CSE 489/589 Programming Assignment 2
|
|
- Martha Walsh
- 5 years ago
- Views:
Transcription
1 CSE 489/589 Programming Assignment 2
2 Objective In a given simulator, implement three reliable data transport protocols: Alternating-Bit (ABT), Go-Back-N (GBN), and Selective- Repeat (SR). 2
3 Outline Part 0 An Overview to Reliable Transport Protocols Part 1 How to implement your protocols Programming environment Code Structure The Routines You Will Write The Alternating-Bit Version Part 2 Analysis and Report 3
4 Part 0: An Overview to Reliable Transport Protocols 4
5 The Alternating-Bit (rdt 3.0) Assumption: underlying channel can lose and corrupt packets (data or ACKs) checksum, seq. #, ACKs, retransmissions will be of help. Page 216,217 Approach: sender waits reasonable amount of time for ACK retransmits if no ACK received in this time if pkt (or ACK) just delayed (not lost): retransmission will be duplicate, but use of seq. # s already handles this receiver must specify seq # of pkt being ACKed requires countdown timer 5
6 Go-Back-N Sender window of up to N, consecutive unack ed pkts allowed timer for oldest unacked pkt Page 223 timeout(n): retransmit pkt n and all higher seq # pkts in window may receive duplicate ACKs (see receiver) 6
7 Selective-Repeat Receiver individually acknowledges all correctly received pkts buffers pkts, as needed, for eventual in-order delivery to upper layer Sender only resends pkts for which ACK not received sender timer for each unacked pkt Sender window N consecutive seq # s again limits seq #s of sent, unack ed pkts Page 228 7
8 Part 1: How to implement your protocols 8
9 Programming Environment In a simulator close to an actual UNIX environment Simulator Sender - A Receiver - B Simulator 9
10 Simulator vs. Real Environment 10
11 Real Environment (PA1) Sending/receiving process run on different hosts A and B Hosts A and B communicate over the network Set of routers/links with packet loss/corruption characteristics User has no control over them Application implemented in user space, transport/network layer implemented in the kernel App/transport talk to each other through sockets Each host has its own local clock/time 11
12 Simulator (PA2) Simulated hosts A and B run on single real host Hosts A and B communicate over simulated network User specifies packet loss/corruption All layers implemented in user space Both simulated hosts have the same time measured in time units get_sim_time() Simulated time different from real time! 12
13 Design Goals To insure the data generated from sender A s application layer is delivered in-order and correctly to the receiver B s application layer Simulator Data packets will get lost or corrupted at lower layers! 13
14 Code Structure A Simulator for Transport and lower layers 14
15 The Routines You Will Write A_output(message); A_input(packet); A_timerinterrupt(); A_init(); B_input(packet); B_init(); 15
16 The Alternating-Bit Version Take a journey when there s no packet loss/ corruption No timer in this journey 16
17 The Alternating-Bit Version data received at B s app layer Simulator tolayer5() Simulator data generated at A s app layer A_output() tolayer3() Simulator ACK received by A A_input() Simulator B_input() tolayer3() 17
18 Messages and packets structure 18
19 Functions A_output() Called whenever the upper layer at sender A has a message to send Function parameters - message 19
20 Functions A_output() Will call tolayer3() inside A_output(message) { tolayer3(0, packet); } 20
21 The Alternating-Bit Version data received at B s app layer Simulator tolayer5() Simulator data generated at A s app layer A_output() tolayer3() Simulator ACK received by A A_input() Simulator B_input() tolayer3() 21
22 Functions tolayer3() Function parameters AorB, packet AorB int AorB AorB = 0 [when being called by A] AorB = 1 [when being called by B] packet struct pkt packet 22
23 Functions struct msg message struct pkt packet The only two types of data can be recognized by the simulator. Both data packets and ack packets are of struct pkt type. Both data packets and ack packets need checksum Don t change the definitions of struct msg or struct pkt 23
