Overview Queueing Disciplines TCP Congestion Control Congestion Avoidance Mechanisms Quality of Service

Size: px
Start display at page:

Download "Overview Queueing Disciplines TCP Congestion Control Congestion Avoidance Mechanisms Quality of Service"

Transcription

1 Cogestio Cotrol Overview Queueig Disciplies TCP Cogestio Cotrol Cogestio Avoidace Mechaisms Quality of Service Sprig 2018 CS 438 Staff - Uiversity of Illiois 1

2 Today s Topic: Vacatios Sa Fracisco Moterey Plaig a vacatio? Try a trip to sceic Moterey, Califoria! Moterey is a mere 3 hops from UIUC. What happeed? Sorry, FLIGHT OVERBOOKED. Please fly agai! Chicago UIUC Sprig 2018 CS 438 Staff - Uiversity of Illiois 2

3 Cogestio Cotrol readig: Peterso ad Davie, Ch. 6 Basics: Problem, termiology, approaches, metrics Solutios Router-based: queueig disciplies Host-based: TCP cogestio cotrol Cogestio avoidace DECbit RED gateways Quality of service Sprig 2018 CS 438 Staff - Uiversity of Illiois 3

4 Cogestio Cotrol Basics Problem Demad for etwork resources ca grow beyod the resources available Wat to provide fair amout to each user Examples Badwidth betwee Chicago ad Sa Fracisco Badwidth i a etwork lik Buffers i a queue Sprig 2018 CS 438 Staff - Uiversity of Illiois 4

5 Cogestio Collapse Defiitio Icrease i etwork load results i decrease of useful work doe May possible causes Spurious retrasmissios of packets still i flight Classical cogestio collapse Solutio: better timers ad TCP cogestio cotrol Udelivered packets Packets cosume resources ad are dropped elsewhere i etwork Solutio: cogestio cotrol for ALL traffic Sprig 2018 CS 438 Staff - Uiversity of Illiois 5

6 Dealig with Cogestio Rage of solutios Cogestio cotrol Cure cogestio whe it happes Cogestio avoidace Predict whe cogestio might occur ad avoid causig it Resource allocatio Prevet cogestio from occurrig Model of etwork Packet-switched iteretwork (or etwork) Coectioless flows (logical chaels/coectios) betwee hosts Sprig 2018 CS 438 Staff - Uiversity of Illiois 6

7 Cogestio Cotrol Goal Effective ad fair allocatio of resources amog a collectio of competig users Learig whe to say o ad to whom Resources Badwidth Buffers Problem Cotetio at routers causes packet loss Sprig 2018 CS 438 Staff - Uiversity of Illiois 7

8 Flow Cotrol vs. Cogestio Cotrol Flow cotrol Prevetig oe seder from overruig the capacity of a slow receiver Cogestio cotrol Prevetig a set of seders from overloadig the etwork! Sprig 2018 CS 438 Staff - Uiversity of Illiois 8

9 Cogestio is Natural Because Iteret traffic is bursty! If two packets arrive at the same time The ode ca oly trasmit oe ad either buffers or drops the other Sprig 2018 CS 438 Staff - Uiversity of Illiois 9

10 Cogestio is Natural Because Iteret traffic is bursty! If two packets arrive at the same time The ode ca oly trasmit oe ad either buffers or drops the other If may packets arrive i a short period of time The ode caot keep up with the arrivig traffic Causes delays, ad the buffer may evetually overflow Sprig 2018 CS 438 Staff - Uiversity of Illiois 10

11 Load ad Delay Typical behavior of queueig systems with bursty arrivals: Ideal: low delays ad high utilizatio Reality: must balace the two Maximizig power is a example Load Power = Delay Average Packet delay Power Load optimal load Load Sprig 2018 CS 438 Staff - Uiversity of Illiois 11

12 Basic Desig Choices Prevetio or Cure? Pre-allocate resources to avoid cogestio Sed data ad cotrol cogestio if ad whe it occurs Possible implemetatio poits Hosts at the edge of the etwork Trasport protocol Routers iside the etwork Queueig disciplies Uderlyig service model Best effort vs. quality of service (QoS) Sprig 2018 CS 438 Staff - Uiversity of Illiois 12

13 Flows Sequece of packets set betwee source/destiatio pair Similar to ed-to-ed abstractio of chael, but see at routers Maitai per-flow soft state at the routers Source 1 Source 2 Source 3 Router Router Router Destiatio 1 Destiatio 2 Sprig 2018 CS 438 Staff - Uiversity of Illiois 13

14 Router State Soft state: Hard state: Iformatio about flows Helps cotrol cogestio state used to support routig Not ecessary for correct routig Source 1 Router Source 2 Router Destiatio 1 Source 3 Router Destiatio 2 Sprig 2018 CS 438 Staff - Uiversity of Illiois 14

15 Cogestio Cotrol Router role Cotrols forwardig ad droppig policies Ca sed feedback to source Host role Moitors etwork coditios Adjusts accordigly Routig vs. cogestio Effective adaptive routig schemes ca sometimes help cogestio But ot always Sprig 2018 CS 438 Staff - Uiversity of Illiois 15

16 Cogestio Cotrol Taxoomy cogestio cotrol feedback-based implicit feedback, implemeted by hosts, cotrolled by widow abstractio, a.k.a. best effort reservatio-based, implemeted by routers, cotrolled by rate, a.k.a. quality of service/qos explicit feedback, implemeted by routers, but ot per flow why? Sprig 2018 CS 438 Staff - Uiversity of Illiois 16

17 Router-Cetric vs. Host- Cetric Flow Cotrol Router-cetric Host-cetric Each router takes resposibility for decidig Whe packets are forwarded Which packets are to be dropped Hosts observe etwork coditios ad adjust their behavior accordigly Iformig hosts of sedig limitatios Sprig 2018 CS 438 Staff - Uiversity of Illiois 17

18 Reservatio-Based vs. Feedback-Based Flow Cotrol Reservatio-based Ed host asks etwork for capacity at flow establishmet time Routers alog flow s route allocate appropriate resources If resources are ot available, flow is rejected Implies the use of router-cetric mechaisms Feedback-based Ed host begis sedig without askig for capacity Ed host adjusts sedig rate accordig to feedback Explicit vs. implicit feedback mechaisms May use router-cetric (explicit) or host-cetric (implicit) mechaisms Sprig 2018 CS 438 Staff - Uiversity of Illiois 18

19 Per-flow Cogestio Feedback Questio Why is explicit per-flow cogestio feedback from routers rarely used i practice? Sprig 2018 CS 438 Staff - Uiversity of Illiois 19

20 Per-flow Cogestio Feedback Problem Too may sources to track Millios of flows may fa i to oe router Ca t sed feedback to all of them Adds complexity to router Need to track more state Certaily ca t track state for all sources Wastes badwidth: etwork already cogested, ot the time to geerate more traffic Ca t force the sources (hosts) to use feedback Sprig 2018 CS 438 Staff - Uiversity of Illiois 20

