EEC-484/584 Computer Networks Lecture 16 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.

Slides:



Advertisements
Similar presentations
Introduction 1 Lecture 13 Transport Layer (Transmission Control Protocol) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer.
Advertisements

Transport Layer3-1 TCP. Transport Layer3-2 TCP: Overview RFCs: 793, 1122, 1323, 2018, 2581 r full duplex data: m bi-directional data flow in same connection.
3-1 TCP Protocol r point-to-point: m one sender, one receiver r reliable, in-order byte steam: m no “message boundaries” r pipelined: m TCP congestion.
EEC-484/584 Computer Networks Lecture 8 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
1 Chapter 3 Transport Layer. 2 Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4.
1 Transport Layer Lecture 9 Imran Ahmed University of Management & Technology.
Chapter 3 Transport Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 11.
Transport Layer3-1 Summary of Reliable Data Transfer Checksums help us detect errors ACKs and NAKs help us deal with errors If ACK/NAK has errors sender.
1 TCP Congestion Control. 2 TCP Segment Structure source port # dest port # 32 bits application data (variable length) sequence number acknowledgement.
Week 9 TCP9-1 Week 9 TCP 3 outline r 3.5 Connection-oriented transport: TCP m segment structure m reliable data transfer m flow control m connection management.
Transport Layer1 TCP: Overview RFCs: 793, 1122, 1323, 2018, 2581 r reliable, in-order byte steam: m no “message boundaries” r pipelined: m TCP congestion.
Introduction 1 Lecture 14 Transport Layer (Transmission Control Protocol) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer.
School of Information Technologies TCP Congestion Control NETS3303/3603 Week 9.
Announcement Homework 2 in tonight –Will be graded and sent back before Th. class Midterm next Tu. in class –Review session next time –Closed book –One.
Chapter 3 Transport Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 12.
Announcement Project 2 finally ready on Tlab Homework 2 due next Mon tonight –Will be graded and sent back before Tu. class Midterm next Th. in class –Review.
Transport Layer 3-1 Fast Retransmit r time-out period often relatively long: m long delay before resending lost packet r detect lost segments via duplicate.
Transport Layer3-1 Congestion Control. Transport Layer3-2 Principles of Congestion Control Congestion: r informally: “too many sources sending too much.
10/7/ /9/2003 TCP and Congestion Control October 7-9, 2003.
EEC-484/584 Computer Networks Lecture 15 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Transport Layer Transport Layer: TCP. Transport Layer 3-2 TCP: Overview RFCs: 793, 1122, 1323, 2018, 2581 r full duplex data: m bi-directional.
Week 9 TCP9-1 Week 9 TCP 3 outline r 3.5 Connection-oriented transport: TCP m segment structure m reliable data transfer m flow control m connection management.
The Future r Homework questions> r The next test is coming the 19 th (just before turkey day!) r Wednesday = review + anything not done today r Friday.
Chapter 3 Transport Layer
EEC-484/584 Computer Networks Lecture 8 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
1 Chapter 3 Transport Layer. 2 Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4.
Data Communication and Networks
Transport Layer3-1 Data Communication and Networks Lecture 7 Transport Protocols: TCP October 21, 2004.
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Transport Layer 3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009.
EEC-484/584 Computer Networks Lecture 16 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
3: Transport Layer3b-1 Principles of Congestion Control Congestion: r informally: “too many sources sending too much data too fast for network to handle”
