Understanding UC, Adaptive Video, and Data Traffic Interaction
|
|
- Primrose Fowler
- 6 years ago
- Views:
Transcription
1 Understanding UC, Adaptive Video, and Data Traffic Interaction Different types of network traffic can make dramatically different demands on the network. Unified communications (UC), which can include voice and video conferencing, is unique from YouTube or Netflix streaming video standards, as well as traditional data like database servers and backup servers. Learning the underlying network and protocol concepts for these three distinct traffic types enables more effective maintenance, support, and troubleshooting using tools like Wireshark and the Observer Performance Management Platform. Access links to the internet commonly are either very symmetric, such as 50 Mbps down/50 Mbps up, or very asymmetric, such as 10 Mbps down/1 Mbps up. Studies based on the two types of links can aid in understanding traffic utilization, as they tend to magnify protocol stack characteristics and related traffic behavior. These studies can be repeated easily for various enterprise connections, although they tend to display more symmetric network activity. Before diving into the details and complexities of UC, adaptive video, and data traffic interaction, start with a foundational understanding of the transport layer protocols that support them. Modern networks that use TCP/IP have two important transport protocols: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). They transport data across networks very differently, so it is important to differentiate how they work and how they differ in their packet transport mechanisms. A connection-oriented protocol, TCP is generally used for traditional data applications such as file transfers and system backups. It is also used for web page retrieval and adaptive bit rate video. Currently somewhere between 85 and 95 percent of all network traffic uses TCP. On the other hand, UDP is a connectionless transport protocol and used for applications like short queries, VoIP, and video conferencing. While TCP carries the bulk of our information, its operation is actually one of the least understood aspects of networking. White Paper
2 The UDP Protocol In the middle of the protocol stack, UDP sits under the application and over the network. Compared to TCP, UDP is a simple protocol that connects the application to the network and provides these three functions: The second goal is to deliver extensive amounts of time-sensitive data. That s why it s used for voice and some forms of video. Indicates the address, known as the port, of the sending and receiving applications Records the amount of application data in the packet being transferred Provides no error check on the data being carried as that is the responsibility of the receiving application There are some notable missing characteristics to the protocol which we normally expect to see in data transfers. Specifically, the absence of sequence numbers makes it difficult to determine the correct order in which packets should have been received. In addition, there is no method to control the rate of flow between the two UDP partners. This is the reason that certain protocols are often used in conjunction with UDP. Most notably, Real-Time Protocol (RTP) is partnered with UDP to add sequencing, timing, and payload type information. Figure 2: DNS queries Figure 1: A VoIP packet Sequence number Audio source VoIP packets use RTP in conjunction with UDP so that loss rates can be detected, separate sound sources in stereo can be identified, and packets arriving out of order can be re-ordered. Videoconferencing usually uses RTP/UDP for the same reasons. Applications usually have two goals that UDP serves to meet. First, the application needs short answers to questions such as with Domain Name Services (DNS) requests. A query can be sent to a DNS server asking what address corresponds to the IP address x.x.x.x. In Figure 2, you can see this in the Observer Analyzer screen shot of captured data, where a series of DNS queries were executed within a few minutes. However, in Figure 3, the Analyzer screen shows that none of these queries used more than several thousand kilobits of bandwidth. Figure 3: DNS queries bandwidth consumption The UDP software is a part of the operating system, and it s also present in Linux, Windows, Android, OSX, and so forth. For the most part, because it is such a simple protocol, various implementations of UDP interoperate very successfully. Figure 4 shows the behavior of a VoIP call. Some variable bandwidth was used when the call was established utilizing the H.323 protocol (a TCP-based protocol). At about t = , the actual transfer of voice and the bandwidth used is nearly constant at about 80 kbps. This is low partly because the G.729 codec is compressing the voice packets. Figure 4: A VoIP call 2 Understanding UC, Adaptive Video, and Data Traffic Interaction