21 Widow-based vs. Rate-based Flow Cotrol Remember Give a RTT ad widow size W, log term throughput rate is Rate = mi(lik speed, W/RTT) Sice rate ca be cotrolled by the widow size, is there really ay differece betwee cotrollig the widow size ad cotrollig the rate? Rate W Sprig 2018 CS 438 Staff - Uiversity of Illiois 21

22 Rate Cotrol Questio Why cosider rate cotrol? Problems Buffer space (widow size) is a itrisic physical quatity Ca provide rate cotrol with widow cotrol Oly eed estimate of RTT 0 1 RTT 2 RTT Aswer Wat rate cotrol whe graularity of averagig must be smaller tha RTT widow-cotrolled trasmissios time rate-cotrolled trasmissios Sprig 2018 CS 438 Staff - Uiversity of Illiois 22

23 Criticisms of Resource Allocatio Example Divide 10 Gbps badwidth out of UIUC Case 1: reserve whatever you wat Users lie of thought Result O average, I do t eed much badwidth, but whe my persoal Web crawler goes to work, I eed at least 100 Mbps, so I ll reserve that much. 100 users cosume all badwidth, all others get 0 Sprig 2018 CS 438 Staff - Uiversity of Illiois 23

24 Criticisms of Resource Allocatio Example Divide 10 Gbps badwidth out of UIUC Case 2: fair/equitable reservatios 35,000 studets + 5,000 faculty ad staff Each user gets 250 kbps, almost 5x a modem! Sprig 2018 CS 438 Staff - Uiversity of Illiois 24

25 Resource Allocatio Back to the air travel aalogy Daily Chicago to Sa Fracisco flight, 198 seats Case 1: reserve whatever you wat 198 of us get seats. I m Gold...are you? Case 2: fair/equitable reservatios 2,000,000 possible customers seats per customer per flight Disclaimer: the passeger assumes all risks ad damages related to usuccessful reassembly i Chicago Sprig 2018 CS 438 Staff - Uiversity of Illiois 25

26 Widow Size For o-radom etwork with bottleeck capacity C: Source C Destiatio Rate = Throughput Delay C W RTT/2 W Power = throughput/delay RTT*C W Sprig 2018 CS 438 Staff - Uiversity of Illiois 27

27 Fairess Goals Allocate resources fairly Isolate ill-behaved users Still achieve statistical multiplexig Oe flow ca fill etire pipe if o coteders Work coservig à scheduler ever idles lik if it has a packet At what graularity? Flows, coectios, domais? Sprig 2018 CS 438 Staff - Uiversity of Illiois 28

28 What s Fair? Flow A Flow B Flow C Flow D Which is more fair: Globally Fair: Fa = Capacity/4, Fb = Fc = Fd = 3Capacity/4 or Locally Fair: Fa = Fb = Fc = Fd = Capacity/2 This is the socalled max-mi fair rate allocatio. The miimum rate is maximized. Sprig 2018 CS 438 Staff - Uiversity of Illiois 29

29 Max-Mi Fairess Flow A Flow B Flow C Flow D 1. No user receives more tha requested badwidth 2. No other scheme with 1 has higher mi badwidth 3. 2 remais true recursively o removig miimal user µ I = MIN(µ fair, r i ) Sprig 2018 CS 438 Staff - Uiversity of Illiois 30

30 Max-Mi Fairess: Example Capacity(C) = 10 3 Flows: r1 = 8, r2 = 6, r3 = 2 C/3 = 3.33 Ca service all of r3 Remove r3 from the accoutig: C = C r3 = 8; N = 2 C/2 = 4 Ca t service all of r1 or r2 So hold them to the remaiig fair share: f = Sprig 2018 CS 438 Staff - Uiversity of Illiois 31

31 Queueig Disciplies Goal Decide how packets are buffered while waitig to be trasmitted Provide protectio from ill-behaved flows Each router MUST implemet some queuig disciplie regardless of what the resource allocatio mechaism is Impact Directly impacts buffer space usage Idirectly impacts flow cotrol Sprig 2018 CS 438 Staff - Uiversity of Illiois 32

32 Queueig Disciplies Allocate badwidth Which packets get trasmitted Allocate buffer space Which packets get discarded Affect packet latecy Whe packets get trasmitted Sprig 2018 CS 438 Staff - Uiversity of Illiois 33

33 Schedulig Policies FIFO (First I First Out) a.k.a. FCFS (First Come First Serve) Service I order of arrival to the queue Maagemet Packets that arrive to a full buffer are discarded Aother optio: discard policy determies which packet to discard (ew arrival or somethig already queued) Sprig 2018 CS 438 Staff - Uiversity of Illiois 34

34 Schedulig Policies FIFO (First I First Out) Problem 1: sed more packets, get more service Selfish seders tryig to grab as much as they ca Malicious seders tryig to dey service to others Problem 2: ot all packets should be equal Sprig 2018 CS 438 Staff - Uiversity of Illiois 35

35 Schedulig Policies FIFO Does ot discrimiate betwee traffic sources Cogestio cotrol left to the sources Tail drop droppig policy Fairess for latecy Miimizes per-packet delay Badwidth ot cosidered (ot good for cogestio) Sprig 2018 CS 438 Staff - Uiversity of Illiois 36

36 Schedulig Policies Priority Queuig Classes have differet priorities May deped o explicit markig or other header ifo e.g., IP source or destiatio, TCP Port umbers, etc. Service Trasmit packet from highest priority class with a o-empty queue Sprig 2018 CS 438 Staff - Uiversity of Illiois 37

37 Schedulig Policies Priority Queuig Isolatio for the high-priority traffic Almost like it has a dedicated lik Except for the (small) delay for packet trasmissio High-priority packet arrives durig trasmissio of low-priority Router completes sedig the low-priority traffic first Sprig 2018 CS 438 Staff - Uiversity of Illiois 38

38 Schedulig Policies Priority Queueig Versios Preemptive Postpoe low-priority processig if high-priority packet arrives No-preemptive Limitatio Ay packet that starts gettig processed fiishes before movig o May starve lower priority flows Sprig 2018 CS 438 Staff - Uiversity of Illiois 39

39 Schedulig Policies Roud Robi Each flow gets its ow queue Circulate through queues, process oe packet (if queue o-empty), the move to ext queue Sprig 2018 CS 438 Staff - Uiversity of Illiois 40

40 Schedulig Policies Fair Queueig (FQ) Explicitly segregates traffic based o flows Esures o flow captures more tha its share of the capacity Fairess for badwidth Delay ot cosidered Flow 1 Flow 2 Flow 3 Flow 4 Roud- Robi service Each flow is guarateed ¼ of capacity Sprig 2018 CS 438 Staff - Uiversity of Illiois 41