Transport Layer3-1 Chapter 3 outline r 3.1 Transport-layer services r 3.2 Multiplexing and demultiplexing r 3.3 Connectionless transport: UDP r 3.4 Principles.
Transport Layer3-1 Chapter 3 outline r 3.1 Transport-layer services r 3.2 Multiplexing and demultiplexing r 3.3 Connectionless transport: UDP r 3.4 Principles.
Transport Layer3-1 Chapter 3 outline r 3.1 Transport-layer services r 3.2 Multiplexing and demultiplexing r 3.3 Connectionless transport: UDP r 3.4 Principles.
Transport Layer3-1 Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles.
Transport Layer 3-1 Chapter 3 Outline r 3.5 Connection-oriented transport: TCP m segment structure m reliable data transfer m flow control m connection.
Transport Layer3-1 TCP sender (simplified) NextSeqNum = InitialSeqNum SendBase = InitialSeqNum loop (forever) { switch(event) event: data received from.
Transport Layer1 Flow and Congestion Control Ram Dantu (compiled from various text books)
3: Transport Layer3b-1 TCP: Overview RFCs: 793, 1122, 1323, 2018, 2581 r full duplex data: m bi-directional data flow in same connection m MSS: maximum.
Principles of Congestion Control Congestion: informally: “too many sources sending too much data too fast for network to handle” different from flow control!
17-1 Last time □ UDP socket programming ♦ DatagramSocket, DatagramPacket □ TCP ♦ Sequence numbers, ACKs ♦ RTT, DevRTT, timeout calculations ♦ Reliable.
1 Transport Layer Lecture 10 Imran Ahmed University of Management & Technology.
Transport Layer 3- Midterm score distribution. Transport Layer 3- TCP congestion control: additive increase, multiplicative decrease Approach: increase.
Transport Layer3-1 Chapter 3 outline r 3.1 Transport-layer services r 3.2 Multiplexing and demultiplexing r 3.3 Connectionless transport: UDP r 3.4 Principles.
CS-1652 The slides are adapted from the publisher’s material All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Jack Lange.
Transport Layer3-1 Transport Layer Our lives begin to end, the day we become silent about things that matter.
Advance Computer Networks Lecture#09 & 10 Instructor: Engr. Muhammad Mateen Yaqoob.
EEC-484/584 Computer Networks Lecture 8 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
TCP. TCP ACK generation [RFC 1122, RFC 2581] Event at Receiver Arrival of in-order segment with expected seq #. All data up to expected seq # already.
Transport Layer3-1 Chapter 3 outline r 3.1 Transport-layer services r 3.2 Multiplexing and demultiplexing r 3.3 Connectionless transport: UDP r 3.4 Principles.
EEC-484/584 Computer Networks Lecture 8 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Transport Layer3-1 Chapter 3 outline r 3.1 Transport-layer services r 3.2 Multiplexing and demultiplexing r 3.3 Connectionless transport: UDP r 3.4 Principles.
Transport Layer3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009.
Transport Layer3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009.
Transport Layer session 1 TELE3118: Network Technologies Week 11: Transport Layer TCP Some slides have been taken from: r Computer Networking:
DMET 602: Networks and Media Lab Amr El Mougy Yasmeen EssamAlaa Tarek.
09-Transport Layer: TCP Transport Layer.
Chapter 3 outline 3.1 transport-layer services
CS-1652 Jack Lange University of Pittsburgh
Chapter 3 outline 3.1 Transport-layer services
EEC-484/584 Computer Networks
Flow and Congestion Control
CSE 4213: Computer Networks II
October 1st, 2013 CS-1652 Jack Lange University of Pittsburgh
CS-1652 Congestion Control Jack Lange University of Pittsburgh
Transport Layer: Congestion Control
Chapter 3 outline 3.1 Transport-layer services
October 4th, 2011 CS-1652 Jack Lange University of Pittsburgh
Presentation transcript:

EEC-484/584 Computer Networks Lecture 16 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer Networking book, and on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall)

2 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao Outline TCP –Connection management –Reliable data transfer –Flow control –TCP transmission policy –Congestion control Reminder: Quiz 4 –MW session: 11/27 Monday 2-4pm –TTh session: 11/28 Tuesday 4-6pm

3 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao TCP Connection Management TCP sender, receiver establish “connection” before exchanging data segments Initialize TCP variables: –Sequence numbers –Buffers, flow control info (e.g. RcvWindow ) Client: connection initiator Socket clientSocket = new Socket("hostname","port number"); Server: contacted by client Socket connectionSocket = welcomeSocket.accept();

4 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao TCP Connection Management Three way handshake: Step 1: client host sends TCP SYN segment to server –specifies initial sequence number –no data Step 2: server host receives SYN, replies with SYN/ACK segment –server allocates buffers –specifies server initial sequence number Step 3: client receives SYN/ACK, replies with ACK segment, which may contain data

5 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao TCP Connection Management Three way handshake: SYN segment is considered as 1 byte SYN/ACK segment is also considered as 1 byte client SYN (seq=x) server SYN/ACK (seq=y, ACK=x+1) ACK (seq=x+1, ACK=y+1) connect accept

6 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao TCP Connection Management Closing a connection: client closes socket: clientSocket.close(); Step 1: client end system sends TCP FIN control segment to server Step 2: server receives FIN, replies with ACK. Closes connection, sends FIN. client FIN server ACK FIN close closed timed wait

7 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao TCP Connection Management Step 3: client receives FIN, replies with ACK. –Enters “timed wait” - will respond with ACK to received FINs Step 4: server, receives ACK. Connection closed. Note: with small modification, can handle simultaneous FINs client FIN server ACK FIN closing closed timed wait closed

8 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao TCP Reliable Data Transfer TCP creates rdt service on top of IP’s unreliable service Pipelined segments Cumulative acks TCP uses single retransmission timer Retransmissions are triggered by: –timeout events –duplicate acks Initially consider simplified TCP sender: –ignore duplicate acks –ignore flow control, congestion control

9 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao TCP Sender Events: Data rcvd from app: Create segment with sequence number seq # is byte-stream number of first data byte in segment start timer if not already running (think of timer as for oldest unacked segment) expiration interval: TimeOutInterval Timeout: retransmit segment that caused timeout restart timer Ack rcvd: If acknowledges previously unacked segments –update what is known to be acked –start timer if there are outstanding segment

10 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao TCP: Retransmission Scenarios Host A Seq=100, 20 bytes data ACK=100 time premature timeout Host B Seq=92, 8 bytes data ACK=120 Seq=92, 8 bytes data Seq=92 timeout ACK=120 Host A Seq=92, 8 bytes data ACK=100 loss timeout lost ACK scenario Host B X Seq=92, 8 bytes data ACK=100 time Seq=92 timeout SendBase = 100 SendBase = 120 SendBase = 120 Sendbase = 100

11 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao TCP Retransmission Scenarios Host A Seq=92, 8 bytes data ACK=100 loss timeout Cumulative ACK scenario Host B X Seq=100, 20 bytes data ACK=120 time SendBase = 120

12 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao TCP ACK Generation Event at Receiver Arrival of in-order segment with expected seq #. All data up to expected seq # already ACKed Arrival of in-order segment with expected seq #. One other segment has ACK pending Arrival of out-of-order segment higher-than-expect seq. #. Gap detected Arrival of segment that partially or completely fills gap TCP Receiver action Delayed ACK. Wait up to 500ms for next segment. If no next segment, send ACK Immediately send single cumulative ACK, ACKing both in-order segments Immediately send duplicate ACK, indicating seq. # of next expected byte Immediate send ACK, provided that segment starts at lower end of gap

13 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao TCP Flow Control Receive side of TCP connection has a receive buffer: Speed-matching service: matching the send rate to the receiving app’s drain rate App process may be slow at reading from buffer Flow control: sender won’t overflow receiver’s buffer by transmitting too much, too fast

14 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao TCP Flow Control (Suppose TCP receiver discards out-of-order segments) Spare room in buffer = RcvWindow = RcvBuffer-[LastByteRcvd - LastByteRead] Rcvr advertises spare room by including value of RcvWindow in segments Sender limits unACKed data to RcvWindow –guarantees receive buffer doesn’t overflow

15 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao TCP Transmission Policy Window management not directly tied to ACKs –The sender can send new segments only if the receiver has room to receive them What if the receiver’s window drops to 0 ? –Sender may not normally send segments with two exceptions –Exception 1: urgent data may be sent, e.g., to allow user to kill process running on the remote machine –Exception 2: sender may send a 1-byte segment to make the receiver re-announce the next byte expected and window size

16 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao TCP Transmission Policy Window management not directly tied to ACKs