24 Functions Checksum Any content - payload, seqnum, acknum or checksum can be corrupted by the simulator s lower layers. It should include the data, seqnum and acknum fields. 24
25 Question If the data generating speed at A s app layer is higher than the speed at which lower layers send packets, what should we do? Buffer! 25
26 The Alternating-Bit Version data received at B s app layer Simulator tolayer5() Simulator data generated at A s app layer A_output() tolayer3() Simulator ACK received by A A_input() Simulator B_input() tolayer3() 26
27 Functions B_input() Function parameters - packet Validate the checksum first May call tolayer3() and tolayer5() inside B_input(packet) { // validate the checksum; // if the checksum is correct // send ack to A tolayer3(1, ack); // deliver the data to upper layer tolayer5(1, payload); } 27
28 Functions tolayer5() Function parameters AorB, datasent AorB int AorB AorB = 0 // called by A AorB = 1 // called by B datasent // different from tolayer3() here char datasent[20] // payload 28
29 The Alternating-Bit Version data received at B s app layer Simulator tolayer5() Simulator data generated at A s app layer A_output() tolayer3() Simulator ACK received by A A_input() Simulator B_input() tolayer3() 29
30 Functions A_input() Function parameters - packet Validate the ack s checksum No need to deliver the ack to upper layer 30
31 The Alternating-Bit Version The journey is complete! 31
32 Packet corruption and Loss If packet corruption and loss happen at the lower layers, what should we do? NAK is not allowed to be used in this assignment Retransmit with timer! 32
33 Timer starttimer(calling_entity, increment) Starts a timer. Function parameters AorB, increment AorB int AorB AorB = 0 // called by A AorB = 1 // called by B Increment float increment Only ONE timer provided by the simulator!
34 Timer stoptimer(calling_entity) Its usage is similar to starttimer() Stops the timer A_timerinterrupt() No function parameter Will be called when A s timer expires
35 Questions What value should we use in the timer? Hint: A packet sent into the network takes an average of 5 time units to arrive at the other side when there are no other packets in the medium. Where should we start and stop the timer? This will be different in the 3 protocols
36 About the Simulator When will the simulation end? The simulation is controlled by the number of messages generated by A s app layer the number of packets you type in before the simulation start The simulator will stop as soon as that number of messages have been passed down from A s app layer.
37 About the Simulator What is the average time between messages from sender s layer 5? Controls the source data rate Non zero, positive value Smaller the value, faster the packets will be arriving to the sender s transport layer. Be careful about the relationship between the buffer size and this value Sender A shouldn t drop any message at the transport layer Best is to use a buffer size of 1000
38 Analysis: Result Application_A #Packets sent from the Application Layer of Sender A Transport_A #Packets sent from the Transport Layer of Sender A Transport_B #Packets received at the Transport Layer of Receiver B Application_B #Packets received at the Application Layer at Receiver B Throughput Application_B/Simulation_time
39 Analysis: Experiments PA2 Analysis part carries significant points. PA2 handout lists out 2 experiments (see section 6). We of course encourage you to do more! You NEED to use the run_experiments script, provided with the template. Do NOT run the binaries manually for analysis. The script will give you 10 results (different seeds). You may take average for reporting.
40 Questions?
Lab 2: Implementing a Reliable Transport Protocol (30 points)
Lab 2: Implementing a Reliable Transport Protocol (30 points) Overview In this laboratory programming assignment, you will be writing the sending and receiving transport-level code for implementing a simple
More informationCSE434 Computer Networks (FALL, 2009) Programming Assignment 3 Due: Wed, December 2, 2009
CSE434 Computer Networks (FALL, 2009) Programming Assignment 3 Due: Wed, December 2, 2009 Submission Procedure: No late submissions will be accepted. Submit a softcopy before the class to su.kim.asu@gmail.com.