41 Fair Queueig with Variable Packet Legth How should we implemet FQ if packets are ot all the same legth? Bit-by-bit roud-robi Not feasible to implemet, must use packet schedulig Solutio: approximate 4 8? Sprig 2018 CS 438 Staff - Uiversity of Illiois 42

42 Fair Queueig with Variable Packet Legth Idea Let S i = amout of service flow i has received so far Always serve a flow with miimum value of S i Ca also use miimum (S i + ext packet legth) Upo servig a packet of legth P from flow i, update: S i = S i + P Never leave the lik idle if there is a packet to sed Work coservig A source will gets its fair share of the badwidth Uused badwidth will be evely divided betwee other sources Sprig 2018 CS 438 Staff - Uiversity of Illiois 43

43 Fair Queueig with Variable Packet Legth Problem A flow resumes sedig packets after beig quiet for a log time Effect Such a flow could be cosidered to have saved up credit Ca lock out all other flows util credits are level agai Solutio Eforce use it or lose it policy Compute S mi = mi(s i such that queue i is ot empty) If queue j is empty, set S j = S mi Sprig 2018 CS 438 Staff - Uiversity of Illiois 44

44 Fair Queueig with Variable Packet Legth Problem A flow resumes sedig packets after beig quite for a log time Effect Note: The text book computes Such a flow could be cosidered F = MAX(F i-1 to, have A i ) = P saved i up credit Ad the for multiple flows Ca lock out all other flows Calculate util credits F i for are each level packet agai Solutio that arrives o each flow Eforce use it or lose it policy Treat all F i as timestamps Next packet to trasmit is oe Compute S mi = mi(s i such that queue i is ot empty) If queue j is empty, set S with j = S lowest timestamp mi Sprig 2018 CS 438 Staff - Uiversity of Illiois 45

45 Extesio: Weighted Fair Queueig Exted fair queueig Notio of importace for each flow Suppose flow i has weight w i Example: w i could be the fractio of total service that flow i is targeted for Need oly chage basic update to S i = S i + P/w i Sprig 2018 CS 438 Staff - Uiversity of Illiois 46

46 Fair Queuig Tradeoffs FQ ca cotrol cogestio by moitorig flows No-adaptive flows ca still be a problem why? Complex state Must keep queue per flow Hard i routers with may flows (e.g., backboe routers) Flow aggregatio is a possibility (e.g. do fairess per domai) Complex computatio Classificatio ito flows may be hard Must keep queues sorted by fiish times Chages wheever the flow cout chages Sprig 2018 CS 438 Staff - Uiversity of Illiois 47

47 Fair Queueig Questio What makes up a flow for fair queueig i the Iteret? Cosideratios Too may resources to have separate queues/variables for host-to-host flows Scale dow umber of flows Typically just based o iputs e.g., share outgoig STS-12 betwee icomig ISP s Sprig 2018 CS 438 Staff - Uiversity of Illiois 48

48 TCP Cogestio Cotrol Sprig 2018 CS 438 Staff - Uiversity of Illiois 49

49 Host Solutios Host has very little iformatio Assumes best-effort etwork Acts idepedetly of other hosts Host actios Reduce trasmissio rate below cogestio threshold Cotiuously moitor etwork for sigs of cogestio Sprig 2018 CS 438 Staff - Uiversity of Illiois 50

50 Detectig Cogestio How ca a TCP seder determie that the etwork is uder stress? Network could tell it (ICMP Source Quech) Risky, because durig times of overload the sigal itself could be dropped (ad add to cogestio)! Packet delays go up (kee of load-delay curve) Tricky: oisy sigal (delay ofte varies cosiderably) Packet loss Fail-safe sigal that TCP already has to detect Complicatio: o-cogestive loss (checksum errors) Sprig 2018 CS 438 Staff - Uiversity of Illiois 51

51 TCP Cogestio Cotrol Idea Assumes best-effort etwork FIFO or FQ Each source determies etwork capacity for itself Implicit feedback ACKs pace trasmissio (self-clockig) Challege Determiig iitial available capacity Adjustig to chages i capacity i a timely maer Sprig 2018 CS 438 Staff - Uiversity of Illiois 52

52 TCP Cogestio Cotrol Basic idea Add otio of cogestio widow Effective widow is smaller of Advertised widow (flow cotrol) Cogestio widow (cogestio cotrol) Chages i cogestio widow size Slow icreases to absorb ew badwidth Quick decreases to elimiate cogestio Sprig 2018 CS 438 Staff - Uiversity of Illiois 53

53 TCP Cogestio Cotrol Specific strategy Self-clockig Sed data oly whe outstadig data ACK d Equivalet to sed widow limitatio metioed seder receiver Sprig 2018 CS 438 Staff - Uiversity of Illiois 54

54 TCP Cogestio Cotrol Specific strategy Self-clockig Growth Sed data oly whe outstadig data ACK d Equivalet to sed widow limitatio metioed Add oe maximum segmet size (MSS) per cogestio widow of data ACK d It s really doe this way, at least i Liux: see tcp_cog_avoid i tcp_iput.c. Actually, every ack for ew data is treated as a MSS ACK d Kow as additive icrease Sprig 2018 CS 438 Staff - Uiversity of Illiois 55

55 TCP Cogestio Cotrol Specific strategy (cotiued) Decrease Cut widow i half whe timeout occurs I practice, set widow = widow /2 Kow as multiplicative decrease Additive icrease, multiplicative decrease (AIMD) Sprig 2018 CS 438 Staff - Uiversity of Illiois 56

56 Additive Icrease/ Multiplicative Decrease Objective Adjust to chages i available capacity Basic idea Cosequeces of over-sized widow much worse tha havig a uder-sized widow Over-sized widow: packets dropped ad retrasmitted Uder-sized widow: somewhat lower throughput Sprig 2018 CS 438 Staff - Uiversity of Illiois 57

57 Additive Icrease/ Multiplicative Decrease Tools React to observace of cogestio Probe chael to detect more resources Observatio O otice of cogestio Decreasig too slowly will ot be reactive eough O probe of etwork Icreasig too quickly will overshoot limits Sprig 2018 CS 438 Staff - Uiversity of Illiois 58

58 Additive Icrease/ Multiplicative Decrease New TCP state variable CogestioWidow Similar to AdvertisedWidow for flow cotrol Limits how much data source ca have i trasit MaxWi = MIN(CogestioWidow, AdvertisedWidow) EffWi = MaxWi - (LastByteSet - LastByteAcked) TCP ca sed o faster the the slowest compoet, etwork or destiatio Idea Icrease CogestioWidow whe cogestio goes dow Decrease CogestioWidow whe cogestio goes up Sprig 2018 CS 438 Staff - Uiversity of Illiois 59