3 The TCP Protocol TCP is similar to UDP in a few ways. For example, it sits in the middle of the protocol stack under the application and over the network. It also uses port numbers to identify the sending and receiving applications. To support transporting the application data across the network, TCP provides the following: Sequence numbers to: Indicate the correct order of the delivered packets, which are called segments Record the actual number of bytes transferred Receive TCP responses to determine that data was lost or not yet delivered All current versions of TCP begin a formal session with a three-way handshake to negotiate the exchange of parameters, as shown in Figure 5. These parameters include: The sending and receiving of port numbers that will be used to identify the respective application processes The maximum and initial receiving window for each or how much data can be accepted in the receive buffer Where explicit congestion notification (ECN) will be used Each entity s initial sequence number Each entity s maximum segment size Three-way handshake Explicit indication that a segment of data was received Means for each of the communicating entities to restrict the rate of its partner s transmission, referred to as flow control Formal negotiation of the parameters for the exchange in the session start-up (as part of the three-way handshake) A transmitting TCP station uses a sophisticated algorithm to track its relationship to the quality of the network and the receiver s ability to receive what is being sent. Over the years, the TCP algorithm has evolved through various versions such as Reno, New Reno, Compound, and Cubic. However, the goal for each of these algorithms has been to maximize the amount of data being transferred subject to the quality of the network connection and the receiver s ability to successfully get the data; therefore, TCP is adaptive. It will change its sending rate dynamically depending on changing network conditions and receiver capabilities. Like UDP, the particular implementation of TCP depends on the operating system of which it is a part. For example, Windows XP used New Reno; however, Windows 8 and 10 used Compound TCP. The differences are beyond the scope of this paper. Figure 5: The three-way handshake Nearly all TCP transfers are half-duplex, meaning one-way at a time. When a sending TCP station has negotiated the start-up of a session, it begins to send data in a phase called slow start as shown in Figure 6 from the Observer GigaStor Time Series Analysis option. Figure 6: Slow start 3 Understanding UC, Adaptive Video, and Data Traffic Interaction
4 A typical send policy might be to send two segments and wait for an acknowledgment of that data. When the acknowledgment arrives, it increases the number of segments it is allowed to send by two and now sends four segments. With each acknowledgment of a data segment, it raises the number it is allowed to send by one. Figure 7 was created using Analyzer s Connection Dynamics. By filtering on one direction in the FTP transfer (from the server to the client), we see the second step in the three-way handshake, followed by the initial transfers of data packets. A close look at the delta times reveals that the server sent four data segments separated by less than one millisecond. Then, it waits for 30 milliseconds for acknowledgments. Figure 8: Slow start accelerates Delta time This illustrates one of TCP s most important features. It is designed to saturate the link or the receiver, whichever happens first. Think of a pipe, with a certain capacity, placed through the network. TCP tries to use all of the available bandwidth in the connection. In this particular instance, the connection s maximum capacity was 20 Mbps. (20 Mbps downlink, 2 Mbps uplink). This can be seen by again referring to Figure 6. The lower half shows that FTP used TCP to saturate that connection (2.5 MBps or 20 Mbps). So, what factors can affect the rate at which a TCP sender can transmit its data? Figure 7: Slow-start initial data segments The decode screen allows us to see the segments transferred during a longer period of time. The packet capture shown in Figure 8 was created in GigaStor using a one-way filter on the file transfer. It shows that four packets (2, 3, 4, and 5) were sent. Then after a pause, frames 6 through 13 followed for a total of eight packets transmitted. It continues to raise its rate of transmission until it reaches a value called its slowstart threshold. At this point it enters a new phase called congestion avoidance. The purpose of the first phase is to aggressively increase the sending rate, while monitoring acknowledgments from its partner. The second phase serves the purpose of more gradually increasing the rate, assuming that at some point congestion will be encountered. Competition from other flows UDP flows will usually demand a fixed or nearly fixed amount of bandwidth, which lowers the amount of bandwidth available to the TCP entity (it will throttle to the amount available). TCP flows from other stations will cause variable bandwidth use depending on the current state of their flows. Errors in segments or dropped packets that require retransmission Competition for the flow in the reverse direction; while often overlooked, congestion or heavy use of the uplink will slow acknowledgments, decreasing the rate at which a TCP station can download its data. 4 Understanding UC, Adaptive Video, and Data Traffic Interaction