More informationProgramming Assignment 5: Implementing a Reliable Transport Protocol
Programming Assignment 5: Implementing a Reliable Transport Protocol Overview In this laboratory programming assignment, you will be writing the sending and receiving transport-level code for implementing
More informationECE5650: Computer Networking and Programming Term Project Assignment Part II: Total 100 points
ECE5650: Computer Networking and Programming Term Project Assignment Part II: Total 100 points The objective of this term project is to develop deep understanding of key concepts and fundamental principles
More informationProgramming: Reliable Transport - Alternating Bit
Programming: Reliable Transport - Alternating Bit This lab is to be completed in teams of two. Collaborative conversations between yours and other teams with regard to syntax, strategies and methods for
More informationComputer Networks. Project 2. Project Assigned: November 14 Checkpoint: November 21 12:01 AM Due: December 04 12:01 AM. Networks - Project 2 1
Computer Networks Project 2 Project Assigned: November 14 Checkpoint: November 21 12:01 AM Due: December 04 12:01 AM Networks - Project 2 1 Overview In this programming assignment, you will be writing
More informationTotal Points 100 (One Hundred)
Project 2: Implementing Reliable Data Transfer Protocol (CS3516 A18) Due: Sep 28, 2018 F, 11:59 PM Total Points 100 (One Hundred) 1. Overview In this programming assignment, you will be writing the sending
More informationrdt2.0 has a fatal flaw!
rdt2. has a fatal flaw! rdt2.1:, handles garbled ACK/NAKs what happens if ACK/NAK corrupted? doesn t know what happened at! can t just retransmit: possible duplicate handling duplicates: retransmits current
More informationChapter 3 Transport Layer
Chapter 3 Transport Layer Lec 9: Reliable Data Transfer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose
More informationChapter 3 outline. 3.5 connection-oriented transport: TCP segment structure reliable data transfer flow control connection management
Chapter 3 outline 3.1 transport-layer services 3.2 multiplexing and demultiplexing 3.3 connectionless transport: UDP 3.4 principles of reliable data transfer 3.5 connection-oriented transport: TCP segment
More informationCS 3516: Advanced Computer Networks
Welcome to CS 3516: Advanced Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: Fuller 320 Fall 2017 A-term 1 Some slides are originally from the course materials of the textbook
More informationChapter 3: Transport Layer
Chapter 3: Transport Layer Chapter goals: understand principles behind transport layer services: multiplexing/demultiplex ing reliable data transfer flow control congestion control instantiation and implementation
More informationChapter III: Transport Layer
Chapter III: Transport Layer UG3 Computer Communications & Networks (COMN) Myungjin Lee myungjin.lee@ed.ac.uk Slides copyright of Kurose and Ross rdt2.0 has a fatal flaw! what happens if ACK/NAK corrupted?
More informationComputer Networking. Reliable Transport. Reliable Transport. Principles of reliable data transfer. Reliable data transfer. Elements of Procedure
Computer Networking Reliable Transport Prof. Andrzej Duda duda@imag.fr Reliable Transport Reliable data transfer Data are received ordered and error-free Elements of procedure usually means the set of
More informationCMSC 332 Computer Networks Reliable Data Transfer
CMSC 332 Computer Networks Reliable Data Transfer Professor Szajda Last Time Multiplexing/Demultiplexing at the Transport Layer. How do TCP and UDP differ? UDP gives us virtually bare-bones access to the
More informationInternet transport-layer protocols. Transport services and protocols. Sending and receiving. Connection-oriented (TCP) Connection-oriented
Transport services and protocols Internet -layer protocols logical communication between processes protocols run in end systems send side: breaks app messages into segments, passes to layer rcv side: reassembles
More informationChapter 3: Transport Layer Part A
Chapter 3: Transport Layer Part A Course on Computer Communication and Networks, CTH/GU The slides are adaptation of the slides made available by the authors of the course s main textbook 3: Transport
More informationCSC 4900 Computer Networks: Reliable Data Transport
CSC 4900 Computer Networks: Reliable Data Transport Professor Henry Carter Fall 2017 Last Time Multiplexing/Demultiplexing at the Transport Layer. How do TCP and UDP differ? UDP gives us virtually bare-bones
More informationCMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 8
CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 8 1 A lot of students have been having difficulty seeing the HTTP packets generated when navigating
More informationChapter 3 Transport Layer
Chapter 3 Transport Layer A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Transport Layer Pipelined Reliable Data Transfer Protocols: Go-Back-N and Selective Repeat Sec 3.4.2-3.4.3 Prof. Lina Battestilli Fall 2017 Transport Layer
