Understanding UC, Adaptive Video, and Data Traffic Interaction

Size: px
Start display at page:

Download "Understanding UC, Adaptive Video, and Data Traffic Interaction"

Transcription

1 Understanding UC, Adaptive Video, and Data Traffic Interaction Different types of network traffic can make dramatically different demands on the network. Unified communications (UC), which can include voice and video conferencing, is unique from YouTube or Netflix streaming video standards, as well as traditional data like database servers and backup servers. Learning the underlying network and protocol concepts for these three distinct traffic types enables more effective maintenance, support, and troubleshooting using tools like Wireshark and the Observer Performance Management Platform. Access links to the internet commonly are either very symmetric, such as 50 Mbps down/50 Mbps up, or very asymmetric, such as 10 Mbps down/1 Mbps up. Studies based on the two types of links can aid in understanding traffic utilization, as they tend to magnify protocol stack characteristics and related traffic behavior. These studies can be repeated easily for various enterprise connections, although they tend to display more symmetric network activity. Before diving into the details and complexities of UC, adaptive video, and data traffic interaction, start with a foundational understanding of the transport layer protocols that support them. Modern networks that use TCP/IP have two important transport protocols: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). They transport data across networks very differently, so it is important to differentiate how they work and how they differ in their packet transport mechanisms. A connection-oriented protocol, TCP is generally used for traditional data applications such as file transfers and system backups. It is also used for web page retrieval and adaptive bit rate video. Currently somewhere between 85 and 95 percent of all network traffic uses TCP. On the other hand, UDP is a connectionless transport protocol and used for applications like short queries, VoIP, and video conferencing. While TCP carries the bulk of our information, its operation is actually one of the least understood aspects of networking. White Paper

2 The UDP Protocol In the middle of the protocol stack, UDP sits under the application and over the network. Compared to TCP, UDP is a simple protocol that connects the application to the network and provides these three functions: The second goal is to deliver extensive amounts of time-sensitive data. That s why it s used for voice and some forms of video. Indicates the address, known as the port, of the sending and receiving applications Records the amount of application data in the packet being transferred Provides no error check on the data being carried as that is the responsibility of the receiving application There are some notable missing characteristics to the protocol which we normally expect to see in data transfers. Specifically, the absence of sequence numbers makes it difficult to determine the correct order in which packets should have been received. In addition, there is no method to control the rate of flow between the two UDP partners. This is the reason that certain protocols are often used in conjunction with UDP. Most notably, Real-Time Protocol (RTP) is partnered with UDP to add sequencing, timing, and payload type information. Figure 2: DNS queries Figure 1: A VoIP packet Sequence number Audio source VoIP packets use RTP in conjunction with UDP so that loss rates can be detected, separate sound sources in stereo can be identified, and packets arriving out of order can be re-ordered. Videoconferencing usually uses RTP/UDP for the same reasons. Applications usually have two goals that UDP serves to meet. First, the application needs short answers to questions such as with Domain Name Services (DNS) requests. A query can be sent to a DNS server asking what address corresponds to the IP address x.x.x.x. In Figure 2, you can see this in the Observer Analyzer screen shot of captured data, where a series of DNS queries were executed within a few minutes. However, in Figure 3, the Analyzer screen shows that none of these queries used more than several thousand kilobits of bandwidth. Figure 3: DNS queries bandwidth consumption The UDP software is a part of the operating system, and it s also present in Linux, Windows, Android, OSX, and so forth. For the most part, because it is such a simple protocol, various implementations of UDP interoperate very successfully. Figure 4 shows the behavior of a VoIP call. Some variable bandwidth was used when the call was established utilizing the H.323 protocol (a TCP-based protocol). At about t = , the actual transfer of voice and the bandwidth used is nearly constant at about 80 kbps. This is low partly because the G.729 codec is compressing the voice packets. Figure 4: A VoIP call 2 Understanding UC, Adaptive Video, and Data Traffic Interaction

