the same copy

More information

Multicast Communications. Tarik Čičić, 4. March. 2016

Multicast Communications. Tarik Čičić, 4. March. 2016 Multicast Communications Tarik Čičić, 4. March. 06 Overview One-to-many communication, why and how Algorithmic approach: Steiner trees Practical algorithms Multicast tree types Basic concepts in multicast

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Network Layer V Dmitri Loguinov Texas A&M University April 17, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross Chapter 4:

More information

Goals. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Solution. Overlay Networks: Motivations.

Goals. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Solution. Overlay Networks: Motivations. Goals CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University of California, Berkeley

More information

Overlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals.

Overlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals. Overlay Networks: Motivations CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University

More information

List of groups known at each router. Router gets those using IGMP. And where they are in use Where members are located. Enhancement to OSPF

List of groups known at each router. Router gets those using IGMP. And where they are in use Where members are located. Enhancement to OSPF Multicast OSPF OSPF Open Shortest Path First Link State Protocol Use Dijkstra s algorithm (SPF) Calculate shortest path from the router to every possible destination Areas Limit the information volume

More information

IP Multicast. What is multicast?

IP Multicast. What is multicast? IP Multicast 1 What is multicast? IP(v4) allows a host to send packets to a single host (unicast), or to all hosts (broadcast). Multicast allows a host to send packets to a subset of all host called a

More information

IP Multicast. Overview. Casts. Tarik Čičić University of Oslo December 2001

IP Multicast. Overview. Casts. Tarik Čičić University of Oslo December 2001 IP Multicast Tarik Čičić University of Oslo December 00 Overview One-to-many communication, why and how Algorithmic approach (IP) multicast protocols: host-router intra-domain (router-router) inter-domain

More information

Lecture 6: Multicast

Lecture 6: Multicast Lecture 6: Multicast Challenge: how do we efficiently send messages to a group of machines? Need to revisit all aspects of networking Last time outing This time eliable delivery Ordered delivery Congestion

More information

Review. Some slides are in courtesy of J. Kurose and K. Ross

Review. Some slides are in courtesy of J. Kurose and K. Ross Review The Internet (IP) Protocol Datagram format IP fragmentation ICMP: Internet Control Message Protocol NAT: Network Address Translation Routing in the Internet Intra-AS routing: RIP and OSPF Inter-AS

More information

Broadcast Routing. Multicast. Flooding. In-network duplication. deliver packets from source to all other nodes source duplication is inefficient:

Broadcast Routing. Multicast. Flooding. In-network duplication. deliver packets from source to all other nodes source duplication is inefficient: Broadcast Routing Multicast deliver packets from source to all other nodes source duplication is inefficient: duplicate duplicate creation/transmission duplicate source duplication in-network duplication

More information

IP Multicast. Falko Dressler Regionales Rechenzentrum Grundzüge der Datenkommunikation IP Multicast

IP Multicast. Falko Dressler Regionales Rechenzentrum Grundzüge der Datenkommunikation IP Multicast Falko Dressler Regionales Rechenzentrum falko.dressler@rrze.uni-erlangen.de 1 Agenda Basics Principles of IP multicast, addressing, TTL Internet Group Management Protocol (IGMP) IGMPv1, v2, v3 Layer-2

More information

CS 356: Computer Network Architectures. Lecture 24: IP Multicast and QoS [PD] Chapter 4.2, 6.5. Xiaowei Yang

CS 356: Computer Network Architectures. Lecture 24: IP Multicast and QoS [PD] Chapter 4.2, 6.5. Xiaowei Yang CS 356: Computer Network Architectures Lecture 24: IP Multicast and QoS [PD] Chapter 4.2, 6.5 Xiaowei Yang xwy@cs.duke.edu Overview Two historic important topics in networking Multicast QoS Limited Deployment

More information

Advanced Networking. Multicast

Advanced Networking. Multicast Advanced Networking Multicast Renato Lo Cigno Renato.LoCigno@dit.unitn.it Homepage: disi.unitn.it/locigno/index.php/teaching-duties/advanced-networking Multicasting Addresses that refer to group of hosts