17 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao TCP Transmission Policy Nagle ’ s algorithm –To address the 1-byte-at-a-time sender problem Clark ’ s algorithm –To address the 1-byte-at-a-time receiver problem

18 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao 1-byte-at-a-time Sender Problem Sender sends 1 byte (e.g., typed one character in an editor) A segment of 1 byte is sent to the remote machine (41-byte IP packet) Remote machine acks immediately (40-byte IP packet) Editor (in remote machine) program reads the received 1 byte, a windows update segment is sent to user (40-byte IP packet) Editor program echoes the 1 byte received to the user terminal (41-byte IP packet) In all, 162 bytes of bandwidth used, 4 segments are sent for each character typed

19 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao Nagle ’ s Algorithm When sender application passes data to TCP one byte at a time –Send first byte –Buffer the rest until first byte ACKed –Then send all buffered bytes in one TCP segment –Start buffering again until all ACKed Implemented widely in TCP, can be disabled/enabled by using socket options For some application, it is necessary to disable the Nagle’s algorithm, e.g., X Windows program over Internet, to avoid erratic mouse movement, etc.

20 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao Silly Window Syndrome When receiver application accepts data from TCP 1 byte at a time

21 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao Clark ’ s Algorithm Receiver should not send window update until –It can handle max segment size it advertised when connection established, or, –Its buffer is half empty, whichever is smaller Sender should wait until –It has accumulated enough space in window to send full segment, or, –One containing at least half of receiver ’ s buffer size Nagle ’ s algorithm and Clark ’ s algorithm are complementary

22 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao Principles of Congestion Control Congestion: Informally: “too many sources sending too much data too fast for network to handle” Different from flow control! Manifestations: –lost packets (buffer overflow at routers) –long delays (queueing in router buffers)

23 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao Approaches towards Congestion Control End-end congestion control: no explicit feedback from network congestion inferred from end-system observed loss, delay approach taken by TCP Network-assisted congestion control: routers provide feedback to end systems –single bit indicating congestion (SNA, DECbit, TCP/IP ECN, ATM) –explicit rate sender should send at Two broad approaches towards congestion control

24 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao TCP Congestion Control: Additive Increase, Multiplicative Decrease Approach: increase transmission rate (window size), probing for usable bandwidth, until loss occurs –Additive increase: increase cwnd by 1 MSS every RTT until loss detected –Multiplicative decrease: cut cwnd in half after loss Saw tooth behavior: probing for bandwidth

25 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao TCP Congestion Control Sender limits transmission: LastByteSent-LastByteAcked  cwnd Roughly, cwnd is dynamic, function of perceived network congestion How does sender perceive congestion? loss event = timeout or 3 duplicate acks TCP sender reduces rate ( cwnd ) after loss event three mechanisms: –AIMD –slow start –conservative after timeout events rate = cwnd RTT Bytes/sec

26 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao TCP Slow Start When connection begins, cwnd = 1 MSS –Example: MSS = 500 bytes & RTT = 200 msec –Initial rate = 20 kbps Available bandwidth may be >> MSS/RTT –Desirable to quickly ramp up to respectable rate When connection begins, increase rate exponentially fast until first loss event

27 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao TCP Slow Start When connection begins, increase rate exponentially until first loss event: –Double cwnd every RTT –Done by incrementing cwnd for every ACK received Summary: initial rate is slow but ramps up exponentially fast Host A one segment RTT Host B time two segments four segments

28 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao Congestion Avoidance Q: When should the exponential increase switch to linear? A: When cwnd gets to 1/2 of its value before timeout Implementation: Variable Threshold At loss event, Threshold is set to 1/2 of cwnd just before loss event How to increase cwnd linearly: cwnd (new) = cwnd + mss*mss/cwnd

29 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao Congestion Control After 3 duplicated ACKs: –cwnd is cut in half –window then grows linearly But after timeout event: –cwnd instead set to 1 MSS –window then grows exponentially –to a threshold, then grows linearly  3 dup ACKs indicates network capable of delivering some segments  timeout indicates a “more alarming” congestion scenario Philosophy:

30 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao Summary: TCP Congestion Control When cwnd is below Threshold, sender in slow- start phase, window grows exponentially When cwnd is above Threshold, sender is in congestion-avoidance phase, window grows linearly When a triple duplicate ACK occurs, Threshold set to cwnd/2 and cwnd set to Threshold When timeout occurs, Threshold set to cwnd /2 and cwnd is set to 1 MSS

31 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao TCP Sender Congestion Control StateEventTCP Sender ActionCommentary Slow Start (SS) ACK receipt for previously unacked data CongWin = CongWin + MSS, If (CongWin > Threshold) set state to “Congestion Avoidance” Resulting in a doubling of CongWin every RTT Congestion Avoidance (CA) ACK receipt for previously unacked data CongWin = CongWin+ MSS * (MSS/CongWin) Additive increase, resulting in increase of CongWin by 1 MSS every RTT

32 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao TCP Sender Congestion Control StateEventTCP Sender ActionCommentary SS or CALoss event detected by triple duplicate ACK Threshold = CongWin/2, CongWin = Threshold, Set state to “Congestion Avoidance” Fast recovery, implementing multiplicative decrease. CongWin will not drop below 1 MSS. SS or CATimeoutThreshold = CongWin/2, CongWin = 1 MSS, Set state to “Slow Start” Enter slow start SS or CADuplicate ACK Increment duplicate ACK count for segment being acked CongWin and Threshold not changed

33 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao TCP Congestion Control

34 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao Exercise Suppose that the TCP congestion window is set to 18 KB and a timeout occurs. How big will the window be if the next four transmission bursts are all successful? Assume that the maximum segment size is 1 KB.

35 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao Exercise Segment# ActionVariables SendReceiveCommentcwndssthresh Timeout18KB- Retransmit :1025(1024) ACK 1025Slow start :2049(1024) :3073(1024) ACK 2049Slow start ACK 3073Slow start :4097(1024) :5121(1024) :6145(1024) :7169(1024) ACK 4097Slow start ACK 5121Slow start ACK 6145Slow start ACK 7169Slow start

36 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao Exercise Problem # :8193(1024) :9217(1024) :10241(1024) :11265(1024) :13313(1024) :14337(1024) :15361(1024) :16385(1024) ACK 8193Slow start ACK 9217Slow start ACK Cong. Avoid. New cwnd = cwnd + mss*mss/cwnd ACK 11265Cong. Avoid ACK 13313Cong. Avoid ACK 14337Cong. Avoid ACK 15361Cong. Avoid ACK 16385Cong. Avoid

37 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao Causes/Costs of Congestion Two senders, two receivers One router, infinite buffers No retransmission large delays when congested maximum achievable throughput unlimited shared output link buffers Host A in : original data Host B out

38 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao Causes/Costs of Congestion One router, finite buffers Sender retransmission of lost packet finite shared output link buffers Host A in : original data Host B out ' in : original data, plus retransmitted data

39 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao Causes/Costs of Congestion Always: (goodput) “Perfect” retransmission only when loss: Retransmission of delayed (not lost) packet makes larger (than perfect case) for same in out = in out > in out “Costs” of congestion: more work (retrans) for given “goodput” unneeded retransmissions: link carries multiple copies of pkt R/2 in out R/2 in out R/2 in out R/4 R/3

40 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao Causes/Costs of Congestion four senders multihop paths timeout/retransmit in Q: what happens as and increase ? in finite shared output link buffers Host A in : original data Host B out ' in : original data, plus retransmitted data

41 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao Causes/costs of congestion: scenario 3 Another “cost” of congestion: when packet dropped, any “upstream transmission capacity used for that packet was wasted! HostAHostA HostBHostB o u t

42 Spring Semester 2006EEC-484/584: Computer NetworksWenbing Zhao TCP Sending Rate Control To control the sending rate, each sender maintains two windows –Flow control window: window that receiver granted –Congestion window Number of bytes sender can transmit = minimum of two window sizes