3 The TCP Protocol TCP is similar to UDP in a few ways. For example, it sits in the middle of the protocol stack under the application and over the network. It also uses port numbers to identify the sending and receiving applications. To support transporting the application data across the network, TCP provides the following: Sequence numbers to: Indicate the correct order of the delivered packets, which are called segments Record the actual number of bytes transferred Receive TCP responses to determine that data was lost or not yet delivered All current versions of TCP begin a formal session with a three-way handshake to negotiate the exchange of parameters, as shown in Figure 5. These parameters include: The sending and receiving of port numbers that will be used to identify the respective application processes The maximum and initial receiving window for each or how much data can be accepted in the receive buffer Where explicit congestion notification (ECN) will be used Each entity s initial sequence number Each entity s maximum segment size Three-way handshake Explicit indication that a segment of data was received Means for each of the communicating entities to restrict the rate of its partner s transmission, referred to as flow control Formal negotiation of the parameters for the exchange in the session start-up (as part of the three-way handshake) A transmitting TCP station uses a sophisticated algorithm to track its relationship to the quality of the network and the receiver s ability to receive what is being sent. Over the years, the TCP algorithm has evolved through various versions such as Reno, New Reno, Compound, and Cubic. However, the goal for each of these algorithms has been to maximize the amount of data being transferred subject to the quality of the network connection and the receiver s ability to successfully get the data; therefore, TCP is adaptive. It will change its sending rate dynamically depending on changing network conditions and receiver capabilities. Like UDP, the particular implementation of TCP depends on the operating system of which it is a part. For example, Windows XP used New Reno; however, Windows 8 and 10 used Compound TCP. The differences are beyond the scope of this paper. Figure 5: The three-way handshake Nearly all TCP transfers are half-duplex, meaning one-way at a time. When a sending TCP station has negotiated the start-up of a session, it begins to send data in a phase called slow start as shown in Figure 6 from the Observer GigaStor Time Series Analysis option. Figure 6: Slow start 3 Understanding UC, Adaptive Video, and Data Traffic Interaction

4 A typical send policy might be to send two segments and wait for an acknowledgment of that data. When the acknowledgment arrives, it increases the number of segments it is allowed to send by two and now sends four segments. With each acknowledgment of a data segment, it raises the number it is allowed to send by one. Figure 7 was created using Analyzer s Connection Dynamics. By filtering on one direction in the FTP transfer (from the server to the client), we see the second step in the three-way handshake, followed by the initial transfers of data packets. A close look at the delta times reveals that the server sent four data segments separated by less than one millisecond. Then, it waits for 30 milliseconds for acknowledgments. Figure 8: Slow start accelerates Delta time This illustrates one of TCP s most important features. It is designed to saturate the link or the receiver, whichever happens first. Think of a pipe, with a certain capacity, placed through the network. TCP tries to use all of the available bandwidth in the connection. In this particular instance, the connection s maximum capacity was 20 Mbps. (20 Mbps downlink, 2 Mbps uplink). This can be seen by again referring to Figure 6. The lower half shows that FTP used TCP to saturate that connection (2.5 MBps or 20 Mbps). So, what factors can affect the rate at which a TCP sender can transmit its data? Figure 7: Slow-start initial data segments The decode screen allows us to see the segments transferred during a longer period of time. The packet capture shown in Figure 8 was created in GigaStor using a one-way filter on the file transfer. It shows that four packets (2, 3, 4, and 5) were sent. Then after a pause, frames 6 through 13 followed for a total of eight packets transmitted. It continues to raise its rate of transmission until it reaches a value called its slowstart threshold. At this point it enters a new phase called congestion avoidance. The purpose of the first phase is to aggressively increase the sending rate, while monitoring acknowledgments from its partner. The second phase serves the purpose of more gradually increasing the rate, assuming that at some point congestion will be encountered. Competition from other flows UDP flows will usually demand a fixed or nearly fixed amount of bandwidth, which lowers the amount of bandwidth available to the TCP entity (it will throttle to the amount available). TCP flows from other stations will cause variable bandwidth use depending on the current state of their flows. Errors in segments or dropped packets that require retransmission Competition for the flow in the reverse direction; while often overlooked, congestion or heavy use of the uplink will slow acknowledgments, decreasing the rate at which a TCP station can download its data. 4 Understanding UC, Adaptive Video, and Data Traffic Interaction

5 The final aspect of TCP to consider is how TCP discovers that congestion exists and its need to slow its transmission rate. It may come as a surprise, but that s the purpose of dropped segments. As TCP begins to saturate the link, buffers fill resulting in packets being discarded. While generally thought to be a bad thing, it s what TCP expects when the link is filled to capacity. Errors at the physical level will cause TCP to assume congestion is present as well and, occasionally, that may be a correct diagnosis. Though, it is not as common as buffer overfill. The typical TCP implementation follows this policy. A packet is discarded, then the sending TCP stack: Receives duplicate acknowledgment of the previous segment (called a dup ACK). Continues to send data, assuming the missing segment is still in the network somewhere. Receives dup ACK #2 and dup ACK #3. Now assumes the packet has been dropped and retransmits it. Looking again at the Stevens graph, we can see that after a few frames, the rate of transmission decreases. That is, the slope of the curve is lower. It gradually climbs back up until at about 42 seconds returns to the previous throughput rate. The Interaction of Various Traffic Types In the first example, consider how FTP/TCP interacts with an HTTP/TCP. Remember that FTP is an application that depends almost entirely on how the TCP algorithm works. Also, adaptive bit rate video typically implemented by Adobe HDS, Microsoft Smooth Streaming, and Apple HLS is a series of short file transfers that depend on the TCP algorithm. Each of these transfers carries about 10 seconds of video. The example, based on a file transfer, coincides with a Netflix adaptive bit rate transfer. Figure 10 shows a Wireshark plot where the total bandwidth uses about 20 Mbps (the black line), which is the capacity of the connection. Cuts the rate at which it is sending frames and re-implements slow start at the lowered level. Wireshark illustrates this in Figure 9 where the left part of the screen shows the packets in this TLS/TCP transfer. This was a capture from an adaptive bit rate video transfer. The client playing the video is at , and the video is being transferred toward that device. Figure 10: FTP interacts with adaptive bit rate video Figure 9: TCP reaction to lost dropped segment The right side of the screen shows a Stevens Sequence graph. It shows sequence numbers on the left axis and time along the bottom axis to the right. Since sequence numbers measure bytes transferred, this graph nicely shows the throughput rate as the slope of the curve. Since this is an adaptive bit rate video transfer, the server usually sends data in chunks representing about 10 seconds of video. At approximately t = 38.5 seconds, we see the end of the last chunk. At about t = 40.6 seconds, the transfer starts again about the same rate. However, this time frame number is out of order because a segment was dropped. The total bandwidth used is nearly what is available, at 20 Mbps. However, when Netflix is transferring data (indicated by the green line), the FTP data transfer slows (indicated by the red line). In fact, the two TCP applications share almost exactly the available connection capacity. When the green transfer data rate is higher, the red FTP data transfer rate is lower. Clearly, the FTP throughput will be limited by the fact that it is sharing the link with another TCP application. 5 Understanding UC, Adaptive Video, and Data Traffic Interaction