59 Additive Icrease/ Multiplicative Decrease Questio How does the source determie whether or ot the etwork is cogested? Aswer Timeout sigals packet loss Packet loss is rarely due to trasmissio error (o wired lies) Lost packet implies cogestio! Sprig 2018 CS 438 Staff - Uiversity of Illiois 60

60 Additive Icrease/ Multiplicative Decrease Algorithm Icremet CogestioWidow by oe packet per RTT Liear icrease Divide CogestioWidow by two wheever a timeout occurs I practice Multiplicative decrease icremet a little for each ACK Ic = MSS * MSS/CogestioWidow CogestioWidow += Ic Source Destiatio Sprig 2018 CS 438 Staff - Uiversity of Illiois 61

61 AIMD Sawtooth Trace KB Packet loss is see as sig of cogestio ad results i a multiplicative rate decrease Factor of 2 TCP periodically probes for available badwidth by icreasig its rate Loss halved Time (secods) 10.0 Sprig 2018 CS 438 Staff - Uiversity of Illiois 62

62 Additive Icrease/Decrease Both icrease/ decrease by the same amout User 2 s Allocatio T 0 T 1 Overload Additive icrease improves fairess Uderutilizatio Additive decrease reduces fairess User 1 s Allocatio Sprig 2018 CS 438 Staff - Uiversity of Illiois 64

63 Muliplicative Icrease/Decrease Both icrease/ decrease by the same amout User 2 s Allocatio T 0 T 1 Uderutilizatio Overload Additive icrease improves fairess Additive decrease reduces fairess User 1 s Allocatio Sprig 2018 CS 438 Staff - Uiversity of Illiois 65

64 Why is AIMD Fair? Additive icrease gives slope of 1, as throughout icreases Multiplicative decrease decreases throughput proportioally User 2 s Allocatio R equal badwidth share User 1 s Allocatio loss: decrease widow by factor of 2 cogestio avoidace: additive icrease loss: decrease widow by factor of 2 cogestio avoidace: additive icrease R Sprig 2018 CS 438 Staff - Uiversity of Illiois 66

65 AIMD Sharig Dyamics A D x 1 x 2 No cogestio à rate icreases by oe packet/rtt every RTT Cogestio à decrease rate by factor 2 B E Sprig 2018 CS 438 Staff - Uiversity of Illiois 67

66 AIMD Sharig Dyamics A D x 1 x 2 B E Rates equalize à fair share Sprig 2018 CS 438 Staff - Uiversity of Illiois 68

67 TCP Start Up Behavior KB How should TCP start sedig data? AIMD is good for chaels operatig at capacity AIMD ca take a log time to ramp up to full capacity from scratch It could take a log time to get started! Time (secods) 10.0 Sprig 2018 CS 438 Staff - Uiversity of Illiois 69

68 TCP Start Up Behavior How should TCP start sedig data? AIMD is good for chaels operatig at capacity AIMD ca take a log time to ramp up to full capacity from scratch Use Slow Start to icrease widow rapidly from a cold start Sprig 2018 CS 438 Staff - Uiversity of Illiois 70

69 TCP Start Up Behavior: Slow Start Iitializatio of the cogestio widow Cogestio widow should start small Avoid cogestio due to ew coectios Start at 1 MSS, Iitially, CWND is 1 MSS Iitial sedig rate is MSS/RTT Reset to 1 MSS with each timeout timeouts are coarse-graied, ~1/2 sec Sprig 2018 CS 438 Staff - Uiversity of Illiois 71

70 TCP Start Up Behavior: Slow Start Growth of the cogestio widow Liear growth could be pretty wasteful Might be much less tha the actual badwidth Liear icrease takes a log time to accelerate Start slow but the grow fast Seder starts at a slow rate Icrease the rate expoetially Util the first loss evet Sprig 2018 CS 438 Staff - Uiversity of Illiois 72

71 Slow Start Objective Determie iitial available capacity Idea Begi with CogestioWidow = 1 packet Double CogestioWidow each RTT Icremet by 1 packet for each ACK Cotiue icreasig util loss Source Destiatio Sprig 2018 CS 438 Staff - Uiversity of Illiois 73

72 Slow Start Example 0R 1R 2R 3R 1 oe pkt time Sprig 2018 CS 438 Staff - Uiversity of Illiois 74

73 Aother Slow Start Example CWD size: Src D A D D A A D D D D A A A A Dest Sprig 2018 CS 438 Staff - Uiversity of Illiois 75

74 Slow Start Used Whe first startig coectio Whe coectio times out Why is it called slow-start? Because TCP origially had o cogestio cotrol mechaism The source would just start by sedig a whole widow s worth of data Sprig 2018 CS 438 Staff - Uiversity of Illiois 76

75 TCP Cogestio Cotrol Maitai threshold widow size Threshold value Iitially set to maximum widow size Set to 1/2 of curret widow o timeout Use multiplicative icrease I practice Whe cogestio widow smaller tha threshold Double widow for each widow ACK d Icrease cogestio widow by oe MSS for each ACK of ew data (or N bytes for N bytes) Sprig 2018 CS 438 Staff - Uiversity of Illiois 77

76 Slow Start How log should the expoetial icrease from slow start cotiue? Use CogestioThreshold as target widow size Estimates etwork capacity Whe CogestioWidow reaches CogestioThreshold switch to additive icrease Liear probig Expoetial slow start Sprig 2018 CS 438 Staff - Uiversity of Illiois 78

77 Slow Start Iitial values CogestioThreshold = 8 CogestioWidow = 1 Loss after trasmissio 7 CogestioWidow curretly 12 Set Cogestiothreshold = CogestioWidow/2 Set CogestioWidow = 1 Sprig 2018 CS 438 Staff - Uiversity of Illiois 79

78 Slow Start Example trace of CogestioWidow KB Problem Have to wait for timeout CW flattes out due to loss Liear icrease Slow start util CW = CT Timeout: CT = CT/2 = 11 CW = 1 Ca lose half CogestioWidow of data Sprig 2018 CS 438 Staff - Uiversity of Illiois 80

79 Fast Retrasmit ad Fast Recovery Problem Coarse-grai TCP timeouts lead to idle periods Solutio Fast retrasmit: use duplicate ACKs to trigger retrasmissio Packet 1 Packet 2 Packet 3 Packet 4 Packet 5 Packet 6 Retrasmit packet 3 Seder Receiver Sprig 2018 CS 438 Staff - Uiversity of Illiois 81 ACK 1 ACK 2 ACK 2 ACK 2 ACK 2 ACK 6

80 Fast Retrasmit ad Fast Recovery Sed ACK for each segmet received Whe duplicate ACK s received Resed lost segmet immediately Do ot wait for timeout I practice, retrasmit o 3rd duplicate Fast recovery Whe fast retrasmissio occurs, skip slow start Cogestio widow becomes 1/2 previous Start additive icrease immediately Sprig 2018 CS 438 Staff - Uiversity of Illiois 82