More informationReliable Data Transfer
Reliable Data Transfer Kai Shen Reliable Data Transfer What is reliable data transfer? guaranteed arrival no error in order delivery Why is it difficult? unreliable underlying communication channel, which
More informationReliable Transport : Fundamentals of Computer Networks Bill Nace
Reliable Transport 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administration Stuff is due HW #1
More informationLab 1 - Reliable Data Transport Protocol
Lab 1 - Reliable Data Transport Protocol Handout: March 8, 2018 Deadline: March 18 23:00, 2018 (No extension) Assignment overview: In this assignment, you will be implementing the sending and receiving
More informationTransport services and protocols. Chapter 3 outline. Internet transport-layer protocols Chapter 3 outline. Multiplexing/demultiplexing
Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless : UDP 3.4 Principles of reliable data transfer 3.5 Connection-oriented : TCP segment structure reliable
More informationThe Transport Layer Reliability
The Transport Layer Reliability CS 3, Lecture 7 http://www.cs.rutgers.edu/~sn4/3-s9 Srinivas Narayana (slides heavily adapted from text authors material) Quick recap: Transport Provide logical communication
More informationLecture 5. Transport Layer. Transport Layer 1-1
Lecture 5 Transport Layer Transport Layer 1-1 Agenda The Transport Layer (TL) Introduction to TL Protocols and Services Connectionless and Connection-oriented Processes in TL Unreliable Data Transfer User
More informationCC451 Computer Networks
CC451 Computer Networks Lecture 5 Transport Layer Transport Layer 3-1 Chapter 3 Transport Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students,
More informationLecture 10: Transpor Layer Principles of Reliable Data Transfer
Lecture 10: Transpor Layer Principles of Reliable Data Transfer COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,
More informationTransport layer. Our goals: Understand principles behind transport layer services: Learn about transport layer protocols in the Internet:
Transport layer Our goals: Understand principles behind transport layer services: Multiplexing/demultiplexing Reliable data transfer Flow control Congestion control Learn about transport layer protocols
More informationRdt2.0: channel with packet errors (no loss!)
Rdt2.0: channel with packet errors (no loss!) What mechanisms do we need to deal with error? Error detection Add checksum bits Feedback Acknowledgements (ACKs): receiver explicitly tells sender that packet
More informationSliding Window Protocols, Connection Management, and TCP Reliability
1 Sliding Window Protocols, Connection Management, and TCP Reliability 2 Outline Review Sliding window protocols Go-back-n Selective repeat Connection management for reliability TCP reliability Overview
More informationChapter 3: Transport Layer. Chapter 3 Transport Layer. Chapter 3 outline. Transport services and protocols
Chapter 3 Transport Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationTDTS06: Computer Networks
TDTS06: Computer Networks Instructor: Niklas Carlsson Email: niklas.carlsson@liu.se Notes derived from Computer Networking: A Top Down Approach, by Jim Kurose and Keith Ross, Addison-Wesley. The slides
More informationTransport layer: Outline
Transport layer Our goals: Understand principles behind transport layer services: Multiplexing/demultiplexing Reliable data transfer Flow control Congestion control Learn about transport layer protocols
More informationLecture 11: Transport Layer Reliable Data Transfer and TCP
Lecture 11: Transport Layer Reliable Data Transfer and TCP COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,
More informationLecture 3 The Transport Control Protocol (TCP) Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 3 The Transport Control Protocol (TCP) Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it TCP segment structure URG: urgent data (generally not used) ACK: ACK # valid PSH: push
More informationData Communications & Networks. Session 6 Main Theme Reliable Data Transfer. Dr. Jean-Claude Franchitti
Data Communications & Networks Session 6 Main Theme Reliable Data Transfer Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences Adapted
More informationPrinciples of Reliable Data Transfer
Principles of Reliable Data Transfer 1 Reliable Delivery Making sure that the packets sent by the sender are correctly and reliably received by the receiver amid network errors, i.e., corrupted/lost packets
More informationELEN Network Fundamentals Lecture 15
ELEN 4017 Network Fundamentals Lecture 15 Purpose of lecture Chapter 3: Transport Layer Reliable data transfer Developing a reliable protocol Reliability implies: No data is corrupted (flipped bits) Data
More informationfile:///c:/users/hpguo/dropbox/website/teaching/fall 2017/CS4470/H...