6 In the second example, shown in Figure 11, the same FTP application shares bandwidth with another TCP application. However, this time the second application is an upload. In this case, we have an FTP download when a Dropbox upload proceeds. Figure 12: Video conference bandwidth use The result of starting a download with the same video conference session is shown in Figure 13. Figure 11: An FTP download Interacts with an upload In the beginning of the FTP transfer, the full 20 Mbps connection capacity is used, but at about t = 16 seconds the upload of a file to a server competes for the same bandwidth, resulting in several oscillations in total throughput, including a drop in total bandwidth usage to about 6 Mbps. In the previous example, the two applications shared the connection. But why would the upload affect the throughput of the download? The answer is that the ACKs to the download are being delayed while traversing the uplink. It takes a little time until TCP can react properly. When it does at about t = 18 seconds, the total bandwidth approaches the total capacity of the connection: 20 Mbps down + 2 Mbps up. The next example involves a mix of TCP and UDP traffic. First, let s review how a video conference uses the available bandwidth. The black line in Figure 12 shows the total bandwidth used by this conference. It averages about 2 Mbps. These fluctuations primarily are due to the variability compression on each video frame. Since this conference is over a DSL 20 Mbps downlink and 2 Mbps uplink line, we can see that the video is going up (red varies around an average of 2 Mbps.) The video going down is around 500 kbps. This apparent imbalance is because the person at the opposite end from is on a wireless link. This vendor s video conferencing server selected a very low resolution to accommodate the fluctuation inherent in wireless bandwidth. Nevertheless, once the conference is established, the bandwidth fluctuates around a constant average value in each direction. Figure 13: Video conference sharing bandwidth with FTP/TCP Here, the video conference is using about 1 to 2 Mbps. The FTP file transfer adjusts its demand for bandwidth to very slightly less than 20 Mbps. Again, we see the FTP/TCP takes all the bandwidth that it can. 6 Understanding UC, Adaptive Video, and Data Traffic Interaction

7 Conclusions Cisco and others have predicted that networks will continue to carry increasingly more video. Cisco indicated in their Visual Networking Index that video is already more than half of total network traffic, and the amount of video traffic on the Internet may reach 80 percent by It is very likely that such traffic will continue to appear on corporate enterprise networks. In addition, as more employees work from home or on the road, the composition of traffic in the Internet will profoundly impact productivity. As a result, there is a growing need to understand how this traffic interacts with more traditional data and voice traffic. One trend on which to focus is the rapid increase in the use of IP technologies in the audio/video (AV) industry. At major AV trade shows like InfoComm and NAB, which far exceed the size of Interop, the buzz is constantly about IP products. Devices such as cameras, microphones, encoders, audio conference bridges, and digital video recorders (DVRs) are going to increase IP traffic even more. Just as IT absorbed the telecom function during the early part of the twenty-first century, it seems that IT will gradually absorb the AV functions with significant implications to network performance and traffic pattern behavior. This paper highlighted the following key points: IT services that use UDP traffic, such as voice and video conferencing, normally require a relatively fixed amount of bandwidth. When deployed, they will consume network resources at the expense of TCP applications that share the connection. TCP applications are generally either bursty or continually take all of the available link bandwidth. However, the total bandwidth they use will depend on competing traffic and the quality of the network. Understanding the TCP operation is important in determining whether we are seeing good or poor overall service and application performance. The Observer platform from Viavi and the Wireshark network analyzer are tools that can facilitate the understanding of these two protocols and the applications that run over them. They will also help to differentiate between normal protocol operation and performance problems. 7 Understanding UC, Adaptive Video, and Data Traffic Interaction