5 The final aspect of TCP to consider is how TCP discovers that congestion exists and its need to slow its transmission rate. It may come as a surprise, but that s the purpose of dropped segments. As TCP begins to saturate the link, buffers fill resulting in packets being discarded. While generally thought to be a bad thing, it s what TCP expects when the link is filled to capacity. Errors at the physical level will cause TCP to assume congestion is present as well and, occasionally, that may be a correct diagnosis. Though, it is not as common as buffer overfill. The typical TCP implementation follows this policy. A packet is discarded, then the sending TCP stack: Receives duplicate acknowledgment of the previous segment (called a dup ACK). Continues to send data, assuming the missing segment is still in the network somewhere. Receives dup ACK #2 and dup ACK #3. Now assumes the packet has been dropped and retransmits it. Looking again at the Stevens graph, we can see that after a few frames, the rate of transmission decreases. That is, the slope of the curve is lower. It gradually climbs back up until at about 42 seconds returns to the previous throughput rate. The Interaction of Various Traffic Types In the first example, consider how FTP/TCP interacts with an HTTP/TCP. Remember that FTP is an application that depends almost entirely on how the TCP algorithm works. Also, adaptive bit rate video typically implemented by Adobe HDS, Microsoft Smooth Streaming, and Apple HLS is a series of short file transfers that depend on the TCP algorithm. Each of these transfers carries about 10 seconds of video. The example, based on a file transfer, coincides with a Netflix adaptive bit rate transfer. Figure 10 shows a Wireshark plot where the total bandwidth uses about 20 Mbps (the black line), which is the capacity of the connection. Cuts the rate at which it is sending frames and re-implements slow start at the lowered level. Wireshark illustrates this in Figure 9 where the left part of the screen shows the packets in this TLS/TCP transfer. This was a capture from an adaptive bit rate video transfer. The client playing the video is at , and the video is being transferred toward that device. Figure 10: FTP interacts with adaptive bit rate video Figure 9: TCP reaction to lost dropped segment The right side of the screen shows a Stevens Sequence graph. It shows sequence numbers on the left axis and time along the bottom axis to the right. Since sequence numbers measure bytes transferred, this graph nicely shows the throughput rate as the slope of the curve. Since this is an adaptive bit rate video transfer, the server usually sends data in chunks representing about 10 seconds of video. At approximately t = 38.5 seconds, we see the end of the last chunk. At about t = 40.6 seconds, the transfer starts again about the same rate. However, this time frame number is out of order because a segment was dropped. The total bandwidth used is nearly what is available, at 20 Mbps. However, when Netflix is transferring data (indicated by the green line), the FTP data transfer slows (indicated by the red line). In fact, the two TCP applications share almost exactly the available connection capacity. When the green transfer data rate is higher, the red FTP data transfer rate is lower. Clearly, the FTP throughput will be limited by the fact that it is sharing the link with another TCP application. 5 Understanding UC, Adaptive Video, and Data Traffic Interaction
6 In the second example, shown in Figure 11, the same FTP application shares bandwidth with another TCP application. However, this time the second application is an upload. In this case, we have an FTP download when a Dropbox upload proceeds. Figure 12: Video conference bandwidth use The result of starting a download with the same video conference session is shown in Figure 13. Figure 11: An FTP download Interacts with an upload In the beginning of the FTP transfer, the full 20 Mbps connection capacity is used, but at about t = 16 seconds the upload of a file to a server competes for the same bandwidth, resulting in several oscillations in total throughput, including a drop in total bandwidth usage to about 6 Mbps. In the previous example, the two applications shared the connection. But why would the upload affect the throughput of the download? The answer is that the ACKs to the download are being delayed while traversing the uplink. It takes a little time until TCP can react properly. When it does at about t = 18 seconds, the total bandwidth approaches the total capacity of the connection: 20 Mbps down + 2 Mbps up. The next example involves a mix of TCP and UDP traffic. First, let s review how a video conference uses the available bandwidth. The black line in Figure 12 shows the total bandwidth used by this conference. It averages about 2 Mbps. These fluctuations primarily are due to the variability compression on each video frame. Since this conference is over a DSL 20 Mbps downlink and 2 Mbps uplink line, we can see that the video is going up (red varies around an average of 2 Mbps.) The video going down is around 500 kbps. This apparent imbalance is because the person at the opposite end from is on a wireless link. This vendor s video conferencing server selected a very low resolution to accommodate the fluctuation inherent in wireless bandwidth. Nevertheless, once the conference is established, the bandwidth fluctuates around a constant average value in each direction. Figure 13: Video conference sharing bandwidth with FTP/TCP Here, the video conference is using about 1 to 2 Mbps. The FTP file transfer adjusts its demand for bandwidth to very slightly less than 20 Mbps. Again, we see the FTP/TCP takes all the bandwidth that it can. 6 Understanding UC, Adaptive Video, and Data Traffic Interaction