1 of 9 11/26/2017, 11:28 AM Homework 3 solutions 1. A window holds bytes 2001 to 5000. The next byte to be sent is 3001. Draw a figure to show the situation of the window after the following two events:
More informationCS 3516: Computer Networks
Welcome to CS 3516: Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: AK 219 Fall 2018 A-term 1 Some slides are originally from the course materials of the textbook Computer
More informationComputer Networks & Security 2016/2017
Computer Networks & Security 2016/2017 Transport Layer (04) Dr. Tanir Ozcelebi Courtesy: Kurose & Ross Courtesy: Forouzan TU/e Computer Science Security and Embedded Networked Systems Transport Layer Our
More informationChapter 3 Transport Layer
Chapter 3 Transport Layer Reti degli Elaboratori Canale AL e MZ Prof.ssa Chiara Petrioli a.a. 2016/2017 We thank for the support material Prof. Kurose-Ross All material copyright 1996-2012 J.F Kurose and
More informationCSCI Topics: Internet Programming Fall 2008
CSCI 491-01 Topics: Internet Programming Fall 2008 Transport Layer Derek Leonard Hendrix College October 15, 2008 Original slides copyright 1996-2007 J.F Kurose and K.W. Ross 1 Chapter 3: Roadmap 3.1 Transport-layer
More informationThe Transport Layer: TCP & Reliable Data Transfer
The Transport Layer: TCP & Reliable Data Transfer Smith College, CSC 249 February 15, 2018 1 Chapter 3: Transport Layer q TCP Transport layer services: v Multiplexing/demultiplexing v Connection management
More informationFall 2012: FCM 708 Bridge Foundation I
Fall 2012: FCM 708 Bridge Foundation I Prof. Shamik Sengupta Instructor s Website: http://jjcweb.jjay.cuny.edu/ssengupta/ Blackboard Website: https://bbhosted.cuny.edu/ Intro to Computer Networking Transport
More informationThe Transport Layer Multiplexing, Error Detection, & UDP
CPSC 852 Internetworking The Transport Layer Multiplexing, Error Detection, & UDP Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu http://www.cs.clemson.edu/~mweigle/courses/cpsc852
More informationCSCD 330 Network Programming
CSCD 330 Network Programming Lecture 10 Transport Layer Continued Spring 2018 Reading: Chapter 3 Some Material in these slides from J.F Kurose and K.W. Ross All material copyright 1996-2007 1 Last Time.
More informationCSC358 Week 4. Adapted from slides by J.F. Kurose and K. W. Ross. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved
CSC358 Week 4 Adapted from slides by J.F. Kurose and K. W. Ross. All material copyright 1996-2016 J.F Kurose and K.W. Ross, All Rights Reserved Logistics Assignment 1 due this Friday Office hour on Feb
More informationChapter 3 Transport Layer
Chapter 3 Transport Layer A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationChapter 3 Transport Layer
Chapter 3 Transport Layer Reti degli Elaboratori Canale AL Prof.ssa Chiara Petrioli a.a. 2013/2014 We thank for the support material Prof. Kurose-Ross All material copyright 1996-2012 J.F Kurose and K.W.