8 Contact Us GO VIAVI ( ) To reach the Viavi office nearest you, visit viavisolutions.com/contacts Viavi Solutions Inc. Product specifications and descriptions in this document are subject to change without notice. understandinguc-wp-ec-nse-ae viavisolutions.com

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Internetworking Models The OSI Reference Model

Internetworking Models The OSI Reference Model Internetworking Models When networks first came into being, computers could typically communicate only with computers from the same manufacturer. In the late 1970s, the Open Systems Interconnection (OSI)

More information

Page 1. Review: Internet Protocol Stack. Transport Layer Services EEC173B/ECS152C. Review: TCP. Transport Layer: Connectionless Service

Page 1. Review: Internet Protocol Stack. Transport Layer Services EEC173B/ECS152C. Review: TCP. Transport Layer: Connectionless Service EEC7B/ECS5C Review: Internet Protocol Stack Review: TCP Application Telnet FTP HTTP Transport Network Link Physical bits on wire TCP LAN IP UDP Packet radio Do you remember the various mechanisms we have

More information

Chapter 28. Multimedia

Chapter 28. Multimedia Chapter 28. Multimedia 28-1 Internet Audio/Video Streaming stored audio/video refers to on-demand requests for compressed audio/video files Streaming live audio/video refers to the broadcasting of radio

More information

CS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control

CS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control : Computer Networks Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control TCP performance We ve seen how TCP the protocol works Sequencing, receive window, connection setup and teardown And

More information

Chapter III: Transport Layer

Chapter III: Transport Layer Chapter III: Transport Layer UG3 Computer Communications & Networks (COMN) Mahesh Marina mahesh@ed.ac.uk Slides thanks to Myungjin Lee and copyright of Kurose and Ross Principles of congestion control

More information

Page 1. Review: Internet Protocol Stack. Transport Layer Services. Design Issue EEC173B/ECS152C. Review: TCP

Page 1. Review: Internet Protocol Stack. Transport Layer Services. Design Issue EEC173B/ECS152C. Review: TCP EEC7B/ECS5C Review: Internet Protocol Stack Review: TCP Application Telnet FTP HTTP Transport Network Link Physical bits on wire TCP LAN IP UDP Packet radio Transport Layer Services Design Issue Underlying

More information

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

Transmission Control Protocol. ITS 413 Internet Technologies and Applications Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion

More information

CSC 4900 Computer Networks: TCP

CSC 4900 Computer Networks: TCP CSC 4900 Computer Networks: TCP Professor Henry Carter Fall 2017 Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable

More information

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print, ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure

More information

Lab Exercise UDP & TCP

Lab Exercise UDP & TCP Lab Exercise UDP & TCP Objective UDP (User Datagram Protocol) is an alternative communications protocol to Transmission Control Protocol (TCP) used primarily for establishing low-latency and loss tolerating

More information

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste Outline 15-441 Computer Networking Lecture 18 TCP Performance Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 TCP congestion avoidance TCP slow start TCP modeling TCP details 2 AIMD Distributed,

More information

Performance Consequences of Partial RED Deployment

Performance Consequences of Partial RED Deployment Performance Consequences of Partial RED Deployment Brian Bowers and Nathan C. Burnett CS740 - Advanced Networks University of Wisconsin - Madison ABSTRACT The Internet is slowly adopting routers utilizing

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided. 113 Chapter 9 TCP/IP Transport and Application Layer Services that are located in the transport layer enable users to segment several upper-layer applications onto the same transport layer data stream.

More information

9th Slide Set Computer Networks

9th Slide Set Computer Networks Prof. Dr. Christian Baun 9th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 1/49 9th Slide Set Computer Networks Prof. Dr. Christian Baun Frankfurt University of Applied Sciences

More information

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6. Transport Layer 6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6.1 Internet Transport Layer Architecture The

More information

Does current Internet Transport work over Wireless? Reviewing the status of IETF work in this area

Does current Internet Transport work over Wireless? Reviewing the status of IETF work in this area Does current Internet Transport work over Wireless? Reviewing the status of IETF work in this area Sally Floyd March 2, 2000 IAB Workshop on Wireless Internetworking 1 Observations: Transport protocols

More information

Chapter III. congestion situation in Highspeed Networks

Chapter III. congestion situation in Highspeed Networks Chapter III Proposed model for improving the congestion situation in Highspeed Networks TCP has been the most used transport protocol for the Internet for over two decades. The scale of the Internet and

More information

Lecture 11. Transport Layer (cont d) Transport Layer 1

Lecture 11. Transport Layer (cont d) Transport Layer 1 Lecture 11 Transport Layer (cont d) Transport Layer 1 Agenda The Transport Layer (continue) Connection-oriented Transport (TCP) Flow Control Connection Management Congestion Control Introduction to the