7 Conclusions Cisco and others have predicted that networks will continue to carry increasingly more video. Cisco indicated in their Visual Networking Index that video is already more than half of total network traffic, and the amount of video traffic on the Internet may reach 80 percent by It is very likely that such traffic will continue to appear on corporate enterprise networks. In addition, as more employees work from home or on the road, the composition of traffic in the Internet will profoundly impact productivity. As a result, there is a growing need to understand how this traffic interacts with more traditional data and voice traffic. One trend on which to focus is the rapid increase in the use of IP technologies in the audio/video (AV) industry. At major AV trade shows like InfoComm and NAB, which far exceed the size of Interop, the buzz is constantly about IP products. Devices such as cameras, microphones, encoders, audio conference bridges, and digital video recorders (DVRs) are going to increase IP traffic even more. Just as IT absorbed the telecom function during the early part of the twenty-first century, it seems that IT will gradually absorb the AV functions with significant implications to network performance and traffic pattern behavior. This paper highlighted the following key points: IT services that use UDP traffic, such as voice and video conferencing, normally require a relatively fixed amount of bandwidth. When deployed, they will consume network resources at the expense of TCP applications that share the connection. TCP applications are generally either bursty or continually take all of the available link bandwidth. However, the total bandwidth they use will depend on competing traffic and the quality of the network. Understanding the TCP operation is important in determining whether we are seeing good or poor overall service and application performance. The Observer platform from Viavi and the Wireshark network analyzer are tools that can facilitate the understanding of these two protocols and the applications that run over them. They will also help to differentiate between normal protocol operation and performance problems. 7 Understanding UC, Adaptive Video, and Data Traffic Interaction
8 Contact Us GO VIAVI ( ) To reach the Viavi office nearest you, visit viavisolutions.com/contacts Viavi Solutions Inc. Product specifications and descriptions in this document are subject to change without notice. understandinguc-wp-ec-nse-ae viavisolutions.com
CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP
CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering
More informationUNIT IV -- TRANSPORT LAYER
UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission
More informationInternetworking Models The OSI Reference Model
Internetworking Models When networks first came into being, computers could typically communicate only with computers from the same manufacturer. In the late 1970s, the Open Systems Interconnection (OSI)
More informationPage 1. Review: Internet Protocol Stack. Transport Layer Services EEC173B/ECS152C. Review: TCP. Transport Layer: Connectionless Service
EEC7B/ECS5C Review: Internet Protocol Stack Review: TCP Application Telnet FTP HTTP Transport Network Link Physical bits on wire TCP LAN IP UDP Packet radio Do you remember the various mechanisms we have
More informationChapter 28. Multimedia
Chapter 28. Multimedia 28-1 Internet Audio/Video Streaming stored audio/video refers to on-demand requests for compressed audio/video files Streaming live audio/video refers to the broadcasting of radio
More informationCS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control
: Computer Networks Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control TCP performance We ve seen how TCP the protocol works Sequencing, receive window, connection setup and teardown And
More informationChapter III: Transport Layer
Chapter III: Transport Layer UG3 Computer Communications & Networks (COMN) Mahesh Marina mahesh@ed.ac.uk Slides thanks to Myungjin Lee and copyright of Kurose and Ross Principles of congestion control
More informationPage 1. Review: Internet Protocol Stack. Transport Layer Services. Design Issue EEC173B/ECS152C. Review: TCP
EEC7B/ECS5C Review: Internet Protocol Stack Review: TCP Application Telnet FTP HTTP Transport Network Link Physical bits on wire TCP LAN IP UDP Packet radio Transport Layer Services Design Issue Underlying
More informationTransmission Control Protocol. ITS 413 Internet Technologies and Applications
Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion
More informationCSC 4900 Computer Networks: TCP
CSC 4900 Computer Networks: TCP Professor Henry Carter Fall 2017 Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable
More informationOSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,
ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure
More informationLab Exercise UDP & TCP
Lab Exercise UDP & TCP Objective UDP (User Datagram Protocol) is an alternative communications protocol to Transmission Control Protocol (TCP) used primarily for establishing low-latency and loss tolerating
More informationOutline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste
Outline 15-441 Computer Networking Lecture 18 TCP Performance Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 TCP congestion avoidance TCP slow start TCP modeling TCP details 2 AIMD Distributed,
More informationPerformance Consequences of Partial RED Deployment
Performance Consequences of Partial RED Deployment Brian Bowers and Nathan C. Burnett CS740 - Advanced Networks University of Wisconsin - Madison ABSTRACT The Internet is slowly adopting routers utilizing
More informationConcept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.