More information

ASM. Engineering Workshops

ASM. Engineering Workshops 1 ASM 2 ASM Allows SPTs and RPTs RP: Matches senders with receivers Provides network source discovery Typically uses RPT to bootstrap SPT RPs can be learned via: Static configuration recommended Anycast-RP

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

UDP, TCP, IP multicast

UDP, TCP, IP multicast UDP, TCP, IP multicast Dan Williams In this lecture UDP (user datagram protocol) Unreliable, packet-based TCP (transmission control protocol) Reliable, connection oriented, stream-based IP multicast Process-to-Process

More information

Lecture 19: Multicast. CSE 123: Computer Networks Stefan Savage

Lecture 19: Multicast. CSE 123: Computer Networks Stefan Savage Lecture 19: Multicast CSE 123: Computer Networks Stefan Savage Today: Multicast routing Multicast service model Host interface Host-router interactions (IGMP) Multicast outing Limiters Distance Vector

More information

! Naive n-way unicast does not scale. ! IP multicast to the rescue. ! Extends IP architecture for efficient multi-point delivery. !

! Naive n-way unicast does not scale. ! IP multicast to the rescue. ! Extends IP architecture for efficient multi-point delivery. ! Bayeux: An Architecture for Scalable and Fault-tolerant Wide-area Data Dissemination ACM NOSSDAV 001 Shelley Q. Zhuang, Ben Y. Zhao, Anthony D. Joseph, Randy H. Katz, John D. Kubiatowicz {shelleyz, ravenben,

More information

Exercises to Communication Systems

Exercises to Communication Systems Exercises to Communication Systems IP Multicast Additional Slides Dr.-Ing. Falko Dressler Department of Computer Science 7 University of Erlangen ÜKS, WS 05/06 1 IP Multicast Introduction Internet Group

More information

Introduction to Communication Networks Spring Unit 13 Network extensions Bridges.

Introduction to Communication Networks Spring Unit 13 Network extensions Bridges. Introduction to Communication Networks Spring 2007 Unit 13 Network extensions Bridges. Acknowledgements slides coming from: The book by Peterson/Davie The book by Wiliam Stallings Slides from lectures

More information

Multicast Technology White Paper

Multicast Technology White Paper Multicast Technology White Paper Keywords: Multicast, IGMP, IGMP Snooping, PIM, MBGP, MSDP, and SSM Mapping Abstract: The multicast technology implements high-efficiency point-to-multipoint data transmission

More information

Lecture 6: Multicast

Lecture 6: Multicast Lecture 6: Multicast Challene: how do we efficiently send messaes to a roup of machines? Need to revisit all aspects of networkin Routin Autonomous systems and admin control Address allocation Conestion

More information

DATA COMMUNICATOIN NETWORKING

DATA COMMUNICATOIN NETWORKING DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book & Slides: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks

More information

NET ID. CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17

NET ID. CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17 CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17 Q1. 2 points Write your NET ID at the top of every page of this test. Q2. X points Name 3 advantages of a circuit network

More information

What is the difference between unicast and multicast? (P# 114)

What is the difference between unicast and multicast? (P# 114) 1 FINAL TERM FALL2011 (eagle_eye) CS610 current final term subjective all solved data by eagle_eye MY paper of CS610 COPUTER NETWORKS There were 30 MCQs Question no. 31 (Marks2) Find the class in 00000001.001011.1001.111

More information

EECS 122, Lecture 16. Link Costs and Metrics. Traffic-Sensitive Metrics. Traffic-Sensitive Metrics. Static Cost Metrics.

EECS 122, Lecture 16. Link Costs and Metrics. Traffic-Sensitive Metrics. Traffic-Sensitive Metrics. Static Cost Metrics. EECS 122, Lecture 16 Kevin Fall kfall@cs.berkeley.edu edu Link Costs and Metrics Routing protocols compute shortest/cheapest paths using some optimization criteria Choice of criteria has strong effect

More information

Table of Contents 1 PIM Configuration 1-1

Table of Contents 1 PIM Configuration 1-1 Table of Contents 1 PIM Configuration 1-1 PIM Overview 1-1 Introduction to PIM-DM 1-2 How PIM-DM Works 1-2 Introduction to PIM-SM 1-4 How PIM-SM Works 1-5 Introduction to Administrative Scoping in PIM-SM

More information

ITEC310 Computer Networks II

ITEC310 Computer Networks II ITEC310 Computer Networks II Chapter 22 Network Layer:, and Routing Department of Information Technology Eastern Mediterranean University Objectives 2/131 After completing this chapter you should be able

More information

Sirindhorn International Institute of Technology Thammasat University

Sirindhorn International Institute of Technology Thammasat University Name.............................. ID............... Section...... Seat No...... Thammasat University Final Exam: Semester, 205 Course Title: Introduction to Data Communications Instructor: Steven Gordon

More information

21: IP Multicast. Classic example: British and Indian communities in the US want to watch cricket. Americans worldwide want to watch baseball.