More information

Part VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD

Part VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD Part VI Appendixes Appendix A OSI Model and Internet Protocols Appendix B About the CD OSI Model and Internet Protocols APPENDIX A In this appendix, you will Learn about the OSI model Review the network

More information

Troubleshooting OSI Layers 4-7

Troubleshooting OSI Layers 4-7 Troubleshooting OSI Layers 4-7 In this two-part white paper series, learn to quickly locate and resolve problems across the OSI layers using the Troubleshooting Cheat Sheet. The root cause of application

More information

Chapter 3 outline. 3.5 Connection-oriented transport: TCP. 3.6 Principles of congestion control 3.7 TCP congestion control

Chapter 3 outline. 3.5 Connection-oriented transport: TCP. 3.6 Principles of congestion control 3.7 TCP congestion control Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer 3.5 Connection-oriented transport: TCP segment

More information

Chapter 3 Review Questions

Chapter 3 Review Questions Chapter 3 Review Questions. 2. 3. Source port number 6 and destination port number 37. 4. TCP s congestion control can throttle an application s sending rate at times of congestion. Designers of applications

More information

Problem 7. Problem 8. Problem 9

Problem 7. Problem 8. Problem 9 Problem 7 To best answer this question, consider why we needed sequence numbers in the first place. We saw that the sender needs sequence numbers so that the receiver can tell if a data packet is a duplicate

More information

Managing Caching Performance and Differentiated Services

Managing Caching Performance and Differentiated Services CHAPTER 10 Managing Caching Performance and Differentiated Services This chapter explains how to configure TCP stack parameters for increased performance ant throughput and how to configure Type of Service

More information

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014 1 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2014 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion

More information

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015 1 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2015 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion

More information

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Transport Layer Network Fundamentals Chapter 4 Version 4.0 1 Transport Layer Role and Services Transport layer is responsible for overall end-to-end transfer of application data 2 Transport Layer Role

More information

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014 1 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2014 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion

More information

Chapter 3 Transport Layer

Chapter 3 Transport Layer Chapter 3 Transport Layer 1 Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer 3.5 Connection-oriented

More information

CSCD 330 Network Programming Winter 2015

CSCD 330 Network Programming Winter 2015 CSCD 330 Network Programming Winter 2015 Lecture 11a Transport Layer Reading: Chapter 3 Some Material in these slides from J.F Kurose and K.W. Ross All material copyright 1996-2007 1 Chapter 3 Sections

More information

On Inter-layer Assumptions

On Inter-layer Assumptions On Inter-layer Assumptions (A View from the Transport Area) Mark Handley ACIRI/ICSI mjh@aciri.org Ping The Internet Hourglass FTP HTTP NNTP SMTP NFS DNS Applications TCP UDP ICMP IP 802.x PPP SLIP RS232

More information

ETSF10 Internet Protocols Transport Layer Protocols

ETSF10 Internet Protocols Transport Layer Protocols ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.1 Kaan Bür, Jens Andersson Transport Layer Protocols Process-to-process delivery [ed.4 ch.23.1] [ed.5 ch.24.1] Transmission Control

More information

Wireless TCP Performance Issues

Wireless TCP Performance Issues Wireless TCP Performance Issues Issues, transport layer protocols Set up and maintain end-to-end connections Reliable end-to-end delivery of data Flow control Congestion control Udp? Assume TCP for the

More information

The Frozen Mountain irtc White Paper Series

The Frozen Mountain irtc White Paper Series The Frozen Mountain irtc White Paper Series This white paper is the fourth in a series on Internet Based Real Time Communications (irtc) written by Frozen Mountain Software s CTO Anton Venema. The complete

More information

Can Congestion-controlled Interactive Multimedia Traffic Co-exist with TCP? Colin Perkins

Can Congestion-controlled Interactive Multimedia Traffic Co-exist with TCP? Colin Perkins Can Congestion-controlled Interactive Multimedia Traffic Co-exist with TCP? Colin Perkins Context: WebRTC WebRTC project has been driving interest in congestion control for interactive multimedia Aims

More information

COMP/ELEC 429/556 Introduction to Computer Networks

COMP/ELEC 429/556 Introduction to Computer Networks COMP/ELEC 429/556 Introduction to Computer Networks The TCP Protocol Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng at cs.rice.edu

More information

The Essentials of Ethernet Service Activation

The Essentials of Ethernet Service Activation The Essentials of Ethernet Service Activation 3. Multi-Service Y.1564 SAMComplete Solution Brief Global growth in communications and data services is driving increasing demand for Ethernet. As businesses

More information

ETSF05/ETSF10 Internet Protocols Transport Layer Protocols

ETSF05/ETSF10 Internet Protocols Transport Layer Protocols ETSF05/ETSF10 Internet Protocols Transport Layer Protocols 2016 Jens Andersson Transport Layer Communication between applications Process-to-process delivery Client/server concept Local host Normally initialiser