113 Chapter 9 TCP/IP Transport and Application Layer Services that are located in the transport layer enable users to segment several upper-layer applications onto the same transport layer data stream.
More information9th Slide Set Computer Networks
Prof. Dr. Christian Baun 9th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 1/49 9th Slide Set Computer Networks Prof. Dr. Christian Baun Frankfurt University of Applied Sciences
More information6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1
6. Transport Layer 6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6.1 Internet Transport Layer Architecture The
More informationDoes current Internet Transport work over Wireless? Reviewing the status of IETF work in this area
Does current Internet Transport work over Wireless? Reviewing the status of IETF work in this area Sally Floyd March 2, 2000 IAB Workshop on Wireless Internetworking 1 Observations: Transport protocols
More informationChapter III. congestion situation in Highspeed Networks
Chapter III Proposed model for improving the congestion situation in Highspeed Networks TCP has been the most used transport protocol for the Internet for over two decades. The scale of the Internet and
More informationLecture 11. Transport Layer (cont d) Transport Layer 1
Lecture 11 Transport Layer (cont d) Transport Layer 1 Agenda The Transport Layer (continue) Connection-oriented Transport (TCP) Flow Control Connection Management Congestion Control Introduction to the
More informationPart VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD
Part VI Appendixes Appendix A OSI Model and Internet Protocols Appendix B About the CD OSI Model and Internet Protocols APPENDIX A In this appendix, you will Learn about the OSI model Review the network
More informationTroubleshooting OSI Layers 4-7
Troubleshooting OSI Layers 4-7 In this two-part white paper series, learn to quickly locate and resolve problems across the OSI layers using the Troubleshooting Cheat Sheet. The root cause of application
More informationChapter 3 outline. 3.5 Connection-oriented transport: TCP. 3.6 Principles of congestion control 3.7 TCP congestion control
Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer 3.5 Connection-oriented transport: TCP segment
More informationChapter 3 Review Questions
Chapter 3 Review Questions. 2. 3. Source port number 6 and destination port number 37. 4. TCP s congestion control can throttle an application s sending rate at times of congestion. Designers of applications
More informationProblem 7. Problem 8. Problem 9
Problem 7 To best answer this question, consider why we needed sequence numbers in the first place. We saw that the sender needs sequence numbers so that the receiver can tell if a data packet is a duplicate
More informationManaging Caching Performance and Differentiated Services
CHAPTER 10 Managing Caching Performance and Differentiated Services This chapter explains how to configure TCP stack parameters for increased performance ant throughput and how to configure Type of Service
More informationCongestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014
1 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2014 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion
More informationCongestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015
1 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2015 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion
More informationOSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1
OSI Transport Layer Network Fundamentals Chapter 4 Version 4.0 1 Transport Layer Role and Services Transport layer is responsible for overall end-to-end transfer of application data 2 Transport Layer Role
More informationCongestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014
1 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2014 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion
More informationChapter 3 Transport Layer
Chapter 3 Transport Layer 1 Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer 3.5 Connection-oriented
More informationCSCD 330 Network Programming Winter 2015
CSCD 330 Network Programming Winter 2015 Lecture 11a Transport Layer Reading: Chapter 3 Some Material in these slides from J.F Kurose and K.W. Ross All material copyright 1996-2007 1 Chapter 3 Sections
More informationOn Inter-layer Assumptions
On Inter-layer Assumptions (A View from the Transport Area) Mark Handley ACIRI/ICSI mjh@aciri.org Ping The Internet Hourglass FTP HTTP NNTP SMTP NFS DNS Applications TCP UDP ICMP IP 802.x PPP SLIP RS232
More informationETSF10 Internet Protocols Transport Layer Protocols
ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.1 Kaan Bür, Jens Andersson Transport Layer Protocols Process-to-process delivery [ed.4 ch.23.1] [ed.5 ch.24.1] Transmission Control
More informationWireless TCP Performance Issues
Wireless TCP Performance Issues Issues, transport layer protocols Set up and maintain end-to-end connections Reliable end-to-end delivery of data Flow control Congestion control Udp? Assume TCP for the
