Go-Back-N. Pipelining: increased utilization. Pipelined protocols. GBN: sender extended FSM

Similar documents
CNT 6885 Network Review on Transport Layer

Lecture 8. TCP/IP Transport Layer (2)

Chapter 3 Transport Layer

32 bits. source port # dest port # sequence number acknowledgement number not used. checksum. Options (variable length)

CC451 Computer Networks

Chapter 3 outline. 3.5 Connection-oriented transport: TCP. 3.6 Principles of congestion control 3.7 TCP congestion control

Transport Layer: outline

Correcting mistakes. TCP: Overview RFCs: 793, 1122, 1323, 2018, TCP seq. # s and ACKs. GBN in action. TCP segment structure

Chapter 3 outline. 3.5 Connection-oriented transport: TCP. 3.6 Principles of congestion control 3.7 TCP congestion control

Chapter 3- parte B outline

TCP: Overview RFCs: 793, 1122, 1323, 2018, 2581

Chapter 3 outline. 3.5 Connection-oriented transport: TCP. 3.6 Principles of congestion control 3.7 TCP congestion control

Lecture 08: The Transport Layer (Part 2) The Transport Layer Protocol (TCP) Dr. Anis Koubaa

Transport Layer: Outline

Outline. TCP: Overview RFCs: 793, 1122, 1323, 2018, Development of reliable protocol Sliding window protocols

CSE 4213: Computer Networks II

Suprakash Datta. Office: CSEB 3043 Phone: ext Course page:

Chapter 3 outline. TDTS06 Computer networks. Principles of Reliable data transfer. Reliable data transfer: getting started

Master Course Computer Networks IN2097

Outline. TCP: Overview RFCs: 793, 1122, 1323, 2018, steam: r Development of reliable protocol r Sliding window protocols

Chapter 3 Transport Layer

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 9

Chapter 3 Transport Layer

Chapter 3 outline. 3.5 connection-oriented transport: TCP segment structure reliable data transfer flow control connection management

Chapter 3 Transport Layer

Chapter III: Transport Layer

Lecture 11. Transport Layer (cont d) Transport Layer 1

CSC 8560 Computer Networks: TCP

By Ossi Mokryn, Based also on slides from: the Computer Networking: A Top Down Approach Featuring the Internet by Kurose and Ross

Chapter 3: Transport Layer. Chapter 3 Transport Layer. Chapter 3 outline. Transport services and protocols

Chapter 3: Transport Layer. Chapter 3 Transport Layer. Chapter 3 outline. Transport services and protocols

Chapter 3 Transport Layer

CSC358 Week 5. Adapted from slides by J.F. Kurose and K. W. Ross. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved

TCP (Part 2) Session 10 INST 346 Technologies, Infrastructure and Architecture

Computer Networking Introduction

TCP reliable data transfer. Chapter 3 outline. TCP sender events: TCP sender (simplified) TCP: retransmission scenarios. TCP: retransmission scenarios

TCP: Overview RFCs: 793,1122,1323, 2018, 2581

10 minutes survey (anonymous)

Chapter 3 Transport Layer

Computer Networks. Transport Layer

Chapter 3 Transport Layer

CS Lecture 1 Review of Basic Protocols

Chapter 3 Transport Layer

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Chapter 3: Transport Layer. Computer Networks. Transport Layer. Transport services and protocols. Chapter 3 outline. Bu-Ali Sina University, Hamedan

Computer Networks. 3.Transport Layer. Transport Layer - 1

Chapter 3 Transport Layer

CS 4390 Computer Networks. Pointers to Corresponding Section of Textbook

Chapter 3 Transport Layer

CSC 401 Data and Computer Communications Networks

Lecture 5. Transport Layer. Transport Layer 1-1

Chapter 3 Transport Layer

Fall 2012: FCM 708 Bridge Foundation I

Computer Networking: A Top Down Approach

Chapter 3 Transport Layer

Chapter 3. Kultida Rojviboonchai, Ph.D. Dept. of Computer Engineering Faculty of Engineering Chulalongkorn University

Distributed Systems. 5. Transport Protocols. Werner Nutt

Chapter 3: Transport Layer. Chapter 3 Transport Layer. Transport layer. Position of transport layer. Transport layer.