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Transport Layer Principles of Reliable Data Transfer Sec 3.4 Prof. Lina Battestilli 2017 Fall Transport Layer Chapter 3 Outline 3.1 Transport-layer Services
More informationComputer Networking: A Top Down Approach
Computer Networking: A Top Down Approach Seventh Edition Chapter 3 Transport Layer Slides in this presentation contain hyperlinks. JAWS users should be able to get a list of links by using INSERT+F7 Transport
More informationChapter 2: outline. 2.1 principles of network applications app architectures app requirements
Chapter 2: outline 2.1 principles of network applications app architectures app requirements 2.2 Web and HTTP 2.3 FTP 2.4 electronic mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 socket programming
More informationCOSC4377. Useful Linux Tool: screen
Lecture 10 Useful Linux Tool: screen Alternative to having multiple ssh/putty screens, you can have multiple virtual screens within the same session. To open a screen session: ~$ screen To suspend the
More informationCommunication Networks
Communication Networks Prof. Laurent Vanbever Exercises week 4 Reliable Transport Reliable versus Unreliable Transport In the lecture, you have learned how a reliable transport protocol can be built on
More informationCourse on Computer Communication and Networks. Lecture 4 Chapter 3; Transport Layer, Part A
Course on Computer Communication and Networks Lecture 4 Chapter 3; Transport Layer, Part A EDA344/DIT 423, CTH/GU Based on the book Computer Networking: A Top Down Approach, Jim Kurose, Keith Ross, Addison-Wesley.
More informationCSC 8560 Computer Networks: Transport Layer
CSC 8560 Computer Networks: Transport Layer Professor Henry Carter Fall 2017 Last Time... Sockets programming API TCP and UDP look different. Remember, there is no connect() in UDP - just start sending
More informationRSC Part III: Transport Layer 3. TCP
RSC Part III: Transport Layer 3. TCP Redes y Servicios de Comunicaciones Universidad Carlos III de Madrid These slides are, mainly, part of the companion slides to the book Computer Networking: A Top Down
More informationCSCE 463/612 Networks and Distributed Processing Spring 2018
CSCE 463/612 Networks and Distributed Processing Spring 2018 Transport Layer II Dmitri Loguinov Texas A&M University February 27, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter
More informationTCP reliable data transfer. Chapter 3 outline. TCP sender events: TCP sender (simplified) TCP: retransmission scenarios. TCP: retransmission scenarios
Chapter 3 outline TCP reliable 3.2 principles of reliable 3.3 connection-oriented flow 3.4 principles of congestion 3.5 TCP congestion TCP creates rdt service on top of IP s unreliable service pipelined
More informationChapter 3 outline. TDTS06 Computer networks. Principles of Reliable data transfer. Reliable data transfer: getting started
Chapter 3 outline TDTS06 Computer networks Lecture 4: Transport layer II Reliable data delivery and TCP Jose M. Peña, jospe@ida.liu.se IDA/ADIT, LiU 2009-08-28 3.1 Transport-layer services 3.2 Multiplexing
More informationCSCE 463/612 Networks and Distributed Processing Spring 2018
CSCE 463/612 Networks and Distributed Processing Spring 2018 Transport Layer III Dmitri Loguinov Texas A&M University March 6, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter
More informationLECTURE 3 - TRANSPORT LAYER
LECTURE 3 - TRANSPORT LAYER 1 GOALS (1) Understand principles behind transport layer services: multiplexing, demultiplexing reliable data transfer ow control congestion control GOALS (2) Learn about Internet
More informationLecture 07 The Transport Layer (TCP & UDP) Dr. Anis Koubaa
NET 331 Computer Networks Lecture 07 The Transport Layer (TCP & UDP) Dr. Anis Koubaa Reformatted slides from textbook Computer Networking a top-down appraoch, Fifth Edition by Kurose and Ross, (c) Pearson
More informationThe GBN sender must respond to three types of events:
Go-Back-N (GBN) In a Go-Back-N (GBN) protocol, the sender is allowed to transmit several packets (when available) without waiting for an acknowledgment, but is constrained to have no more than some maximum
More informationNWEN 243. Networked Applications. Layer 4 TCP and UDP
NWEN 243 Networked Applications Layer 4 TCP and UDP 1 About the second lecturer Aaron Chen Office: AM405 Phone: 463 5114 Email: aaron.chen@ecs.vuw.ac.nz Transport layer and application layer protocols
More informationCOM-208: Computer Networks - Homework 3
COM-208: Computer Networks - Homework 3 1 Application Layer 1. (P22) Consider distributing a file of F = 15 Gbits to N peers. The server has an upload rate of u s = 30 Mbps, and each peer has a download
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Transport Layer Connection Oriented Transport: TCP Sec 3.5 Prof. Lina Battestilli Fall 2017 Transport Layer Chapter 3 Outline 3.1 Transport-layer Services
More informationCourse on Computer Communication and Networks. Lecture 4 Chapter 3; Transport Layer, Part A
Course on Computer Communication and Networks Lecture 4 Chapter 3; Transport Layer, Part A EDA344/DIT 420, CTH/GU Based on the book Computer Networking: A Top Down Approach, Jim Kurose, Keith Ross, Addison-Wesley.