More information

Congestion Control. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Congestion Control. Daniel Zappala. CS 460 Computer Networking Brigham Young University Congestion Control Daniel Zappala CS 460 Computer Networking Brigham Young University 2/25 Congestion Control how do you send as fast as possible, without overwhelming the network? challenges the fastest

More information

Digital Asset Management 5. Streaming multimedia

Digital Asset Management 5. Streaming multimedia Digital Asset Management 5. Streaming multimedia 2015-10-29 Keys of Streaming Media Algorithms (**) Standards (*****) Complete End-to-End systems (***) Research Frontiers(*) Streaming... Progressive streaming

More information

Data & Computer Communication

Data & Computer Communication Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects

More information

Congestion. Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets limited resources

Congestion. Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets limited resources Congestion Source 1 Source 2 10-Mbps Ethernet 100-Mbps FDDI Router 1.5-Mbps T1 link Destination Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets

More information

Chapter 3 outline. 3.5 Connection-oriented transport: TCP. 3.6 Principles of congestion control 3.7 TCP congestion control

Chapter 3 outline. 3.5 Connection-oriented transport: TCP. 3.6 Principles of congestion control 3.7 TCP congestion control Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer 3.5 Connection-oriented transport: TCP segment

More information

No, the bogus packet will fail the integrity check (which uses a shared MAC key).!

No, the bogus packet will fail the integrity check (which uses a shared MAC key).! 1. High level questions a. Suppose Alice and Bob are communicating over an SSL session. Suppose an attacker, who does not have any of the shared keys, inserts a bogus TCP segment into a packet stream with

More information

15-744: Computer Networking TCP

15-744: Computer Networking TCP 15-744: Computer Networking TCP Congestion Control Congestion Control Assigned Reading [Jacobson and Karels] Congestion Avoidance and Control [TFRC] Equation-Based Congestion Control for Unicast Applications

More information

Introduction to Open System Interconnection Reference Model

Introduction to Open System Interconnection Reference Model Chapter 5 Introduction to OSI Reference Model 1 Chapter 5 Introduction to Open System Interconnection Reference Model Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding

More information

To see the details of TCP (Transmission Control Protocol). TCP is the main transport layer protocol used in the Internet.

To see the details of TCP (Transmission Control Protocol). TCP is the main transport layer protocol used in the Internet. Lab Exercise TCP Objective To see the details of TCP (Transmission Control Protocol). TCP is the main transport layer protocol used in the Internet. The trace file is here: https://kevincurran.org/com320/labs/wireshark/trace-tcp.pcap

More information

Congestion control in TCP

Congestion control in TCP Congestion control in TCP If the transport entities on many machines send too many packets into the network too quickly, the network will become congested, with performance degraded as packets are delayed

More information

Introduction to Protocols

Introduction to Protocols Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These

More information

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control Chapter 6 What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control OSI Model Hybrid Model Software outside the operating system Software inside

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 20 MIDTERM EXAMINATION #1 - B COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 20 MIDTERM EXAMINATION #1 - A COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document

More information

UNIT IV TRANSPORT LAYER

UNIT IV TRANSPORT LAYER Transport Layer UNIT IV TRANSPORT LAYER Congestion Control and Quality of Service Ref: Data Communication & Networking, 4 th edition, Forouzan IV-1 DATA TRAFFIC The main focus of congestion control and

More information

Transporting Voice by Using IP

Transporting Voice by Using IP Transporting Voice by Using IP National Chi Nan University Quincy Wu Email: solomon@ipv6.club.tw 1 Outline Introduction Voice over IP RTP & SIP Conclusion 2 Digital Circuit Technology Developed by telephone

More information

Networks Fall This exam consists of 10 problems on the following 13 pages.

Networks Fall This exam consists of 10 problems on the following 13 pages. CSCI 466 Final Networks Fall 2011 Name: This exam consists of 10 problems on the following 13 pages. You may use your two- sided hand- written 8 ½ x 11 note sheet during the exam and a calculator. No other

More information

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2015 1 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion

More information

UNIT 2 TRANSPORT LAYER

UNIT 2 TRANSPORT LAYER Network, Transport and Application UNIT 2 TRANSPORT LAYER Structure Page No. 2.0 Introduction 34 2.1 Objective 34 2.2 Addressing 35 2.3 Reliable delivery 35 2.4 Flow control 38 2.5 Connection Management

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Appendix B. Standards-Track TCP Evaluation

Appendix B. Standards-Track TCP Evaluation 215 Appendix B Standards-Track TCP Evaluation In this appendix, I present the results of a study of standards-track TCP error recovery and queue management mechanisms. I consider standards-track TCP error

More information

Evaluating, Selecting and Deploying WAN Acceleration Solutions

Evaluating, Selecting and Deploying WAN Acceleration Solutions Inspired Innovation White Paper Evaluating, Selecting and Deploying Acceleration Solutions Real-World Testing Sifts Through Conflicting Claims to Identify the True Performance of Competing Solutions January

More information

Outline. TCP: Overview RFCs: 793, 1122, 1323, 2018, steam: r Development of reliable protocol r Sliding window protocols