21: IP Multicast. Classic example: British and Indian communities in the US want to watch cricket. Americans worldwide want to watch baseball. 21: IP Multicast Mark Handley TV on the net Suppose you want to broadcast an event live to a million people worldwide, but your audience is too distributed for mainstream TV to carry. How do you do it?

More information

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting Outline Routing Fundamentals of Computer Networks Guevara Noubir Introduction Broadcasting and Multicasting Shortest Path Unicast Routing Link Weights and Stability F2003, CSG150 Fundamentals of Computer

More information

Advanced Network Training Multicast

Advanced Network Training Multicast Division of Brocade Advanced Network Training Multicast Larry Mathews Systems Engineer lmathews@brocade.com Training Objectives Session will concentrate on Multicast with emphasis on Protocol Independent

More information

Internet is Based on Packet Switching. EECS 122: Introduction to Computer Networks Semester Wrap-Up. Design Principles. Recap: Course Goals

Internet is Based on Packet Switching. EECS 122: Introduction to Computer Networks Semester Wrap-Up. Design Principles. Recap: Course Goals Internet is Based on Packet Switching CS 1: Introduction to Computer s Semester Wrap-Up Node in a packet switching network incoming links Node Memory outgoing links Computer Science Division Department

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Hybrid Control and Switched Systems. Lecture #17 Hybrid Systems Modeling of Communication Networks

Hybrid Control and Switched Systems. Lecture #17 Hybrid Systems Modeling of Communication Networks Hybrid Control and Switched Systems Lecture #17 Hybrid Systems Modeling of Communication Networks João P. Hespanha University of California at Santa Barbara Motivation Why model network traffic? to validate

More information

Congestion Control End Hosts. CSE 561 Lecture 7, Spring David Wetherall. How fast should the sender transmit data?

Congestion Control End Hosts. CSE 561 Lecture 7, Spring David Wetherall. How fast should the sender transmit data? Congestion Control End Hosts CSE 51 Lecture 7, Spring. David Wetherall Today s question How fast should the sender transmit data? Not tooslow Not toofast Just right Should not be faster than the receiver

More information

Example questions for the Final Exam, part A

Example questions for the Final Exam, part A ETSF10, ETSF05 Ht 2010 Example questions for the Final Exam, part A 1. In AdHoc routing there are two main strategies, reactive and proactive routing. Describe in a small number of words the concept of

More information

EECS 122, Lecture 19. Reliable Delivery. An Example. Improving over Stop & Wait. Picture of Go-back-n/Sliding Window. Send Window Maintenance

EECS 122, Lecture 19. Reliable Delivery. An Example. Improving over Stop & Wait. Picture of Go-back-n/Sliding Window. Send Window Maintenance EECS 122, Lecture 19 Today s Topics: More on Reliable Delivery Round-Trip Timing Flow Control Intro to Congestion Control Kevin Fall, kfall@cs cs.berkeley.eduedu Reliable Delivery Stop and Wait simple

More information

Lecture 6. TCP/IP Network Layer (4)

Lecture 6. TCP/IP Network Layer (4) Lecture 6 TCP/IP Network Layer (4) Outline (Network Layer) Principles behind network layer services: Virtual circuit and datagram networks Routing algorithms Link State Distance Vector Hierarchical Routing

More information

Hands-On IP Multicasting for Multimedia Distribution Networks

Hands-On IP Multicasting for Multimedia Distribution Networks Hands-On for Multimedia Distribution Networks Course Description This Hands-On course provides an in-depth look how IP multicasting works, its advantages and limitations and how it can be deployed to provide