COMP 431 Internet Services & Protocols. Transport Layer Protocols & Services Outline. The Transport Layer Reliable data delivery & flow control in TCP

RSC Part III: Transport Layer 3. TCP

Pipelined protocols: overview

Chapter 3 Transport Layer

Distributed Systems. 5. Transport Protocols

Lecture 11: Transport Layer Reliable Data Transfer and TCP

Chapter III: Transport Layer

Chapter 3 Transport Layer

Chapter 3 Transport Layer

Chapter 3 Transport Layer

CSCI Topics: Internet Programming Fall 2008

CSC 4900 Computer Networks: TCP

Foundations of Telematics

Master Course Computer Networks IN2097

Chapter 3 Transport Layer. Chapter 3: Transport Layer. Chapter 3 outline. Our goals: understand principles behind transport layer services:

Chapter 3 Transport Layer

Chapter 3 Transport Layer

Chapter 3: Transport Layer

CSC 401 Data and Computer Communications Networks

LECTURE 3 - TRANSPORT LAYER

Transport services and protocols. Chapter 3 Transport Layer. Chapter 3: Transport Layer. Transport vs. network layer

Transport layer. Review principles: Instantiation in the Internet UDP TCP. Reliable data transfer Flow control Congestion control

Chapter 3: Transport Layer. Chapter 3 Transport Layer. Transport Services and Protocols. Chapter 3 Outline

Chapter 3 outline. 3.5 connection-oriented transport: TCP segment structure reliable data transfer flow control connection management

Chapter 3 Transport Layer

The Transport Layer Reliable data delivery & flow control in TCP. Transport Layer Protocols & Services Outline

Chapter 3 Transport Layer

CSCD 330 Network Programming

Transport layer. UDP: User Datagram Protocol [RFC 768] Review principles: Instantiation in the Internet UDP TCP

-% % ($) % % % * % + & ' ! $ % $ $. / 0$! /1 2! /3 = >? A = ! " #!! $ %! $ $! $ % " #, * % " # % $ " $ 4 5$6 /778 $6 4 5

CSCE 463/612 Networks and Distributed Processing Spring 2017

Chapter 3. Transport Layer. Computer Networking: A Top Down Approach 5th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009.

Chapter 3 Transport Layer. Chapter 3: Transport Layer. Chapter 3 outline

CSCE 463/612 Networks and Distributed Processing Spring 2018

Computer Networks & Security 2016/2017

CMSC 332 Computer Networks Reliable Data Transfer

Flow and Congestion Control (Hosts)

Chapter 3 outline. Chapter 3: Transport Layer. Transport vs. network layer. Transport services and protocols. Internet transport-layer protocols

CS 3516: Advanced Computer Networks

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 10

TCP. TCP: Overview. TCP Segment Structure. Maximum Segment Size (MSS) Computer Networks 10/19/2009. CSC 257/457 - Fall

CSC 4900 Computer Networks: Reliable Data Transport

Transcription:

Pipelined protocols Pipelining: sender allows multiple, in-flight, yet-to-be-acknowledged pkts range of sequence numbers must be increased buffering at sender and/or receiver Pipelining: increased utilization first packet bit transmitted, t = 0 last bit transmitted, t = L / R RTT ACK arrives, send next packet, t = RTT + L / R sender receiver first packet bit arrives last packet bit arrives, send ACK last bit of 2 nd packet arrives, send ACK last bit of 3 rd packet arrives, send ACK Increase utilization by a factor of 3! Two generic forms of pipelined protocols: go- Back-N, selective repeat U sender = 3 * L / R RTT + L / R =.024 30.008 = 0.0008 Go-Back-N Sender: k-bit seq # in pkt header window of up to N, consecutive unack ed pkts allowed ACK(n): ACKs all pkts up to, including seq # n - cumulative ACK A single timer timeout(n): retransmit pkt n and all higher seq # pkts in window GBN: sender extended FSM Λ base=1 nextseqnum=1 rdt_rcv(rcvpkt) && corrupt(rcvpkt) Λ rdt_send(data) if (nextseqnum < base+n) { sndpkt[nextseqnum] = make_pkt(nextseqnum,data,chksum) udt_send(sndpkt[nextseqnum]) if (base == nextseqnum) start_timer nextseqnum++ } else refuse_data(data) Wait rdt_rcv(rcvpkt) && notcorrupt(rcvpkt) base = getacknum(rcvpkt)+1 If (base == nextseqnum) stop_timer else start_timer timeout start_timer udt_send(sndpkt[base]) udt_send(sndpkt[base+1]) udt_send(sndpkt[nextseqnum-1])