81 Fast Retrasmit ad Fast Recovery KB Results Fast Recovery Bypass slow start phase Icrease immediately to oe half last successful CogestioWidow (ssthresh) Sprig 2018 CS 438 Staff - Uiversity of Illiois 83

82 TCP Cogestio Widow Trace Cogestio Widow timeouts fast retrasmissio slow start period additive icrease Time threshold cogestio widow Sprig 2018 CS 438 Staff - Uiversity of Illiois 84

Traditional queuing behaviour in routers. Scheduling and queue management. Questions. Scheduling mechanisms. Scheduling [1] Scheduling [2]

Traditional queuing behaviour in routers. Scheduling and queue management. Questions. Scheduling mechanisms. Scheduling [1] Scheduling [2] Traditioal queuig behaviour i routers Schedulig ad queue maagemet Data trasfer: datagrams: idividual packets o recogitio of flows coectioless: o sigallig Forwardig: based o per-datagram, forwardig table

More information

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1 Quality of Service Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Quality of Service How good are late data ad lowthroughput chaels? It depeds o the applicatio. Do you care if... Your e-mail takes 1/2

More information

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1 Switchig Hardware Sprig 208 CS 438 Staff, Uiversity of Illiois Where are we? Uderstad Differet ways to move through a etwork (forwardig) Read sigs at each switch (datagram) Follow a kow path (virtual circuit)

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved.

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved. Itroductio to Wireless & Mobile Systems Chapter 6 Multiple Radio Access 1 Outlie Itroductio Multiple Radio Access Protocols Cotetio-based Protocols Pure ALOHA Slotted ALOHA CSMA (Carrier Sese Multiple

More information

TCP Internals. Spring 2018 CS 438 Staff, University of Illinois 1

TCP Internals. Spring 2018 CS 438 Staff, University of Illinois 1 TCP Iterals Sprig 2018 CS 438 Staff, Uiversity of Illiois 1 TCP Usage Model Coectio setup 3-way hadshake Data trasport Seder writes data TCP Breaks data ito segmets Seds each segmet over IP Retrasmits,

More information

Media Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1

Media Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1 Media Access Protocols Sprig 2018 CS 438 Staff, Uiversity of Illiois 1 Where are We? you are here 00010001 11001001 00011101 A midterm is here Sprig 2018 CS 438 Staff, Uiversity of Illiois 2 Multiple Access

More information

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000. 5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator

More information

CS644 Advanced Networks

CS644 Advanced Networks Limitatios of IP CS644 Advaced Networks Lecture 7 QoS Adreas Terzis IP provides oly best effort service IP does ot participate i resource maagemet Caot provide service guaratees o a per flow basis Caot

More information

Congestion. Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets limited resources

Congestion. Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets limited resources Congestion Source 1 Source 2 10-Mbps Ethernet 100-Mbps FDDI Router 1.5-Mbps T1 link Destination Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets

More information

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 12: Virtual Memory Prof. Yajig Li Uiversity of Chicago A System with Physical Memory Oly Examples: most Cray machies early PCs Memory early all embedded systems

More information

Switch Construction CS

Switch Construction CS Switch Costructio CS 00 Workstatio-Based Aggregate badwidth /2 of the I/O bus badwidth capacity shared amog all hosts coected to switch example: Gbps bus ca support 5 x 00Mbps ports (i theory) I/O bus

More information

Congestion Control 3/16/09

Congestion Control 3/16/09 Congestion Control Outline Resource Allocation Queuing TCP Congestion Control Spring 009 CSE3064 Issues Two sides of the same coin pre-allocate resources so at to avoid congestion control congestion if

More information

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Part A Datapath Design

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Part A Datapath Design COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter The Processor Part A path Desig Itroductio CPU performace factors Istructio cout Determied by ISA ad compiler. CPI ad

More information

BGP Attributes and Path Selection. ISP Training Workshops

BGP Attributes and Path Selection. ISP Training Workshops BGP Attributes ad Path Selectio ISP Traiig Workshops 1 BGP Attributes The tools available for the job 2 What Is a Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes the characteristics

More information

Goals of Today s Lecture! Congestion Control! Course So Far.! Congestion Control Overview! It s Not Just The Sender & Receiver! Congestion is Natural!

Goals of Today s Lecture! Congestion Control! Course So Far.! Congestion Control Overview! It s Not Just The Sender & Receiver! Congestion is Natural! Goals of Today s Lecture! Congestion Control! EE 22: Intro to Communication Networks Fall 200 (MW 4-5:30 in 0 Barker) Scott Shenker TAs: Sameer Agarwal, Sara Alspaugh, Igor Ganichev, Prayag Narula http://inst.eecs.berkeley.edu/~ee22/

More information

Traffic Models and QoS

Traffic Models and QoS Traffic Models ad QoS TELE4642: Week9 Ackowledgemet: Some slides are adapted from Computer Networkig: A Top Dow Approach Featurig the Iteret, 2 d editio, J.F Kurose ad K.W. Ross All Rights Reserved, copyright

More information

IS-IS in Detail. ISP Workshops

IS-IS in Detail. ISP Workshops IS-IS i Detail ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 27 th November

More information

n Based on unrealistic growth forecast n Overcapacity: Fiber 5x100 in three years n Wireless: Expensive spectrum licenses n Fibers

n Based on unrealistic growth forecast n Overcapacity: Fiber 5x100 in three years n Wireless: Expensive spectrum licenses n Fibers EECS228a Research Topics Jea Walrad www.eecs.berkeley.edu/~wlr of Networks Walrad 52 of Networks Pricig of Services Competitio of Users Competitio of Providers Suggested Readigs: http://www.bgsu.edu/departmets/tcom/aota.htm

More information

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste Outline 15-441 Computer Networking Lecture 18 TCP Performance Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 TCP congestion avoidance TCP slow start TCP modeling TCP details 2 AIMD Distributed,

More information

Congestion Control. Queuing Discipline Reacting to Congestion Avoiding Congestion. Issues

Congestion Control. Queuing Discipline Reacting to Congestion Avoiding Congestion. Issues Congestion Control Outline Queuing Discipline Reacting to Congestion Avoiding Congestion Issues Two sides of the same coin pre-allocate resources to avoid congestion (e.g. telephone networks) control congestion

More information

CS CS COMPUTER NETWORKS CS CS CHAPTER 6. CHAPTER 6 Congestion Control

CS CS COMPUTER NETWORKS CS CS CHAPTER 6. CHAPTER 6 Congestion Control COMPUTER NETWORKS CS 45201 CS 55201 CHAPTER 6 Congestion Control COMPUTER NETWORKS CS 45201 CS 55201 CHAPTER 6 Congestion Control P. Farrell and H. Peyravi Department of Computer Science Kent State University