More information

Page 1. Goals for Today" Discussion" Example: Reliable File Transfer" CS162 Operating Systems and Systems Programming Lecture 11

Page 1. Goals for Today Discussion Example: Reliable File Transfer CS162 Operating Systems and Systems Programming Lecture 11 Goals for Today" CS162 Operating Systems and Systems Programming Lecture 11 Reliability, Transport Protocols" Finish e2e argument & fate sharing Transport: TCP/UDP Reliability Flow control October 5, 2011

More information

IPv6 PIM. Based on the forwarding mechanism, IPv6 PIM falls into two modes:

IPv6 PIM. Based on the forwarding mechanism, IPv6 PIM falls into two modes: Overview Protocol Independent Multicast for IPv6 () provides IPv6 multicast forwarding by leveraging static routes or IPv6 unicast routing tables generated by any IPv6 unicast routing protocol, such as

More information

Multicast. Midterm. EECS 122: Lecture 16. University of California Berkeley. Exam was not meant to be easy

Multicast. Midterm. EECS 122: Lecture 16. University of California Berkeley. Exam was not meant to be easy Multicast EECS : Lecture 6 Department of Electrical Engineering and Computer Sciences University of California Berkeley Midterm Exam was not meant to e easy Mean: 5 Median: 5 Std Dev: 8 Performance quite

More information

How did IP Multicast get so complicated?

How did IP Multicast get so complicated? How did IP Multicast get so complicated? Mark Handley ACIRI mjh@aciri.org Overview IP Multicast Service Model Multicast Addresses DVMRP (1988-1993) Broadcast and Prune PIM-DM (~1993) DVMRP for "real" routers

More information

Computer Networks. Sándor Laki ELTE-Ericsson Communication Networks Laboratory

Computer Networks. Sándor Laki ELTE-Ericsson Communication Networks Laboratory Computer Networks Sándor Laki ELTE-Ericsson Communication Networks Laboratory ELTE FI Department Of Information Systems lakis@elte.hu http://lakis.web.elte.hu Based on the slides of Laurent Vanbever. Further

More information

CSCI-GA Operating Systems. Networking. Hubertus Franke

CSCI-GA Operating Systems. Networking. Hubertus Franke CSCI-GA.2250-001 Operating Systems Networking Hubertus Franke frankeh@cs.nyu.edu Source: Ganesh Sittampalam NYU TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute

More information

DD2490 p IP Multicast routing. Multicast routing. Olof Hagsand KTH CSC

DD2490 p IP Multicast routing. Multicast routing. Olof Hagsand KTH CSC DD2490 p4 2010 IP Multicast routing Multicast routing Olof Hagsand KTH CSC 1 Literature RFC 4601 Section 3 (you may need some definitions from Section 2). See reading instructions on web. 2 Deployment

More information

4.2 Multicast IP supports multicast to support one-to-many (radio, news, IP multicast was originally a many-to-many (any source MC or

4.2 Multicast IP supports multicast to support one-to-many (radio, news, IP multicast was originally a many-to-many (any source MC or CS475 Networks Lecture 14 Chapter 4 Advanced Internetworking Assignments Reading for Lecture 15: Sections 5.1-5.2 Homework 5, Wireshark Project 3 posted, due next Thursday; Programming Project 3 posted,

More information

The Measurement Manager Modular End-to-End Measurement Services

The Measurement Manager Modular End-to-End Measurement Services The Measurement Manager Modular End-to-End Measurement Services Ph.D. Research Proposal Department of Electrical and Computer Engineering University of Maryland, College Park, MD Pavlos Papageorgiou pavlos@eng.umd.edu

More information

TCP. CSU CS557, Spring 2018 Instructor: Lorenzo De Carli (Slides by Christos Papadopoulos, remixed by Lorenzo De Carli)

TCP. CSU CS557, Spring 2018 Instructor: Lorenzo De Carli (Slides by Christos Papadopoulos, remixed by Lorenzo De Carli) TCP CSU CS557, Spring 2018 Instructor: Lorenzo De Carli (Slides by Christos Papadopoulos, remixed by Lorenzo De Carli) 1 Sources Fall and Stevens, TCP/IP Illustrated Vol. 1, 2nd edition Congestion Avoidance

More information

Internet Multicast Routing

Internet Multicast Routing Internet Multicast Routing Distribute information from a source to multiple destinations (multicast group) seminar, meetings, distance learning, van multicast services. MBONE (Internet Multicast BackBone)

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

CS 138: Communication I. CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved.