More informationCS 655 System and Network Architectures and Implementation. Module 3 - Transport
CS 655 System and Network Architectures and Implementation Module 3 - Transport Martin Karsten mkarsten@uwaterloo.ca 3-1 Notice Some slides and elements of slides are taken from third-party slide sets.
More informationLecture 7: Flow Control"
Lecture 7: Flow Control" CSE 123: Computer Networks Alex C. Snoeren No class Monday! Lecture 7 Overview" Flow control Go-back-N Sliding window 2 Stop-and-Wait Performance" Lousy performance if xmit 1 pkt
More informationFoundations of Telematics
Foundations of Telematics Chapter 3 Transport Layer Acknowledgement: These slides have been prepared by J.F. Kurose and K.W. Ross Foundations of Telematics (AMW SS 2010): 03 Transport Layer 1 Chapter 3:
More informationCSCD 330 Network Programming
CSCD 330 Network Programming Lecture 9 Transport Layer Spring 2018 Reading: Begin Chapter 3 Some Material in these slides from J.F Kurose and K.W. Ross All material copyright 1996-2007 1 Outline Overview
More informationCSC 4900 Computer Networks: TCP
CSC 4900 Computer Networks: TCP Professor Henry Carter Fall 2017 Project 2: mymusic You will be building an application that allows you to synchronize your music across machines. The details of which are
More information32 bits. source port # dest port # sequence number acknowledgement number not used. checksum. Options (variable length)
Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer 3.5 Connectionoriented transport: TCP segment
More informationCOMP 431 Internet Services & Protocols. Transport Layer Protocols & Services Outline. The Transport Layer Reliable data delivery & flow control in TCP
COMP 431 Internet Services & Protocols Transport Layer Protocols & Services Outline The Transport Layer Reliable data delivery & flow control in TCP Jasleen Kaur Fundamental transport layer services» Multiplexing/Demultiplexing»
More informationComputer Communication Networks Midterm Review
Computer Communication Networks Midterm Review ICEN/ICSI 416 Fall 2018 Prof. Aveek Dutta 1 Instructions The exam is closed book, notes, computers, phones. You can use calculator, but not one from your
More informationCOMPUTER NETWORK. Homework #2. Due Date: April 12, 2017 in class
Computer Network Homework#2 COMPUTER NETWORK Homework #2 Due Date: April 12, 2017 in class Question 1 Suppose a process in Host C has a UDP socket with port number 6789. Suppose both Host A and Host B
More informationChapter 3 Transport Layer
Chapter 3 Transport Layer These slides are adapted from the original slides provided by J.Kurose and K.W Ross. All material copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
More informationChapter 3 Transport Layer
Chapter 3 Transport Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationAnnouncements Computer Networking. Outline. Transport Protocols. Transport introduction. Error recovery & flow control. Mid-semester grades
Announcements 15-441 Computer Networking Lecture 16 Transport Protocols Mid-semester grades Based on project1 + midterm + HW1 + HW2 42.5% of class If you got a D+,D, D- or F! must meet with Dave or me
More informationCSE 123: Computer Networks Alex C. Snoeren. HW 1 due NOW!