More information

ADVANCED COMPUTER NETWORKS

ADVANCED COMPUTER NETWORKS ADVANCED COMPUTER NETWORKS Congestion Control and Avoidance 1 Lecture-6 Instructor : Mazhar Hussain CONGESTION CONTROL When one part of the subnet (e.g. one or more routers in an area) becomes overloaded,

More information

Using VTR Emulation on Avid Systems

Using VTR Emulation on Avid Systems Usig VTR Emulatio o Avid Systems VTR emulatio allows you to cotrol a sequece loaded i the Record moitor from a edit cotroller for playback i the edit room alog with other sources. I this sceario the edit

More information

A New per-class Flow Fixed Proportional Differentiated Service for Multi-service Wireless LAN*

A New per-class Flow Fixed Proportional Differentiated Service for Multi-service Wireless LAN* A New per-class Flow Fixed Proportioal Differetiated Service for Multi-service Wireless LAN* Meg Chag Che, Li-Pig Tug 2, Yeali S. Su 3, ad Wei-Kua Shih 2 Istitute of Iformatio Sciece, Academia Siica, Taipei,

More information

CS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control

CS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control : Computer Networks Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control TCP performance We ve seen how TCP the protocol works Sequencing, receive window, connection setup and teardown And

More information

15-744: Computer Networking TCP

15-744: Computer Networking TCP 15-744: Computer Networking TCP Congestion Control Congestion Control Assigned Reading [Jacobson and Karels] Congestion Avoidance and Control [TFRC] Equation-Based Congestion Control for Unicast Applications

More information

CS200: Hash Tables. Prichard Ch CS200 - Hash Tables 1

CS200: Hash Tables. Prichard Ch CS200 - Hash Tables 1 CS200: Hash Tables Prichard Ch. 13.2 CS200 - Hash Tables 1 Table Implemetatios: average cases Search Add Remove Sorted array-based Usorted array-based Balaced Search Trees O(log ) O() O() O() O(1) O()

More information

Lecture 10 Collision resolution. Collision resolution

Lecture 10 Collision resolution. Collision resolution Lecture 10 Collisio resolutio Collisio resolutio May applicatios ivolve a iquiry over a shared chael, which ca be ivoked for: discovery of eighborig devices i ad hoc etworks, coutig the umber of RFID tags

More information

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Single-Cycle Disadvantages & Advantages

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Single-Cycle Disadvantages & Advantages COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 4 The Processor Pipeliig Sigle-Cycle Disadvatages & Advatages Clk Uses the clock cycle iefficietly the clock cycle must

More information

Bandwidth Allocation & TCP

Bandwidth Allocation & TCP Bandwidth Allocation & TCP The Transport Layer Focus Application Presentation How do we share bandwidth? Session Topics Transport Network Congestion control & fairness Data Link TCP Additive Increase/Multiplicative

More information

Congestion Control. Resource allocation and congestion control problem

Congestion Control. Resource allocation and congestion control problem Congestion Control 188lecture8.ppt Pirkko Kuusela 1 Resource allocation and congestion control problem Problem 1: Resource allocation How to effectively and fairly allocate resources among competing users?

More information

TCP Congestion Control : Computer Networking. Introduction to TCP. Key Things You Should Know Already. Congestion Control RED

TCP Congestion Control : Computer Networking. Introduction to TCP. Key Things You Should Know Already. Congestion Control RED TCP Congestion Control 15-744: Computer Networking L-4 TCP Congestion Control RED Assigned Reading [FJ93] Random Early Detection Gateways for Congestion Avoidance [TFRC] Equation-Based Congestion Control

More information

Greedy Algorithms. Interval Scheduling. Greedy Algorithms. Interval scheduling. Greedy Algorithms. Interval Scheduling

Greedy Algorithms. Interval Scheduling. Greedy Algorithms. Interval scheduling. Greedy Algorithms. Interval Scheduling Greedy Algorithms Greedy Algorithms Witer Paul Beame Hard to defie exactly but ca give geeral properties Solutio is built i small steps Decisios o how to build the solutio are made to maximize some criterio

More information

CS 111: Program Design I Lecture 19: Networks, the Web, and getting text from the Web in Python

CS 111: Program Design I Lecture 19: Networks, the Web, and getting text from the Web in Python CS 111: Program Desig I Lecture 19: Networks, the Web, ad gettig text from the Web i Pytho Robert H. Sloa & Richard Warer Uiversity of Illiois at Chicago April 3, 2018 Goals Lear about Iteret Lear about

More information

Message Integrity and Hash Functions. TELE3119: Week4

Message Integrity and Hash Functions. TELE3119: Week4 Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig

More information

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,

More information

Congestion Control in TCP

Congestion Control in TCP Congestion Control in TCP Outline Overview of RENO TCP Reacting to Congestion SS/AIMD example CS 640 1 TCP Congestion Control The idea of TCP congestion control is for each source to determine how much

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

TRANSACTION MANAGEMENT [CH 16]

TRANSACTION MANAGEMENT [CH 16] Sprig 2017 TRANSACTION MANAGEMENT [CH 16] 4/25/17 CS 564: Database Maagemet Systems; (c) Jigesh M. Patel, 2013 1 Trasactio Maagemet Read (A); Check (A > $25); Pay ($25); A = A 25; Write (A); Yes You Read

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5 Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:

More information

Copyright 2010, Elsevier Inc. All rights Reserved

Copyright 2010, Elsevier Inc. All rights Reserved Computer Networks: A Systems Approach, 5e Larry L. Peterso ad Bruce S. Davie (Subset of topics) Gettig Coected Framig Error Detectio. Reliable Trasmissio Sharig: Etheret ad Multiple Access Networks, Wireless

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5.