GBN: receiver extended FSM default udt_send(sndpkt) Λ expectedseqnum=1 Wait sndpkt = make_pkt(expectedseqnum,ack,chksum) rdt_rcv(rcvpkt) && notcurrupt(rcvpkt) && hasseqnum(rcvpkt,expectedseqnum) extract(rcvpkt,data) deliver_data(data) sndpkt = make_pkt(expectedseqnum,ack,chksum) udt_send(sndpkt) expectedseqnum++ GBN in action ACK-only: always send ACK for correctly-received pkt with highest in-order seq # may generate duplicate ACKs need only remember expectedseqnum out-of-order pkt: discard (don t buffer) -> no receiver buffering! Re-ACK pkt with highest in-order seq # Selective Repeat receiver individually acknowledges all correctly received pkts buffers pkts, as needed, for eventual in-order delivery to upper layer sender only resends pkts for which ACK not received sender timer for each unacked pkt sender window N consecutive seq # s again limits # of sent, unacked pkts Selective repeat: sender, receiver windows

Selective repeat sender data from above : if next available seq # in window, send pkt timeout(n): resend pkt n, restart timer ACK(n) in [sendbase,sendbase+n]: mark pkt n as received if n is the smallest unacked pkt, advance window base to next unacked seq # receiver pkt n in [rcvbase, rcvbase+n-1] send ACK(n) out-of-order: buffer in-order: deliver (also deliver buffered, inorder pkts), advance window to next not-yetreceived pkt pkt n in [rcvbase-n,rcvbase-1] Send ACK(n) otherwise: ignore Selective repeat in action Example: seq # s: 0, 1, 2, 3 window size=3 receiver sees no difference in two scenarios! incorrectly passes duplicate data as new in (a) Q: what relationship between seq # size Selective repeat: dilemma 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer Chapter 3 outline 3.5 Connectionoriented transport: segment structure reliable data transfer flow control connection management 3.6 Principles of 3.7 congestion control

socket door : Overview RFCs: 793, 1122, 1323, 2018, 2581 point-to-point: one sender, one receiver reliable, in-order byte steam: no message boundaries pipelined: congestion and application writes data flow control set send buffer window size segment send & receive buffers application reads data receive buffer socket door full duplex data: bi-directional data flow in same connection MSS: maximum segment size connection-oriented: handshaking (exchange of control msgs) init s sender, receiver state before data exchange flow controlled: URG: urgent data (generally not used) ACK: ACK # valid PSH: push data now (generally not used) RST, SYN, FIN: connection estab (setup, teardown commands) Internet checksum (as in UDP) segment structure 32 bits source port # dest port # head len sequence number acknowledgement number not used checksum UAP R SF Receive window Urg data pnter Options (variable length) application data (variable length) counting by bytes of data (not segments!) # bytes rcvr willing to accept for flow control Seq. # s: seq. # s and ACKs byte stream number of first byte in segment s data ACKs: seq # of next byte expected from other side cumulative ACK Q: how receiver handles out-oforder segments A: spec User types C host ACKs receipt of echoed C Seq=42, ACK=79, data = C Seq=79, ACK=43, data = C Seq=43, ACK=80 simple telnet scenario host ACKs receipt of C, echoes back C time Round Trip Time and Timeout Q: how to set timeout value? longer than RTT but RTT varies too short: premature timeout unnecessary retransmissions too long: slow reaction to segment loss Q: how to estimate RTT? SampleRTT: measured time from segment transmission until ACK receipt ignore retransmissions SampleRTT will vary, want estimated RTT smoother average several recent measurements, not just current SampleRTT