CSE 123: Computer Networks Alex C. Snoeren HW 1 due NOW! Automatic Repeat Request (ARQ) Acknowledgements (ACKs) and timeouts Stop-and-Wait Sliding Window Forward Error Correction 2 Link layer is lossy
More informationAnnouncements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6
Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine Computer Science Department 1 / 33 1 COS 140: Foundations
More informationNo book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6
Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 33 COS 140:
More informationChapter 3 Transport Layer
Chapter 3 Transport Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationCSE 461: Introduction to Computer Communication Networks. Chunjong Park
CSE 461: Introduction to Computer Communication Networks Chunjong Park Reliable Data Transfer A sends a packet to B Ideally, the packet should arrive at B But A does not know whether B receives it How
More informationCorrecting mistakes. TCP: Overview RFCs: 793, 1122, 1323, 2018, TCP seq. # s and ACKs. GBN in action. TCP segment structure
Correcting mistakes Go-back-N: big picture: sender can have up to N unacked packets in pipeline rcvr only sends cumulative acks doesn t ack packet if there s a gap sender has r for oldest unacked packet
More informationCNT 6885 Network Review on Transport Layer
CNT 6885 Network Review on Transport Layer Jonathan Kavalan, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida User Datagram Protocol [RFC 768] no frills,
More informationCS321: Computer Networks Error and Flow Control in TCP
CS321: Computer Networks Error and Flow Control in TCP Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in SEQ and ACK numbers in TCP TCP views data as an unstructured,
More informationAnnouncements Computer Networking. What was hard. Midterm. Lecture 16 Transport Protocols. Avg: 62 Med: 67 STD: 13.
Announcements 15-441 Computer Networking Lecture 16 Transport Protocols Mid-semester grades Based on (ckpt 1 & ckpt2) + midterm + HW1 + HW2 NOTE: GRADES DO NOT REFLECT LATE PENALTIES! 25.4% of class If
More information10.1 REVIEW QUESTIONS
CHAPTER 10 Data Link Control 10.1 REVIEW QUESTIONS 1. Transmission means to put a signal on a line. Communication is a meaningful and orderly relationship between devices that send and receive data. 3.
More informationLecture 5: Flow Control. CSE 123: Computer Networks Alex C. Snoeren
Lecture 5: Flow Control CSE 123: Computer Networks Alex C. Snoeren Pipelined Transmission Sender Receiver Sender Receiver Ignored! Keep multiple packets in flight Allows sender to make efficient use of
More informationDistributed Systems. 5. Transport Protocols
Distributed Systems 5. Transport Protocols Werner Nutt 1 5. Transport Protocols 5.1 Transport-layer Services 5.1 Transport-layer Services 5.2 Multiplexing and Demultiplexing 5.3 Connectionless Transport:
More informationChapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1
Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 23-1 PROCESS-TO-PROCESS DELIVERY 23.2 The transport
More informationCMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 9
CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 9 1 Chapter 3 outline 3.1 transport-layer services 3.2 multiplexing and demultiplexing 3.3
More informationERROR AND FLOW CONTROL. Lecture: 10 Instructor Mazhar Hussain
ERROR AND FLOW CONTROL Lecture: 10 Instructor Mazhar Hussain 1 FLOW CONTROL Flow control coordinates the amount of data that can be sent before receiving acknowledgement It is one of the most important
More informationDistributed Systems. 5. Transport Protocols. Werner Nutt
Distributed Systems 5. Transport Protocols Werner Nutt 1 5. Transport Protocols 5.1 Transport-layer Services 5.1 Transport-layer Services 5.2 Multiplexing and Demultiplexing 5.3 Connectionless Transport:
More informationIntro to LAN/WAN. Transport Layer
Intro to LAN/WAN Transport Layer Transport Layer Topics Introduction (6.1) Elements of Transport Protocols (6.2) Internet Transport Protocols: TDP (6.5) Internet Transport Protocols: UDP (6.4) socket interface
More information