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5. Morga Kaufma Publishers 26 February, 208 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Virtual Memory Review: The Memory Hierarchy Take advatage of the priciple

More information

Computer Networking. Queue Management and Quality of Service (QOS)

Computer Networking. Queue Management and Quality of Service (QOS) Computer Networking Queue Management and Quality of Service (QOS) Outline Previously:TCP flow control Congestion sources and collapse Congestion control basics - Routers 2 Internet Pipes? How should you

More information

Introduction to OSPF. ISP Training Workshops

Introduction to OSPF. ISP Training Workshops Itroductio to OSPF ISP Traiig Workshops 1 OSPF p Ope Shortest Path First p Lik state or SPF techology p Developed by OSPF workig group of IETF (RFC 1247) p OSPFv2 stadard described i RFC2328 p Desiged

More information

Introduction to Network Technologies & Layered Architecture BUPT/QMUL

Introduction to Network Technologies & Layered Architecture BUPT/QMUL Itroductio to Network Techologies & Layered Architecture BUPT/QMUL 2018-3-12 Review What is the Iteret? How does it work? Whe & how did it come about? Who cotrols it? Where is it goig? 2 Ageda Basic Network

More information

CSE 123A Computer Networks

CSE 123A Computer Networks CSE 123A Computer Networks Winter 2005 Lecture 14 Congestion Control Some images courtesy David Wetherall Animations by Nick McKeown and Guido Appenzeller The bad news and the good news The bad news: new

More information

Lecture 14: Congestion Control"

Lecture 14: Congestion Control Lecture 14: Congestion Control" CSE 222A: Computer Communication Networks George Porter Thanks: Amin Vahdat, Dina Katabi and Alex C. Snoeren Lecture 14 Overview" TCP congestion control review Dukkipati

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

COSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1

COSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1 COSC 1P03 Ch 7 Recursio Itroductio to Data Structures 8.1 COSC 1P03 Recursio Recursio I Mathematics factorial Fiboacci umbers defie ifiite set with fiite defiitio I Computer Sciece sytax rules fiite defiitio,

More information

Information Network 1 Transport layer: TCP. Youki Kadobayashi Doudou Fall NAIST

Information Network 1 Transport layer: TCP. Youki Kadobayashi Doudou Fall NAIST Iformatio Network 1 Trasport layer: TCP Youki Kadobayashi Doudou Fall NAIST Trasport layer: a birds-eye view Hosts maitai state for each trasport-layer edpoit Routers do t maitai per-host state H R R R

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 21 Cocurrecy Cotrol Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Cocurrecy cotrol protocols Set of rules to guaratee

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

Firewall and IDS. TELE3119: Week8

Firewall and IDS. TELE3119: Week8 Firewall ad IDS TELE3119: Week8 Outlie Firewalls Itrusio Detectio Systems (IDSs) Itrusio Prevetio Systems (IPSs) 8-2 Example Attacks Disclosure, modificatio, ad destructio of data Compromise a host ad

More information

Course Information. Details. Topics. Network Examples. Overview. Walrand Lecture 1. EECS 228a. EECS 228a Lecture 1 Overview: Networks

Course Information. Details. Topics. Network Examples. Overview. Walrand Lecture 1. EECS 228a. EECS 228a Lecture 1 Overview: Networks Walrad Lecture 1 Course Iformatio Lecture 1 Overview: Networks Jea Walrad www.eecs.berkeley.edu/~wlr Istructor: Jea Walrad Office Hours: M-Tu 1:00-2:00 Time/Place: MW 2:00-3:30 i 285 Cory Home Page: http://wwwist.eecs.berkeley.edu/~ee228a

More information

History Based Probabilistic Backoff Algorithm

History Based Probabilistic Backoff Algorithm America Joural of Egieerig ad Applied Scieces, 2012, 5 (3), 230-236 ISSN: 1941-7020 2014 Rajagopala ad Mala, This ope access article is distributed uder a Creative Commos Attributio (CC-BY) 3.0 licese

More information

Flow and Congestion Control

Flow and Congestion Control CE443 Computer Networks Flow and Congestion Control Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

CS551 Router Queue Management

CS551 Router Queue Management CS551 Router Queue Management Bill Cheng http://merlot.usc.edu/cs551-f12 1 Congestion Control vs. Resource Allocation Network s key role is to allocate its transmission resources to users or applications

More information

Multi-Threading. Hyper-, Multi-, and Simultaneous Thread Execution

Multi-Threading. Hyper-, Multi-, and Simultaneous Thread Execution Multi-Threadig Hyper-, Multi-, ad Simultaeous Thread Executio 1 Performace To Date Icreasig processor performace Pipeliig. Brach predictio. Super-scalar executio. Out-of-order executio. Caches. Hyper-Threadig

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19 CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

Lecture 21: Congestion Control" CSE 123: Computer Networks Alex C. Snoeren

Lecture 21: Congestion Control CSE 123: Computer Networks Alex C. Snoeren Lecture 21: Congestion Control" CSE 123: Computer Networks Alex C. Snoeren Lecture 21 Overview" How fast should a sending host transmit data? Not to fast, not to slow, just right Should not be faster than

More information

Recursive Procedures. How can you model the relationship between consecutive terms of a sequence?

Recursive Procedures. How can you model the relationship between consecutive terms of a sequence? 6. Recursive Procedures I Sectio 6.1, you used fuctio otatio to write a explicit formula to determie the value of ay term i a Sometimes it is easier to calculate oe term i a sequece usig the previous terms.

More information

Lecture 21. Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov.

Lecture 21. Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov. Lecture 21 Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov. 7 http://money.cnn.com/2011/11/07/technology/juniper_internet_outage/

More information

Our Learning Problem, Again

Our Learning Problem, Again Noparametric Desity Estimatio Matthew Stoe CS 520, Sprig 2000 Lecture 6 Our Learig Problem, Agai Use traiig data to estimate ukow probabilities ad probability desity fuctios So far, we have depeded o describig

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

Threads and Concurrency in Java: Part 1

Threads and Concurrency in Java: Part 1 Cocurrecy Threads ad Cocurrecy i Java: Part 1 What every computer egieer eeds to kow about cocurrecy: Cocurrecy is to utraied programmers as matches are to small childre. It is all too easy to get bured.

More information

Investigation Monitoring Inventory

Investigation Monitoring Inventory Ivestigatio Moitorig Ivetory Name Period Date Art Smith has bee providig the prits of a egravig to FieArt Gallery. He plas to make just 2000 more prits. FieArt has already received 70 of Art s prits. The

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets Throughput-Delay Scalig i Wireless Networks with Costat-Size Packets Abbas El Gamal, James Mamme, Balaji Prabhakar, Devavrat Shah Departmets of EE ad CS Staford Uiversity, CA 94305 Email: {abbas, jmamme,

More information

Threads and Concurrency in Java: Part 1

Threads and Concurrency in Java: Part 1 Threads ad Cocurrecy i Java: Part 1 1 Cocurrecy What every computer egieer eeds to kow about cocurrecy: Cocurrecy is to utraied programmers as matches are to small childre. It is all too easy to get bured.