Round Trip Time and Timeout EstimatedRTT = (1- α)*estimatedrtt + α*samplertt Exponential weighted moving average influence of past sample decreases exponentially fast typical value: α = 0.125 RTT (milliseconds) 350 300 250 200 Example RTT estimation: RTT: gaia.cs.umass.edu to fantasia.eurecom.fr 150 100 1 8 15 22 29 36 43 50 57 64 71 78 85 92 99 106 time (seconnds) SampleRTT Estimated RTT Round Trip Time and Timeout Setting the timeout EstimtedRTT plus safety margin large variation in EstimatedRTT -> larger safety margin first estimate of how much SampleRTT deviates from EstimatedRTT: DevRTT = (1-β)*DevRTT + β* SampleRTT-EstimatedRTT (typically, β = 0.25) Then set timeout interval: TimeoutInterval = EstimatedRTT + 4*DevRTT 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer Chapter 3 outline 3.5 Connectionoriented transport: segment structure reliable data transfer flow control connection management 3.6 Principles of 3.7 congestion control

reliable data transfer creates rdt service on top of IP s unreliable service Pipelined segments Cumulative acks uses single retransmission timer Retransmissions are triggered by: timeout events duplicate acks Initially consider simplified sender: ignore duplicate acks ignore flow control, sender events: data rcvd from app: Create segment with seq # seq # is byte-stream number of first data byte in segment start timer if not already running (think of timer as for oldest unacked segment) expiration interval: TimeOutInterval timeout: retransmit segment that caused timeout restart timer Ack rcvd: If acknowledges previously unacked segments update what is known to be acked start timer if there are outstanding segments NextSeqNum = InitialSeqNum SendBase = InitialSeqNum loop (forever) { switch(event) event: data received from application above create segment with sequence number NextSeqNum if (timer currently not running) start timer pass segment to IP NextSeqNum = NextSeqNum + length(data) event: timer timeout retransmit not-yet-acknowledged segment with smallest sequence number start timer event: ACK received, with ACK field value of y if (y > SendBase) { SendBase = y if (there are currently not-yet-acknowledged segments) start timer } } /* end of loop forever */ sender (simplified) Comment: SendBase-1: last cumulatively ack ed byte Example: SendBase-1 = 71; y= 73, so the rcvr wants 73+ ; y > SendBase, so that new data is acked : retransmission scenarios timeout SendBase = 100 time Seq=92, 8 bytes data X loss ACK=100 Seq=92, 8 bytes data ACK=100 lost ACK scenario Sendbase = 100 SendBase = 120 SendBase = 120 Seq=92 timeout Seq=92 timeout time Seq=100, 20 bytes data ACK=100 Seq=92, 8 bytes data ACK=120 Seq=92, 8 bytes data ACK=120 premature timeout

SendBase = 120 retransmission scenarios (more) timeout Seq=92, 8 bytes data X loss Seq=100, 20 bytes data ACK=120 ACK=100 ACK generation [RFC 1122, RFC 2581] Event at Receiver Arrival of in-order segment with expected seq #. All data up to expected seq # already ACKed Arrival of in-order segment with expected seq #. One other segment has ACK pending Arrival of out-of-order segment higher-than-expect seq. #. Gap detected Receiver action Delayed ACK. Wait up to 500ms for next segment. If no next segment, send ACK Immediately send single cumulative ACK, ACKing both in-order segments Immediately send duplicate ACK, indicating seq. # of next expected byte time Cumulative ACK scenario Arrival of segment that partially or completely fills gap Immediate send ACK, provided that segment starts at lower end of gap Fast Retransmit Fast retransmit algorithm: Time-out period often relatively long: long delay before resending lost packet Detect lost segments via duplicate ACKs. Sender often sends many segments backto-back If segment is lost, there will likely be many duplicate ACKs. If sender receives 3 ACKs for the same data, it supposes that segment after ACKed data was lost: fast retransmit: resend segment before timer expires event: ACK received, with ACK field value of y if (y > SendBase) { SendBase = y if (there are currently not-yet-acknowledged segments) start timer } else { increment count of dup ACKs received for y if (count of dup ACKs received for y = 3) { resend segment with sequence number y } a duplicate ACK for already ACKed segment fast retransmit