More informationThe Frozen Mountain irtc White Paper Series
The Frozen Mountain irtc White Paper Series This white paper is the fourth in a series on Internet Based Real Time Communications (irtc) written by Frozen Mountain Software s CTO Anton Venema. The complete
More informationCan Congestion-controlled Interactive Multimedia Traffic Co-exist with TCP? Colin Perkins
Can Congestion-controlled Interactive Multimedia Traffic Co-exist with TCP? Colin Perkins Context: WebRTC WebRTC project has been driving interest in congestion control for interactive multimedia Aims
More informationCOMP/ELEC 429/556 Introduction to Computer Networks
COMP/ELEC 429/556 Introduction to Computer Networks The TCP Protocol Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng at cs.rice.edu
More informationThe Essentials of Ethernet Service Activation
The Essentials of Ethernet Service Activation 3. Multi-Service Y.1564 SAMComplete Solution Brief Global growth in communications and data services is driving increasing demand for Ethernet. As businesses
More informationETSF05/ETSF10 Internet Protocols Transport Layer Protocols
ETSF05/ETSF10 Internet Protocols Transport Layer Protocols 2016 Jens Andersson Transport Layer Communication between applications Process-to-process delivery Client/server concept Local host Normally initialiser
More informationCongestion Control. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Congestion Control Daniel Zappala CS 460 Computer Networking Brigham Young University 2/25 Congestion Control how do you send as fast as possible, without overwhelming the network? challenges the fastest
More informationDigital Asset Management 5. Streaming multimedia
Digital Asset Management 5. Streaming multimedia 2015-10-29 Keys of Streaming Media Algorithms (**) Standards (*****) Complete End-to-End systems (***) Research Frontiers(*) Streaming... Progressive streaming
More informationData & Computer Communication
Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects
More informationCongestion. Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets limited resources
Congestion Source 1 Source 2 10-Mbps Ethernet 100-Mbps FDDI Router 1.5-Mbps T1 link Destination Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets
More informationChapter 3 outline. 3.5 Connection-oriented transport: TCP. 3.6 Principles of congestion control 3.7 TCP congestion control
Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer 3.5 Connection-oriented transport: TCP segment
More informationNo, the bogus packet will fail the integrity check (which uses a shared MAC key).!
1. High level questions a. Suppose Alice and Bob are communicating over an SSL session. Suppose an attacker, who does not have any of the shared keys, inserts a bogus TCP segment into a packet stream with
More information15-744: Computer Networking TCP
15-744: Computer Networking TCP Congestion Control Congestion Control Assigned Reading [Jacobson and Karels] Congestion Avoidance and Control [TFRC] Equation-Based Congestion Control for Unicast Applications
More informationIntroduction to Open System Interconnection Reference Model
Chapter 5 Introduction to OSI Reference Model 1 Chapter 5 Introduction to Open System Interconnection Reference Model Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding
More informationTo see the details of TCP (Transmission Control Protocol). TCP is the main transport layer protocol used in the Internet.
Lab Exercise TCP Objective To see the details of TCP (Transmission Control Protocol). TCP is the main transport layer protocol used in the Internet. The trace file is here: https://kevincurran.org/com320/labs/wireshark/trace-tcp.pcap
More informationCongestion control in TCP
Congestion control in TCP If the transport entities on many machines send too many packets into the network too quickly, the network will become congested, with performance degraded as packets are delayed
More informationIntroduction to Protocols
Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These
More informationChapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control
Chapter 6 What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control OSI Model Hybrid Model Software outside the operating system Software inside
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 20 MIDTERM EXAMINATION #1 - B COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 20 MIDTERM EXAMINATION #1 - A COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document
More informationUNIT IV TRANSPORT LAYER
Transport Layer UNIT IV TRANSPORT LAYER Congestion Control and Quality of Service Ref: Data Communication & Networking, 4 th edition, Forouzan IV-1 DATA TRAFFIC The main focus of congestion control and
More informationTransporting Voice by Using IP
Transporting Voice by Using IP National Chi Nan University Quincy Wu Email: solomon@ipv6.club.tw 1 Outline Introduction Voice over IP RTP & SIP Conclusion 2 Digital Circuit Technology Developed by telephone
More informationNetworks Fall This exam consists of 10 problems on the following 13 pages.