CS 138: Communication I. CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved. CS 138: Communication I CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved. Topics Network Metrics Layering Reliability Congestion Control Routing CS 138 V 2 Copyright 2012 Thomas W. Doeppner.

More information

Objectives. Chapter 10. Upon completion you will be able to:

Objectives. Chapter 10. Upon completion you will be able to: Chapter 10 Figure 10.1 Position of IGMP in the network layer Objectives Upon completion you will be able to: Know the purpose of IGMP Know the types of IGMP messages Understand how a member joins a group

More information

RSVP and the Integrated Services Architecture for the Internet

RSVP and the Integrated Services Architecture for the Internet RSVP and the Integrated Services Architecture for the Internet N. C. State University CSC557 Multimedia Computing and Networking Fall 2001 Lecture # 20 Roadmap for Multimedia Networking 2 1. Introduction

More information

IP Multicast Technology Overview

IP Multicast Technology Overview IP multicast is a bandwidth-conserving technology that reduces traffic by delivering a single stream of information simultaneously to potentially thousands of businesses and homes. Applications that take

More information

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput

More information

Principles behind data link layer services

Principles behind data link layer services Data link layer Goals: Principles behind data link layer services Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control: Done!

More information

On Network Dimensioning Approach for the Internet

On Network Dimensioning Approach for the Internet On Dimensioning Approach for the Internet Masayuki Murata ed Environment Division Cybermedia Center, (also, Graduate School of Engineering Science, ) e-mail: murata@ics.es.osaka-u.ac.jp http://www-ana.ics.es.osaka-u.ac.jp/

More information

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 Question 344 Points 444 Points Score 1 10 10 2 10 10 3 20 20 4 20 10 5 20 20 6 20 10 7-20 Total: 100 100 Instructions: 1. Question

More information

Overview. TCP & router queuing Computer Networking. TCP details. Workloads. TCP Performance. TCP Performance. Lecture 10 TCP & Routers

Overview. TCP & router queuing Computer Networking. TCP details. Workloads. TCP Performance. TCP Performance. Lecture 10 TCP & Routers Overview 15-441 Computer Networking TCP & router queuing Lecture 10 TCP & Routers TCP details Workloads Lecture 10: 09-30-2002 2 TCP Performance TCP Performance Can TCP saturate a link? Congestion control

More information

TCP Strategies. Keepalive Timer. implementations do not have it as it is occasionally regarded as controversial. between source and destination

TCP Strategies. Keepalive Timer. implementations do not have it as it is occasionally regarded as controversial. between source and destination Keepalive Timer! Yet another timer in TCP is the keepalive! This one is not required, and some implementations do not have it as it is occasionally regarded as controversial! When a TCP connection is idle

More information

IP Multicast Routing Protocols

IP Multicast Routing Protocols IP Multicast Routing Protocols Term Paper By : Priyank Porwal (97255) Course : Advanced Computer Networks (CS625) Instructor : Dr. Dheeraj Sanghi Department of CSE, IIT Kanpur. April, 2000. Table of Contents

More information

Networked Systems (SAMPLE QUESTIONS), COMPGZ01, May 2016

Networked Systems (SAMPLE QUESTIONS), COMPGZ01, May 2016 Networked Systems (SAMPLE QUESTIONS), COMPGZ01, May 2016 Answer TWO questions from Part ONE on the answer booklet containing lined writing paper, and answer ALL questions in Part TWO on the multiple-choice

More information

Computer Networks and Data Systems

Computer Networks and Data Systems Computer Networks and Data Systems Transport Layer TDC463 Winter 2011/12 John Kristoff - DePaul University 1 Why a transport layer? IP gives us end-to-end connectivity doesn't it? Why, or why not, more

More information

CS4700/CS5700 Fundamentals of Computer Networks

CS4700/CS5700 Fundamentals of Computer Networks CS4700/CS5700 Fundamentals of Computer Networks Lecture 22: Overlay networks Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu

More information

Outline. Internet. Router. Network Model. Internet Protocol (IP) Design Principles

