Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4690: Experimental Networking Informal Quiz: TCP Shiv Kalyanaraman:

Slides:



Advertisements
Similar presentations
Michele Pagano – A Survey on TCP Performance Evaluation and Modeling 1 Department of Information Engineering University of Pisa Network Telecomunication.
Advertisements

7. 7 Chapter 13 Transmission Control Protocol (TCP) Retransmission and Time-Out.
TCP Congestion Control
Computer Networks Transport Layer. Topics F Introduction (6.1)  F Connection Issues ( ) F TCP (6.4)
Computer Networks: TCP Congestion Control 1 TCP Congestion Control Lecture material taken from “Computer Networks A Systems Approach”, Fourth Edition,Peterson.
Congestion Control An Overview -Jyothi Guntaka. Congestion  What is congestion ?  The aggregate demand for network resources exceeds the available capacity.
Explicit Congestion Notification (ECN) RFC 3168 Justin Yackoski DEGAS Networking Group CISC856 – TCP/IP Thanks to Namratha Hundigopal.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Spring 2007, Exam 1 SOLUTIONS Time: 75 min (strictly enforced)
School of Information Technologies TCP Congestion Control NETS3303/3603 Week 9.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #05: SOLUTIONS Shivkumar Kalyanaraman: GOOGLE: “Shiv.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #07 Shivkumar Kalyanaraman: GOOGLE: “Shiv RPI”
Introduction to Congestion Control
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 TCP (Part II) Shivkumar Kalyanaraman Rensselaer Polytechnic Institute
TDC365 Spring 2001John Kristoff - DePaul University1 Internetworking Technologies Transmission Control Protocol (TCP)
Explicit Congestion Notification ECN Tilo Hamann Technical University Hamburg-Harburg, Germany.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Exam 2 Time: 75 min (strictly enforced) Points: 50 YOUR NAME: Be.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 TCP Congestion Control: AIMD and Binomial Shivkumar Kalyanaraman Rensselaer Polytechnic Institute.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 TCP Congestion Control and Common AQM Schemes: Quick Revision Shivkumar Kalyanaraman Rensselaer.
Shivkumar KalyanaramanRensselaer Q1-1 ECSE-6600: Internet Protocols Quiz 1 Time: 60 min (strictly enforced) Points: 50 YOUR NAME: Be brief, but DO NOT.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4963: Experimental Networking Informal Quiz Shivkumar Kalyanaraman:
1 TCP Transport Control Protocol Reliable In-order delivery Flow control Responds to congestion “Nice” Protocol.
Congestion Avoidance and Control Van Jacobson Jonghyun Kim April 1, 2004.
1 Internet Networking Spring 2003 Tutorial 11 Explicit Congestion Notification (RFC 3168)
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Informal Quiz 3 True or False? T F  The Nagle algorithm in TCP is intended to allow the ack.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz Shivkumar Kalyanaraman: Informal.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #8 Explicit Congestion Notification (RFC 3168) Limited Transmit.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4670: Computer Communications Netwoks Exam 1: SOLUTIONS Time: 75 min (strictly enforced)
TCP in Heterogeneous Network Md. Ehtesamul Haque # P.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-1 TCP Shivkumar Kalyanaraman Rensselaer Polytechnic Institute
Advanced Computer Networks: TCP Congestion Control 1 TCP Congestion Control Lecture material taken from “Computer Networks A Systems Approach”, Fourth.
Rensselaer Polytechnic Institute © Shivkumar Kalvanaraman & © Biplab Sikdar1 ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 1 Shivkumar.
CMPE 257 Spring CMPE 257: Wireless and Mobile Networking Spring 2005 E2E Protocols (point-to-point)
TCP Congestion Control
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 1 (Solutions) Shivkumar Kalyanaraman:
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 TCP (Part II) Shivkumar Kalyanaraman Rensselaer Polytechnic Institute
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Informal Quiz 2 True or False? T F  The IP checksum protects the entire IP datagram 
Transport Layer3-1 Chapter 3 outline r 3.1 Transport-layer services r 3.2 Multiplexing and demultiplexing r 3.3 Connectionless transport: UDP r 3.4 Principles.
Link Scheduling & Queuing COS 461: Computer Networks
Transport over Wireless Networks Myungchul Kim
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 A TCP Friendly Traffic Marker for IP Differentiated Services Feroz Azeem, Shiv Kalyanaraman,
1 TCP: Reliable Transport Service. 2 Transmission Control Protocol (TCP) Major transport protocol used in Internet Heavily used Completely reliable transfer.
CSE679: Computer Network Review r Review of the uncounted quiz r Computer network review.
TCP Trunking: Design, Implementation and Performance H.T. Kung and S. Y. Wang.
Chapter 24 Transport Control Protocol (TCP) Layer 4 protocol Responsible for reliable end-to-end transmission Provides illusion of reliable network to.
Lecture 9 – More TCP & Congestion Control
What is TCP? Connection-oriented reliable transfer Stream paradigm
CS640: Introduction to Computer Networks Aditya Akella Lecture 15 TCP – III Reliability and Implementation Issues.
Computer Networking Lecture 18 – More TCP & Congestion Control.
1 CS 4396 Computer Networks Lab TCP – Part II. 2 Flow Control Congestion Control Retransmission Timeout TCP:
Reliable Transport II: TCP and Congestion Control Brad Karp UCL Computer Science CS 6007/GC15/GA07 5 th, 9 th March, 2009.
CS640: Introduction to Computer Networks Aditya Akella Lecture 15 TCP – III Reliability and Implementation Issues.
TCP Congestion Control Computer Networks TCP Congestion Control 1.
TCP Congestion Control
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Spring 2007, Exam 1 Time: 75 min (strictly enforced) Points: 50.
Explicit Congestion Notification (ECN) RFC 3168
TCP continued. Discussion – TCP Throughput TCP will most likely generate the saw tooth type of traffic. – A rough estimate is that the congestion window.
Transport Layer: Sliding Window Reliability
Peer-to-Peer Networks 13 Internet – The Underlay Network
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
Ch 3. Transport Layer Myungchul Kim
Internet Networking recitation #9
Chapter 3 outline 3.1 transport-layer services
COMP 431 Internet Services & Protocols
Introduction to Congestion Control
Internet Networking recitation #10
TCP Congestion Control
ECSE-4670: Computer Communication Networks (CCN)
Transport Layer: Congestion Control
Review of Internet Protocols Transport Layer
Presentation transcript:

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4690: Experimental Networking Informal Quiz: TCP Shiv Kalyanaraman: Informal Quiz: TCP Shiv Kalyanaraman:

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 2 TCP  TCP can re-assemble IP fragments  Path-MTU refers to the procedure of finding the minimum MTU of the path to reduce the probability of fragmentation.  The IP header checksum field is the 16-bit two’s complement of the one’s complement sum of all 16-bit words in the header.  TCP provides reliability only at a packet-level.  Transport protocols are minimally required because IP does not provide application multiplexing support  TCP is called “self-clocking” because the source sends traffic whenever it likes  TCP by default uses a selective retransmission policy  The RTT estimation algorithm in current can only tolerate variances of upto 30%  The TCP congestion control algorithm is stable because it detects congestion reliably and its rate of window decrease is faster than its rate of window increase  TCP’s use of cumulative acks reduces the need for any timeout/retransmission of acks  Delayed-acks are good for bulk traffic, but bad for interactive traffic.  A two-way handshake is sufficient for the robust setup of a half-duplex connection, but a three-way handshake is necessary for the robust setup of a full-duplex connection

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 3 TCP  If timeouts are not used, burst packet or ack-losses cannot be recovered from  A duplicate ack gives the same information as a NAK, but it presumes the notion of a sequence number  Sequence numbers allow the detection of duplicate packets, but the sequence number space must be sized sufficiently large compared to the window size depending upon the retransmission algorithm (go-back-N or selective-repeat) used.  In a lossless network, window-based transmission can achieve full utilization  TCP sets its RTO to an average RTT measure + 4*mean deviation of RTT, based upon Chebyshev’s theorem  Retransmission ambiguity would not occur if timestamps were used on packets.  Self-clocking of TCP can be a liability in asymmetric networks where the reverse path can artifically constrain the forward path.  Self-clocking can also lead to burstiness if the reverse path is congested, and/or the receiver uses a delay-ack time to suppress ACKs.  The end-to-end congestion control model is the only one that can guarantee avoidance of congestion collapse.  In equilibrium, TCP attempts to conserve packets and operate at high utilization.  TCP does not guarantee low queueing delays because it depends upon packet loss for congestion detection

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 4 TCP/Congestion Control  Fast retransmit refers to the procedure of using three duplicate acks to infer packet loss  TCP Tahoe sets its window to 1 after every loss detection  TCP Reno may timeout quickly in a multiple packet loss scenario  TCP SACK uses selective retransmit, and like NewReno, it does not reduce its window more than once per window of packets  With a 28kbps reverse link, 1500 byte packets are regular TCP behavior, the forward link throughput is at most around 2 Mbps  FIFO+droptail provides service isolation among the participating TCP flows  Synchronization occurs because DropTail leads to bursty and correlated packet losses amongst flows; and flows react to same events  Dropping packets early has the risk that transient burstiness may be mistaken for true overload (demand > capacity)  RED determines random drop probability by comparing the average queue size to a max and min thresholds  Random dropping/marking with a bias in RED helps break synchronization