3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer Chapter 3 outline 3.5 Connectionoriented transport: segment structure reliable data transfer flow control connection management 3.6 Principles of 3.7 congestion control receive side of connection has a receive buffer: app process may be slow at reading from buffer Flow Control flow control sender won t overflow receiver s buffer by transmitting too much, too fast speed-matching service: matching the send rate to the receiving app s drain rate Flow control: how it works Chapter 3 outline (Suppose receiver discards out-of-order segments) spare room in buffer = RcvWindow = RcvBuffer- [LastByteRcvd - LastByteRead] Rcvr advertises spare room by including value of RcvWindow in segments Sender limits unacked data to RcvWindow guarantees receive buffer doesn t overflow 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer 3.5 Connectionoriented transport: segment structure reliable data transfer flow control connection management 3.6 Principles of 3.7 congestion control

Connection Management Recall: sender, receiver establish connection before exchanging data segments initialize variables: seq. #s buffers, flow control info (e.g. RcvWindow) client: connection initiator Socket clientsocket = new Socket("hostname","port number"); Three way handshake: Step 1: client host sends SYN segment to server specifies initial seq # no data Step 2: server host receives SYN, replies with SYNACK segment server allocates buffers specifies server initial seq. # Step 3: client receives Connection Management (cont.) Closing a connection: client closes socket: clientsocket.close (); Step 1: client end system sends FIN control segment to server Step 2: server receives FIN, replies with ACK. Closes connection, sends FIN. close timed wait closed client FIN ACK FIN ACK server close Connection Management (cont.) Connection Management (cont) Step 3: client receives FIN, replies with ACK. Enters timed wait - will respond with ACK to received FINs Step 4: server, receives ACK. Connection closed. closing timed wait client FIN ACK FIN ACK server closing closed client lifecycle server lifecycle closed

Chapter 3 outline Principles of Congestion Control 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer 3.5 Connectionoriented transport: segment structure reliable data transfer flow control connection management 3.6 Principles of 3.7 congestion control Congestion: informally: too many sources sending too much data too fast for network to handle different from flow control! manifestations: lost packets (buffer overflow at routers) long delays (queueing in router buffers) a top-10 problem! Causes/costs of congestion: scenario 1 Causes/costs of congestion: scenario 2 two senders, two receivers one router, infinite buffers λ in : original data unlimited shared output link buffers λ out one router, finite buffers sender retransmission of lost packet λ in : original data λ out no retransmission large delays when congested λ' in : original data, plus retransmitted data finite shared output link buffers maximum achievable throughput

Causes/costs of congestion: scenario 2 always: λ = λ (goodput) in out perfect retransmission only when loss: λ > λ in out λ retransmission of delayed (not lost) packet makes in λ larger (than perfect case) for out same R/2 R/2 R/2 R/3 λ out λ out λ out R/4 Causes/costs of congestion: scenario 3 four senders multihop paths timeout/retransmit λ in Q: what happens as and increase? λ in : original data λ in λ' in : original data, plus retransmitted data finite shared output link buffers λ out Host C λ in a. R/2 costs of congestion: more work (retrans) for given goodput λ in b. unneeded retransmissions: link carries multiple copies of pkt R/2 λ in c. R/2 Host D Causes/costs of congestion: scenario 3 Another cost of congestion: when packet dropped, any upstream transmission capacity used for that packet was wasted! H o s t B H o s t A λ o u t Approaches towards Two broad approaches towards congestion control: End-end congestion Network-assisted control: : no explicit feedback from routers provide network feedback to end congestion inferred from systems end-system observed single bit indicating loss, delay congestion (SNA, approach taken by DECbit, /IP ECN, ATM) explicit rate sender should send at