Outline. Internet. Router. Network Model. Internet Protocol (IP) Design Principles Outline Internet model Design principles Internet Protocol (IP) Transmission Control Protocol (TCP) Tze Sing Eugene Ng Department of Computer Science Carnegie Mellon University Tze Sing Eugene Ng eugeneng@cs.cmu.edu

More information

EE 122: Transport Protocols. Kevin Lai October 16, 2002

EE 122: Transport Protocols. Kevin Lai October 16, 2002 EE 122: Transport Protocols Kevin Lai October 16, 2002 Motivation IP provides a weak, but efficient service model (best-effort) - packets can be delayed, dropped, reordered, duplicated - packets have limited

More information

Page 1. Review: Internet Protocol Stack. Transport Layer Services. Design Issue EEC173B/ECS152C. Review: TCP

Page 1. Review: Internet Protocol Stack. Transport Layer Services. Design Issue EEC173B/ECS152C. Review: TCP EEC7B/ECS5C Review: Internet Protocol Stack Review: TCP Application Telnet FTP HTTP Transport Network Link Physical bits on wire TCP LAN IP UDP Packet radio Transport Layer Services Design Issue Underlying

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

Da t e: August 2 0 th a t 9: :00 SOLUTIONS Interne t working, Examina tion 2G1 3 0 5 Da t e: August 2 0 th 2 0 0 3 a t 9: 0 0 1 3:00 SOLUTIONS 1. General (5p) a) Place each of the following protocols in the correct TCP/IP layer (Application, Transport,

More information

CSCI Computer Networks

CSCI Computer Networks CSCI-1680 - Computer Networks Link Layer III: LAN & Switching Chen Avin Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti, Peterson & Davie, Rodrigo Fonseca Today: Link Layer (cont.)

More information

Introduction to Networks and the Internet

Introduction to Networks and the Internet Introduction to Networks and the Internet CMPE 80N Announcements Project 2. Reference page. Library presentation. Internet History video. Spring 2003 Week 7 1 2 Today Internetworking (cont d). Fragmentation.

More information

Goals for Today s Class. EE 122: Networks & Protocols. What Global (non-digital) Communication Network Do You Use Every Day?

Goals for Today s Class. EE 122: Networks & Protocols. What Global (non-digital) Communication Network Do You Use Every Day? Goals for Today s Class EE 122: & Protocols Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee122/fa09 (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues

More information

IPv6 PIM-DM configuration example 36 IPv6 PIM-SM non-scoped zone configuration example 39 IPv6 PIM-SM admin-scoped zone configuration example 42 IPv6

IPv6 PIM-DM configuration example 36 IPv6 PIM-SM non-scoped zone configuration example 39 IPv6 PIM-SM admin-scoped zone configuration example 42 IPv6 Contents Configuring IPv6 PIM 1 Overview 1 IPv6 PIM-DM overview 1 IPv6 PIM-SM overview 3 IPv6 BIDIR-PIM overview 8 IPv6 administrative scoping overview 11 IPv6 PIM-SSM overview 13 Relationship among IPv6

More information

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste Outline 15-441 Computer Networking Lecture 18 TCP Performance Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 TCP congestion avoidance TCP slow start TCP modeling TCP details 2 AIMD Distributed,

More information

Principles behind data link layer services:

Principles behind data link layer services: Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example

More information

Principles behind data link layer services:

Principles behind data link layer services: Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example

More information

TCP so far Computer Networking Outline. How Was TCP Able to Evolve

TCP so far Computer Networking Outline. How Was TCP Able to Evolve TCP so far 15-441 15-441 Computer Networking 15-641 Lecture 14: TCP Performance & Future Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Reliable byte stream protocol Connection establishments

More information

Chapter 19 Network Layer: Logical Addressing

Chapter 19 Network Layer: Logical Addressing Chapter 19 Network Layer: Logical Addressing 19.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 19.2 19-1 IPv4 ADDRESSES An IPv4 address is a 32-bit address

More information

CSE 123A Computer Networks

CSE 123A Computer Networks CSE 123A Computer Networks Winter 2005 Lecture 14 Congestion Control Some images courtesy David Wetherall Animations by Nick McKeown and Guido Appenzeller The bad news and the good news The bad news: new

More information