More information

15-859E: Advanced Algorithms CMU, Spring 2015 Lecture #2: Randomized MST and MST Verification January 14, 2015

15-859E: Advanced Algorithms CMU, Spring 2015 Lecture #2: Randomized MST and MST Verification January 14, 2015 15-859E: Advaced Algorithms CMU, Sprig 2015 Lecture #2: Radomized MST ad MST Verificatio Jauary 14, 2015 Lecturer: Aupam Gupta Scribe: Yu Zhao 1 Prelimiaries I this lecture we are talkig about two cotets:

More information

TCP Congestion Control

TCP Congestion Control TCP Congestion Control Lecture material taken from Computer Networks A Systems Approach, Third Ed.,Peterson and Davie, Morgan Kaufmann, 2003. Computer Networks: TCP Congestion Control 1 TCP Congestion

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 22 Database Recovery Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Recovery algorithms Recovery cocepts Write-ahead

More information

CMSC Computer Architecture Lecture 11: More Caches. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 11: More Caches. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 11: More Caches Prof. Yajig Li Uiversity of Chicago Lecture Outlie Caches 2 Review Memory hierarchy Cache basics Locality priciples Spatial ad temporal How to access

More information

27 Refraction, Dispersion, Internal Reflection

27 Refraction, Dispersion, Internal Reflection Chapter 7 Refractio, Dispersio, Iteral Reflectio 7 Refractio, Dispersio, Iteral Reflectio Whe we talked about thi film iterferece, we said that whe light ecouters a smooth iterface betwee two trasparet

More information

Chapter III: Transport Layer

Chapter III: Transport Layer Chapter III: Transport Layer UG3 Computer Communications & Networks (COMN) Mahesh Marina mahesh@ed.ac.uk Slides thanks to Myungjin Lee and copyright of Kurose and Ross Principles of congestion control

More information

The isoperimetric problem on the hypercube

The isoperimetric problem on the hypercube The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose

More information

Computer Networking Introduction

Computer Networking Introduction Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.11 Chapter 3 outline 3.1 transport-layer services 3.2 multiplexing and

More information

TCP Congestion Control. Housekeeping. Additive Increase/Multiplicative Decrease. AIMD (cont) Pick up folders for exam study Exam next Friday, Nov.

TCP Congestion Control. Housekeeping. Additive Increase/Multiplicative Decrease. AIMD (cont) Pick up folders for exam study Exam next Friday, Nov. Fall 01 CptS/EE 555 3 Fall 01 CptS/EE 555 4 TCP Congestion Control Idea assumes best-effort network (FIFO or FQ routers)each source determines network capacity for itself uses implicit feedback ACKs pace

More information

Term Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager.

Term Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager. CS2310 Fial Project Loghao Li Term Project Report Itroductio I this project, I worked o expadig exercise 4. What I focused o is makig the real gesture recogizig sesor ad desig proper gestures ad recogizig

More information

Analyzing the Impact of Queue Management Policies on the Self-Similarity of Aggregate Network Traffic

Analyzing the Impact of Queue Management Policies on the Self-Similarity of Aggregate Network Traffic Aalyzig the Impact of Queue Maagemet Policies o the Self-Similarity of Aggregate Network Traffic MELİKE EROL 1, SEMA OKTUĞ 1, TAYFUN AKGÜL 2 Dept. of Computer Egieerig 1, Dept. of Electroics ad Commuicatios

More information

Principles of congestion control

Principles of congestion control Principles of congestion control Congestion: Informally: too many sources sending too much data too fast for network to handle Different from flow control! Manifestations: Lost packets (buffer overflow

More information

CS 683: Advanced Design and Analysis of Algorithms

CS 683: Advanced Design and Analysis of Algorithms CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,

More information

Transitioning to BGP

Transitioning to BGP Trasitioig to BGP ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 24 th April

More information

CS 111: Program Design I Lecture 21: Network Analysis. Robert H. Sloan & Richard Warner University of Illinois at Chicago April 10, 2018

CS 111: Program Design I Lecture 21: Network Analysis. Robert H. Sloan & Richard Warner University of Illinois at Chicago April 10, 2018 CS 111: Program Desig I Lecture 21: Network Aalysis Robert H. Sloa & Richard Warer Uiversity of Illiois at Chicago April 10, 2018 NETWORK ANALYSIS Which displays a graph i the sese of graph/etwork aalysis?

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

Chapter 3 Transport Layer

Chapter 3 Transport Layer Chapter 3 Transport Layer 1 Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer 3.5 Connection-oriented

More information

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana The Closest Lie to a Data Set i the Plae David Gurey Southeaster Louisiaa Uiversity Hammod, Louisiaa ABSTRACT This paper looks at three differet measures of distace betwee a lie ad a data set i the plae:

More information

Solution printed. Do not start the test until instructed to do so! CS 2604 Data Structures Midterm Spring, Instructions:

Solution printed. Do not start the test until instructed to do so! CS 2604 Data Structures Midterm Spring, Instructions: CS 604 Data Structures Midterm Sprig, 00 VIRG INIA POLYTECHNIC INSTITUTE AND STATE U T PROSI M UNI VERSI TY Istructios: Prit your ame i the space provided below. This examiatio is closed book ad closed

More information

Guaranteeing Hard Real Time End-to-End Communications Deadlines

Guaranteeing Hard Real Time End-to-End Communications Deadlines Guarateeig Hard Real Time Ed-to-Ed Commuicatios Deadlies K. W. Tidell A. Burs A. J. Welligs Real Time Systems Research Group Departmet of Computer Sciece Uiversity of York e-mail: ke@mister.york.ac.uk

More information

Threads and Concurrency in Java: Part 2

Threads and Concurrency in Java: Part 2 Threads ad Cocurrecy i Java: Part 2 1 Waitig Sychroized methods itroduce oe kid of coordiatio betwee threads. Sometimes we eed a thread to wait util a specific coditio has arise. 2003--09 T. S. Norvell

More information

Optimization of Priority based CPU Scheduling Algorithms to Minimize Starvation of Processes using an Efficiency Factor

Optimization of Priority based CPU Scheduling Algorithms to Minimize Starvation of Processes using an Efficiency Factor Iteratioal Joural of Computer Applicatios (97 8887) Volume 132 No.11, December21 Optimizatio of based CPU Schedulig Algorithms to Miimize Starvatio of Processes usig a Efficiecy Factor Muhammad A. Mustapha

More information

Data diverse software fault tolerance techniques

Data diverse software fault tolerance techniques Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the

More information

Operating System Concepts. Operating System Concepts

Operating System Concepts. Operating System Concepts Chapter 4: Mass-Storage Systems Logical Disk Structure Logical Disk Structure Disk Schedulig Disk Maagemet RAID Structure Disk drives are addressed as large -dimesioal arrays of logical blocks, where the

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13

CIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13 CIS Data Structures ad Algorithms with Java Sprig 08 Stacks ad Queues Moday, February / Tuesday, February Learig Goals Durig this lab, you will: Review stacks ad queues. Lear amortized ruig time aalysis

More information

Outline. CSCI 4730 Operating Systems. Questions. What is an Operating System? Computer System Layers. Computer System Layers

Outline. CSCI 4730 Operating Systems. Questions. What is an Operating System? Computer System Layers. Computer System Layers Outlie CSCI 4730 s! What is a s?!! System Compoet Architecture s Overview Questios What is a?! What are the major operatig system compoets?! What are basic computer system orgaizatios?! How do you commuicate

More information