Outline. TCP: Overview RFCs: 793, 1122, 1323, 2018, steam: r Development of reliable protocol r Sliding window protocols Outline r Development of reliable protocol r Sliding window protocols m Go-Back-N, Selective Repeat r Protocol performance r Sockets, UDP, TCP, and IP r UDP operation r TCP operation m connection management

More information

User Datagram Protocol (UDP):

User Datagram Protocol (UDP): SFWR 4C03: Computer Networks and Computer Security Feb 2-5 2004 Lecturer: Kartik Krishnan Lectures 13-15 User Datagram Protocol (UDP): UDP is a connectionless transport layer protocol: each output operation

More information

4.0.1 CHAPTER INTRODUCTION

4.0.1 CHAPTER INTRODUCTION 4.0.1 CHAPTER INTRODUCTION Data networks and the Internet support the human network by supplying seamless, reliable communication between people - both locally and around the globe. On a single device,

More information

This tutorial shows how to use ACE to Identify the true causes of poor response time Document the problems that are found

This tutorial shows how to use ACE to Identify the true causes of poor response time Document the problems that are found FTP Application Overview This tutorial shows how to use ACE to Identify the true causes of poor response time Document the problems that are found The screen images in this tutorial were captured while

More information

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 23-1 PROCESS-TO-PROCESS DELIVERY The transport

More information

CNT 6885 Network Review on Transport Layer

CNT 6885 Network Review on Transport Layer CNT 6885 Network Review on Transport Layer Jonathan Kavalan, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida User Datagram Protocol [RFC 768] no frills,

More information

TCP Congestion Control

TCP Congestion Control 1 TCP Congestion Control Onwutalobi, Anthony Claret Department of Computer Science University of Helsinki, Helsinki Finland onwutalo@cs.helsinki.fi Abstract This paper is aimed to discuss congestion control

More information

WarpTCP WHITE PAPER. Technology Overview. networks. -Improving the way the world connects -

WarpTCP WHITE PAPER. Technology Overview. networks. -Improving the way the world connects - WarpTCP WHITE PAPER Technology Overview -Improving the way the world connects - WarpTCP - Attacking the Root Cause TCP throughput reduction is often the bottleneck that causes data to move at slow speed.

More information

EqualLogic Storage and Non-Stacking Switches. Sizing and Configuration

EqualLogic Storage and Non-Stacking Switches. Sizing and Configuration EqualLogic Storage and Non-Stacking Switches Sizing and Configuration THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS

More information

EEC-682/782 Computer Networks I

EEC-682/782 Computer Networks I EEC-682/782 Computer Networks I Lecture 16 Wenbing Zhao w.zhao1@csuohio.edu http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser at

More information

TCP so far Computer Networking Outline. How Was TCP Able to Evolve

TCP so far Computer Networking Outline. How Was TCP Able to Evolve TCP so far 15-441 15-441 Computer Networking 15-641 Lecture 14: TCP Performance & Future Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Reliable byte stream protocol Connection establishments

More information

TCP over wireless links

TCP over wireless links CSc 450/550 Computer Communications & Networks TCP over wireless links Jianping Pan (stand-in for Dr. Wu) 1/31/06 CSc 450/550 1 TCP over wireless links TCP a quick review on how TCP works Wireless links

More information

CS 43: Computer Networks. 19: TCP Flow and Congestion Control October 31, Nov 2, 2018

CS 43: Computer Networks. 19: TCP Flow and Congestion Control October 31, Nov 2, 2018 CS 43: Computer Networks 19: TCP Flow and Congestion Control October 31, Nov 2, 2018 Five-layer Internet Model Application: the application (e.g., the Web, Email) Transport: end-to-end connections, reliability

More information

Background: IP Protocol Stack

Background: IP Protocol Stack Networking and protocols for real-time signal transmissions by Hans-Peter Schwefel & Søren Vang Andersen Mm1 Introduction & simple performance models (HPS) Mm2 Real-time Support in Wireless Technologies

More information

Integrated VoIP Audio

Integrated VoIP Audio General Questions, page 1 System Requirements and Technical Information, page 2 Troubleshooting, page 4 General Questions What are the features of Integrated VoIP audio? What is the attendee capacity for

More information

TCP/IP-2. Transmission control protocol:

TCP/IP-2. Transmission control protocol: TCP/IP-2 Transmission control protocol: TCP and IP are the workhorses in the Internet. In this section we first discuss how TCP provides reliable, connectionoriented stream service over IP. To do so, TCP

More information

Intro to LAN/WAN. Transport Layer

Intro to LAN/WAN. Transport Layer Intro to LAN/WAN Transport Layer Transport Layer Topics Introduction (6.1) Elements of Transport Protocols (6.2) Internet Transport Protocols: TDP (6.5) Internet Transport Protocols: UDP (6.4) socket interface