Chapter 3 outline Congestion Control 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer 3.5 Connectionoriented transport: segment structure reliable data transfer flow control connection management 3.6 Principles of 3.7 congestion control end-end control (no network assistance) sender limits transmission: LastByteSent- LastByteAcked CongWin rate = Roughly, CongWin RTT CongWin is dynamic, function of perceived Bytes/sec How does sender perceive congestion? loss event = timeout or 3 duplicate acks sender reduces rate (CongWin) after loss event three mechanisms: AIMD slow start conservative after timeout events 24 Kbytes 16 Kbytes 8 Kbytes AIMD multiplicative decrease: cut CongWin in half after loss event congestion window Long-lived connection additive increase: increase CongWin by 1 MSS every RTT in the absence of loss events: probing time When connection begins, CongWin = 1 MSS Example: MSS = 500 bytes & RTT = 200 msec initial rate is about 20 kbps available bandwidth may be >> MSS/RTT desirable to quickly ramp up to respectable rate Slow Start When connection begins, increase rate exponentially fast until first loss event

Slow Start (more) When connection begins, increase rate exponentially until first loss event: double CongWin every RTT done by incrementing CongWin for every ACK received Summary: initial rate is slow but ramps up exponentially fast RTT one segment two segments four segments time After 3 dup ACKs: CongWin is cut in half window then grows linearly Refinement But after timeout event: CongWin instead set to 1 MSS; window then grows exponentially to a threshold, then Philosophy: 3 dup ACKs indicates network capable of delivering some segments timeout before 3 dup ACKs is more alarming Refinement (more) Q: When should the exponential increase switch to linear? A: When CongWin gets to 1/2 of its value before timeout. Implementation: Variable Threshold At loss event, Threshold is set to 1/2 of CongWin just before loss event Summary: Congestion Control When CongWin is below Threshold, sender in slow-start phase, window grows exponentially. When CongWin is above Threshold, sender is in congestion-avoidance phase, window grows linearly. When a triple duplicate ACK occurs, Threshold set to CongWin/2 and CongWin set to Threshold. When timeout occurs, Threshold set to

Event ACK receipt for previously unacked data ACK receipt for previously unacked data Loss event detected by triple duplicate ACK Timeout Duplicate ACK sender congestion control State Slow Start (SS) Congestio n Avoidanc e (CA) SS or CA SS or CA SS or CA Sender Action CongWin = CongWin + MSS, If (CongWin > Threshold) set state to Congestion Avoidance CongWin = CongWin+MSS * (MSS/CongWin) Threshold = CongWin/2, CongWin = Threshold, Set state to Congestion Avoidance Threshold = CongWin/2, CongWin = 1 MSS, Set state to Slow Start Increment duplicate ACK count for segment being acked Commentary Resulting in a doubling of CongWin every RTT Additive increase, resulting in increase of CongWin by 1 MSS every RTT Fast recovery, implementing multiplicative decrease. CongWin will not drop below 1 MSS. Enter slow start CongWin and Threshold not changed throughput What s the average throughout of as a function of window size and RTT? Ignore slow start Let W be the window size when loss occurs. When window is W, throughput is W/RTT Just after loss, window drops to W/2, throughput to W/2RTT. Average throughout:.75 W/RTT Futures Example: 1500 byte segments, 100ms RTT, want 10 Gbps throughput Requires window size W = 83,333 in-flight segments Throughput in terms of loss rate: 1.22 MSS RTT L = 2 10-10 Wow New versions of for high-speed needed! L Fairness goal: if K sessions share same bottleneck link of bandwidth R, each should have average rate of R/K connection 1 connection 2 Fairness bottleneck router capacity R

Why is fair? Two competing sessions: Additive increase gives slope of 1, as throughout increases multiplicative R decrease equal decreases bandwidth share throughput proportionally Connection 2 throughput Connection 1 throughput loss: decrease window by factor of 2 congestion avoidance: additive increase loss: decrease window by factor of 2 congestion avoidance: additive increase R Fairness and UDP Multimedia apps often do not use do not want rate throttled by Instead use UDP: pump audio/video at constant rate, tolerate packet loss Research area: friendly Fairness (more) Fairness and parallel connections nothing prevents app from opening parallel connections between 2 hosts. Web browsers do this Example: link of rate R supporting 9 connections; new app asks for 1, gets rate R/10 new app asks for 11 s, gets R/2! Chapter 3: Summary principles behind transport layer services: multiplexing, demultiplexing reliable data transfer flow control instantiation and implementation in the Internet UDP Next: leaving the network edge (application, transport layers) into the network core