CSCI 466 Final Networks Fall 2011 Name: This exam consists of 10 problems on the following 13 pages. You may use your two- sided hand- written 8 ½ x 11 note sheet during the exam and a calculator. No other
More informationCongestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015
Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2015 1 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion
More informationUNIT 2 TRANSPORT LAYER
Network, Transport and Application UNIT 2 TRANSPORT LAYER Structure Page No. 2.0 Introduction 34 2.1 Objective 34 2.2 Addressing 35 2.3 Reliable delivery 35 2.4 Flow control 38 2.5 Connection Management
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationAppendix B. Standards-Track TCP Evaluation
215 Appendix B Standards-Track TCP Evaluation In this appendix, I present the results of a study of standards-track TCP error recovery and queue management mechanisms. I consider standards-track TCP error
More informationEvaluating, Selecting and Deploying WAN Acceleration Solutions
Inspired Innovation White Paper Evaluating, Selecting and Deploying Acceleration Solutions Real-World Testing Sifts Through Conflicting Claims to Identify the True Performance of Competing Solutions January
More informationOutline. TCP: Overview RFCs: 793, 1122, 1323, 2018, steam: r Development of reliable protocol r Sliding window protocols
Outline r Development of reliable protocol r Sliding window protocols m Go-Back-N, Selective Repeat r Protocol performance r Sockets, UDP, TCP, and IP r UDP operation r TCP operation m connection management
More informationUser Datagram Protocol (UDP):
SFWR 4C03: Computer Networks and Computer Security Feb 2-5 2004 Lecturer: Kartik Krishnan Lectures 13-15 User Datagram Protocol (UDP): UDP is a connectionless transport layer protocol: each output operation
More information4.0.1 CHAPTER INTRODUCTION
4.0.1 CHAPTER INTRODUCTION Data networks and the Internet support the human network by supplying seamless, reliable communication between people - both locally and around the globe. On a single device,
More informationThis tutorial shows how to use ACE to Identify the true causes of poor response time Document the problems that are found
FTP Application Overview This tutorial shows how to use ACE to Identify the true causes of poor response time Document the problems that are found The screen images in this tutorial were captured while
More informationChapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP
Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 23-1 PROCESS-TO-PROCESS DELIVERY The transport
More informationCNT 6885 Network Review on Transport Layer
CNT 6885 Network Review on Transport Layer Jonathan Kavalan, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida User Datagram Protocol [RFC 768] no frills,
More informationTCP Congestion Control
1 TCP Congestion Control Onwutalobi, Anthony Claret Department of Computer Science University of Helsinki, Helsinki Finland onwutalo@cs.helsinki.fi Abstract This paper is aimed to discuss congestion control
More informationWarpTCP WHITE PAPER. Technology Overview. networks. -Improving the way the world connects -
WarpTCP WHITE PAPER Technology Overview -Improving the way the world connects - WarpTCP - Attacking the Root Cause TCP throughput reduction is often the bottleneck that causes data to move at slow speed.
More informationEqualLogic Storage and Non-Stacking Switches. Sizing and Configuration
EqualLogic Storage and Non-Stacking Switches Sizing and Configuration THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS
More informationEEC-682/782 Computer Networks I
EEC-682/782 Computer Networks I Lecture 16 Wenbing Zhao w.zhao1@csuohio.edu http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser at
More informationTCP so far Computer Networking Outline. How Was TCP Able to Evolve
TCP so far 15-441 15-441 Computer Networking 15-641 Lecture 14: TCP Performance & Future Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Reliable byte stream protocol Connection establishments
More informationTCP over wireless links
CSc 450/550 Computer Communications & Networks TCP over wireless links Jianping Pan (stand-in for Dr. Wu) 1/31/06 CSc 450/550 1 TCP over wireless links TCP a quick review on how TCP works Wireless links
More informationCS 43: Computer Networks. 19: TCP Flow and Congestion Control October 31, Nov 2, 2018
CS 43: Computer Networks 19: TCP Flow and Congestion Control October 31, Nov 2, 2018 Five-layer Internet Model Application: the application (e.g., the Web, Email) Transport: end-to-end connections, reliability
More informationBackground: IP Protocol Stack
Networking and protocols for real-time signal transmissions by Hans-Peter Schwefel & Søren Vang Andersen Mm1 Introduction & simple performance models (HPS) Mm2 Real-time Support in Wireless Technologies
More informationIntegrated VoIP Audio
General Questions, page 1 System Requirements and Technical Information, page 2 Troubleshooting, page 4 General Questions What are the features of Integrated VoIP audio? What is the attendee capacity for
More informationTCP/IP-2. Transmission control protocol:
TCP/IP-2 Transmission control protocol: TCP and IP are the workhorses in the Internet. In this section we first discuss how TCP provides reliable, connectionoriented stream service over IP. To do so, TCP
More informationIntro to LAN/WAN. Transport Layer
Intro to LAN/WAN Transport Layer Transport Layer Topics Introduction (6.1) Elements of Transport Protocols (6.2) Internet Transport Protocols: TDP (6.5) Internet Transport Protocols: UDP (6.4) socket interface
More informationChapter - 1 INTRODUCTION
Chapter - 1 INTRODUCTION Worldwide Interoperability for Microwave Access (WiMAX) is based on IEEE 802.16 standard. This standard specifies the air interface of fixed Broadband Wireless Access (BWA) system
More informationCMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 10
CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 10 1 Midterm exam Midterm next Thursday Close book but one-side 8.5"x11" note is allowed (must
More informationTCP and BBR. Geoff Huston APNIC
TCP and BBR Geoff Huston APNIC Computer Networking is all about moving data The way in which data movement is controlled is a key characteristic of the network architecture The Internet protocol passed
More informationCS4700/CS5700 Fundamentals of Computer Networks
CS4700/CS5700 Fundamentals of Computer Networks Lecture 15: Congestion Control Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu
More informationII. Principles of Computer Communications Network and Transport Layer
II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part
More informationCCNA Exploration1 Chapter 7: OSI Data Link Layer
CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the
More informationTransport Layer TCP / UDP
Transport Layer TCP / UDP Chapter 6 section 6.5 is TCP 12 Mar 2012 Layers Application Transport Why do we need the Transport Layer? Network Host-to-Network/Physical/DataLink High Level Overview TCP (RFC
More informationGuide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16
Guide To TCP/IP, Second Edition Chapter 5 Transport Layer TCP/IP Protocols Objectives Understand the key features and functions of the User Datagram Protocol (UDP) Explain the mechanisms that drive segmentation,
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationImpact of TCP Window Size on a File Transfer
Impact of TCP Window Size on a File Transfer Introduction This example shows how ACE diagnoses and visualizes application and network problems; it is not a step-by-step tutorial. If you have experience
More informationETSF10 Internet Protocols Transport Layer Protocols
ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.2 Kaan Bür, Jens Andersson Transport Layer Protocols Special Topic: Quality of Service (QoS) [ed.4 ch.24.1+5-6] [ed.5 ch.30.1-2]
More informationUDP Traffic Management
Packeteer Technical White Paper Series UDP Traffic Management May 2002 Packeteer, Inc. 10495 N. De Anza Blvd. Cupertino, CA 95014 408.873.4400 info@packeteer.com www.packeteer.com Company and product names
More informationEEC-484/584 Computer Networks. Lecture 16. Wenbing Zhao
EEC-484/584 Computer Networks Lecture 16 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review Services provided by transport layer
More informationFUJITSU Software Interstage Information Integrator V11
FUJITSU Software V11 An Innovative WAN optimization solution to bring out maximum network performance October, 2013 Fujitsu Limited Contents Overview Key technologies Supported network characteristics
More informationOutline Computer Networking. Functionality Split. Transport Protocols
Outline 15-441 15 441 Computer Networking 15-641 Lecture 10: Transport Protocols Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15 441 F17 Transport introduction TCP connection establishment
More informationCommunication Networks
Communication Networks Spring 2018 Laurent Vanbever nsg.ee.ethz.ch ETH Zürich (D-ITET) April 30 2018 Materials inspired from Scott Shenker & Jennifer Rexford Last week on Communication Networks We started
More informationCSC 8560 Computer Networks: TCP
CSC 8560 Computer Networks: TCP Professor Henry Carter Fall 2017 Project 2: mymusic You will be building an application that allows you to synchronize your music across machines. The details of which are
More informationCS419: Computer Networks. Lecture 10, Part 3: Apr 13, 2005 Transport: TCP performance
: Computer Networks Lecture 10, Part 3: Apr 13, 2005 Transport: TCP performance TCP performance We ve seen how TCP the protocol works But there are a lot of tricks required to make it work well Indeed,
More informationTransport Layer Protocols TCP
Transport Layer Protocols TCP Gail Hopkins Introduction Features of TCP Packet loss and retransmission Adaptive retransmission Flow control Three way handshake Congestion control 1 Common Networking Issues
More informationUDP, TCP, IP multicast
UDP, TCP, IP multicast Dan Williams In this lecture UDP (user datagram protocol) Unreliable, packet-based TCP (transmission control protocol) Reliable, connection oriented, stream-based IP multicast Process-to-Process
More informationTCP Congestion Control
TCP Congestion Control What is Congestion The number of packets transmitted on the network is greater than the capacity of the network Causes router buffers (finite size) to fill up packets start getting
More information