More information

Chapter - 1 INTRODUCTION

Chapter - 1 INTRODUCTION Chapter - 1 INTRODUCTION Worldwide Interoperability for Microwave Access (WiMAX) is based on IEEE 802.16 standard. This standard specifies the air interface of fixed Broadband Wireless Access (BWA) system

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 10

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 10 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 10 1 Midterm exam Midterm next Thursday Close book but one-side 8.5"x11" note is allowed (must

More information

TCP and BBR. Geoff Huston APNIC

TCP and BBR. Geoff Huston APNIC TCP and BBR Geoff Huston APNIC Computer Networking is all about moving data The way in which data movement is controlled is a key characteristic of the network architecture The Internet protocol passed

More information

CS4700/CS5700 Fundamentals of Computer Networks

CS4700/CS5700 Fundamentals of Computer Networks CS4700/CS5700 Fundamentals of Computer Networks Lecture 15: Congestion Control Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CCNA Exploration1 Chapter 7: OSI Data Link Layer CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the

More information

Transport Layer TCP / UDP

Transport Layer TCP / UDP Transport Layer TCP / UDP Chapter 6 section 6.5 is TCP 12 Mar 2012 Layers Application Transport Why do we need the Transport Layer? Network Host-to-Network/Physical/DataLink High Level Overview TCP (RFC

More information

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16 Guide To TCP/IP, Second Edition Chapter 5 Transport Layer TCP/IP Protocols Objectives Understand the key features and functions of the User Datagram Protocol (UDP) Explain the mechanisms that drive segmentation,

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Impact of TCP Window Size on a File Transfer

Impact of TCP Window Size on a File Transfer Impact of TCP Window Size on a File Transfer Introduction This example shows how ACE diagnoses and visualizes application and network problems; it is not a step-by-step tutorial. If you have experience

More information

ETSF10 Internet Protocols Transport Layer Protocols

ETSF10 Internet Protocols Transport Layer Protocols ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.2 Kaan Bür, Jens Andersson Transport Layer Protocols Special Topic: Quality of Service (QoS) [ed.4 ch.24.1+5-6] [ed.5 ch.30.1-2]

More information

UDP Traffic Management

UDP Traffic Management Packeteer Technical White Paper Series UDP Traffic Management May 2002 Packeteer, Inc. 10495 N. De Anza Blvd. Cupertino, CA 95014 408.873.4400 info@packeteer.com www.packeteer.com Company and product names

More information

EEC-484/584 Computer Networks. Lecture 16. Wenbing Zhao

EEC-484/584 Computer Networks. Lecture 16. Wenbing Zhao EEC-484/584 Computer Networks Lecture 16 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review Services provided by transport layer

More information

FUJITSU Software Interstage Information Integrator V11

FUJITSU Software Interstage Information Integrator V11 FUJITSU Software V11 An Innovative WAN optimization solution to bring out maximum network performance October, 2013 Fujitsu Limited Contents Overview Key technologies Supported network characteristics

More information

Outline Computer Networking. Functionality Split. Transport Protocols

Outline Computer Networking. Functionality Split. Transport Protocols Outline 15-441 15 441 Computer Networking 15-641 Lecture 10: Transport Protocols Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15 441 F17 Transport introduction TCP connection establishment

More information

Communication Networks

Communication Networks Communication Networks Spring 2018 Laurent Vanbever nsg.ee.ethz.ch ETH Zürich (D-ITET) April 30 2018 Materials inspired from Scott Shenker & Jennifer Rexford Last week on Communication Networks We started

More information

CSC 8560 Computer Networks: TCP

CSC 8560 Computer Networks: TCP CSC 8560 Computer Networks: TCP Professor Henry Carter Fall 2017 Project 2: mymusic You will be building an application that allows you to synchronize your music across machines. The details of which are

More information

CS419: Computer Networks. Lecture 10, Part 3: Apr 13, 2005 Transport: TCP performance

CS419: Computer Networks. Lecture 10, Part 3: Apr 13, 2005 Transport: TCP performance : Computer Networks Lecture 10, Part 3: Apr 13, 2005 Transport: TCP performance TCP performance We ve seen how TCP the protocol works But there are a lot of tricks required to make it work well Indeed,

More information

Transport Layer Protocols TCP

Transport Layer Protocols TCP Transport Layer Protocols TCP Gail Hopkins Introduction Features of TCP Packet loss and retransmission Adaptive retransmission Flow control Three way handshake Congestion control 1 Common Networking Issues

More information

UDP, TCP, IP multicast

UDP, TCP, IP multicast UDP, TCP, IP multicast Dan Williams In this lecture UDP (user datagram protocol) Unreliable, packet-based TCP (transmission control protocol) Reliable, connection oriented, stream-based IP multicast Process-to-Process

More information

TCP Congestion Control

TCP Congestion Control TCP Congestion Control What is Congestion The number of packets transmitted on the network is greater than the capacity of the network Causes router buffers (finite size) to fill up packets start getting

More information