Lecture 7 – Transport Protocols

Slides:



Advertisements
Similar presentations
Transport Layer3-1 Transport Overview and UDP. Transport Layer3-2 Goals r Understand transport services m Multiplexing and Demultiplexing m Reliable data.
Advertisements

CSE551: Computer Network Review r Network Layers r TCP/UDP r IP.
Computer Networks 2 Lecture 2 TCP – I - Transport Protocols: TCP Segments, Flow control and Connection Setup.
CPSC 441: Intro, UDP1 Transport Layer Instructor: Carey Williamson Office: ICT Class Location:
EEC-484/584 Computer Networks Lecture 15 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
1 Lecture 14 MPLS Intro to Transport, Reliability, and TCP Networking, Spring 2007 As usual, adapted from Srini Seshan and David Anderson, ,
Transport Layer 3-1 outline r TCP m segment structure m reliable data transfer m flow control m congestion control.
Transport Layer 3-1 Fast Retransmit r time-out period often relatively long: m long delay before resending lost packet r detect lost segments via duplicate.
Computer Communication Digital Communication in the Modern World Transport Layer Multiplexing, UDP
Chapter 3: Transport Layer
Transport Layer 3-1 Transport Layer r To learn about transport layer protocols in the Internet: m TCP: connection-oriented protocol m Reliability protocol.
Transport Layer3-1 Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable data transfer.
Computer Networking Lecture 16 – Transport Protocols.
Transport Layer 3-1 Transport Layer r To learn about transport layer protocols in the Internet: m TCP: connection-oriented protocol m Reliability protocol.
Lecture 8 Chapter 3 Transport Layer
CPSC 441: Intro, UDP1 Instructor: Anirban Mahanti Office: ICT Class Location: ICT 121 Lectures: MWF 12:00 – 12:50 Notes.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
2: Application Layer 1 1DT066 Distributed Information System Chapter 3 Transport Layer.
Some slides are in courtesy of J. Kurose and K. Ross Review of Previous Lecture Electronic Mail: SMTP, POP3, IMAP DNS Socket programming with TCP.
3-1 Transport services and protocols r provide logical communication between app processes running on different hosts r transport protocols run in end.
8-1 Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable data transfer m flow.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Transport Layer Transport Layer. Transport Layer 3-2 Chapter 3 Transport Layer Computer Networking: A Top Down Approach Featuring the Internet,
Review: –What is AS? –What is the routing algorithm in BGP? –How does it work? –Where is “policy” reflected in BGP (policy based routing)? –Give examples.
Data Communications and Computer Networks Chapter 3 CS 3830 Lecture 12 Omar Meqdadi Department of Computer Science and Software Engineering University.
CS 1652 The slides are adapted from the publisher’s material All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Jack Lange.
Network LayerII-1 RSC Part III: Transport Layer 1. Basic Concepts Redes y Servicios de Comunicaciones Universidad Carlos III de Madrid These slides are,
Transport Layer 3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All.
Transport Layer and UDP Tahir Azim Ref:
Transport Layer 3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Part.
Chapter 3 Transport Layer
Transport Layer1 Ram Dantu (compiled from various text books)
1 Transport Layer Lecture 7 Imran Ahmed University of Management & Technology.
Computer Networking Lecture 16 – Transport Protocols Dejian Ye, Liu Xin.
Lecture91 Administrative Things r Return homework # 1 r Review some problems in homework # 1 r Questions about grading? Yona r WebCT for CSE245 is working!
CSE679: Computer Network Review r Review of the uncounted quiz r Computer network review.
Computer Networking Lecture 16 – Transport Protocols.
Computer Networking Review 2 – Transport Protocols.
Lecture 15 – Transport Protocols Eric Anderson Fall Computer Networking.
Transport Layer 3-1 Chapter 3 Outline r 3.1 Transport-layer services r 3.2 Multiplexing and demultiplexing r 3.3 Connectionless transport: UDP.
Chapter 3: Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable data transfer.
Computer Network Management Review 2 – Transport Protocols Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought.
Transport Layer3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley,
Computer Networking Lecture 16 – Transport Protocols Copyright ©, Carnegie Mellon University.
Transport Layer 3-1 Internet Transport Layer Lecture 8 Dr. Najla Al-Nabhan.
Prof. Younghee Lee 1 1 Computer Networks u Lecture 5: Transport services and protocols Prof. Younghee Lee * Some part of this teaching materials are prepared.
MULTIPLEXING/DEMULTIPLEXING, CONNECTIONLESS TRANSPORT.
Advanced Computer Networking Review 2 – Transport Protocols Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
Transport Layer3-1 Chapter 3: Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Introduction 1-1 source application transport network link physical HtHt HnHn M segment HtHt datagram destination application transport network link physical.
2: Transport Layer 11 Transport Layer 1. 2: Transport Layer 12 Part 2: Transport Layer Chapter goals: r understand principles behind transport layer services:
Computer Networking Lecture 16 – Reliable Transport.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
Computer Networking Lecture 15 – Transport Protocols Copyright ©, Carnegie Mellon University.
Computer Networking Transport Layer.
Chapter 3 outline 3.1 Transport-layer services
Review 2 – Transport Protocols
06- Transport Layer Transport Layer.
Introduction of Transport Protocols
TCP and Congestion Control (1)
Transport Layer Our goals:
Lecture 16 – Transport Protocols
Chapter 5 Transport Layer Introduction
Transport Protocols: TCP Segments, Flow control and Connection Setup
Chapter 5 Transport Layer Introduction
Transport Protocols: TCP Segments, Flow control and Connection Setup
Transport Layer Our goals:
Presentation transcript:

Lecture 7 – Transport Protocols 15-441 Computer Networking Lecture 7 – Transport Protocols

Transport introduction Error recovery TCP flow control Outline Akamai Transport introduction Error recovery TCP flow control Lecture 7: 09-18-2002

Simple Hashing Given document XYZ, we need to choose a server to use Suppose we use modulo Number servers from 1…n Place document XYZ on server (XYZ mod n) What happens when a servers fails? n  n-1 Same if different people have different measures of n Why might this be bad? Lecture 7: 09-18-2002

Consistent Hash “view” = subset of all hash buckets that are visible Desired features Balanced – in any one view, load is equal across buckets Smoothness – little impact on hash bucket contents when buckets are added/removed Spread – small set of hash buckets that may hold an object regardless of views Load – across all views # of objects assigned to hash bucket is small Lecture 7: 09-18-2002

Consistent Hash – Example Construction Assign each of C hash buckets to random points on mod 2n circle, where, hash key size = n. Map object to random position on circle Hash of object = closest clockwise bucket 14 Bucket 12 4 8 Smoothness  addition of bucket does not cause movement between existing buckets Spread & Load  small set of buckets that lie near object Balance  no bucket is responsible for large number of objects Lecture 7: 09-18-2002

How Akamai Works cnn.com (content provider) DNS root server Akamai server Get foo.jpg 12 11 Get index.html 5 1 2 3 Akamai high-level DNS server 6 4 7 Akamai low-level DNS server 8 Nearby matching Akamai server 9 10 End-user Get /cnn.com/foo.jpg Lecture 7: 09-18-2002

Akamai – Subsequent Requests cnn.com (content provider) DNS root server Akamai server Get index.html 1 2 Akamai high-level DNS server 7 Akamai low-level DNS server 8 Nearby matching Akamai server 9 10 End-user Get /cnn.com/foo.jpg Lecture 7: 09-18-2002

HTTP (Summary) Simple text-based file exchange protocol Workloads Support for status/error responses, authentication, client-side state maintenance, cache maintenance Workloads Typical documents structure, popularity Server workload Interactions with TCP Connection setup, reliability, state maintenance Persistent connections How to improve performance Caching Replication Lecture 7: 09-18-2002

Transport introduction Error recovery TCP flow control Outline Akamai Transport introduction Error recovery TCP flow control Lecture 7: 09-18-2002

Functionality Split Network provides best-effort delivery End-systems implement many functions Reliability In-order delivery Demultiplexing Message boundaries Connection abstraction Congestion control … IP service model = best effort delivery End-points do everything else… over time many functions have been implemented Congestion control is unique…. Every endpoint must do this! This is necessary for overall efficiency of IP network Lecture 7: 09-18-2002

Transport Protocols UDP provides just integrity and demux TCP adds… Connection-oriented Reliable Ordered Point-to-point Byte-stream Full duplex Flow and congestion controlled Lecture 7: 09-18-2002

UDP: User Datagram Protocol [RFC 768] “No frills,” “bare bones” Internet transport protocol “Best effort” service, UDP segments may be: Lost Delivered out of order to app Connectionless: No handshaking between UDP sender, receiver Each UDP segment handled independently of others Why is there a UDP? No connection establishment (which can add delay) Simple: no connection state at sender, receiver Small header No congestion control: UDP can blast away as fast as desired Lecture 7: 09-18-2002

UDP, cont. Often used for streaming multimedia apps Loss tolerant Rate sensitive Other UDP uses (why?): DNS, SNMP Reliable transfer over UDP Must be at application layer Application-specific error recovery 32 bits Source port # Dest port # Length, in bytes of UDP segment, including header Length Checksum Application data (message) UDP segment format Lecture 7: 09-18-2002

UDP Checksum Goal: detect “errors” (e.g., flipped bits) in transmitted segment – optional use! Sender: Treat segment contents as sequence of 16-bit integers Checksum: addition (1’s complement sum) of segment contents Sender puts checksum value into UDP checksum field Receiver: Compute checksum of received segment Check if computed checksum equals checksum field value: NO - error detected YES - no error detected. But maybe errors nonethless? Lecture 7: 09-18-2002

High-Level TCP Characteristics Protocol implemented entirely at the ends Fate sharing Protocol has evolved over time and will continue to do so Nearly impossible to change the header Uses options to add information to the header Change processing at endpoints Backward compatibility is what makes it TCP Lecture 7: 09-18-2002

TCP Header Data Source port Destination port Sequence number Flags: SYN FIN RESET PUSH URG ACK Acknowledgement HdrLen Flags Advertised window Checksum Urgent pointer Options (variable) Data Lecture 7: 09-18-2002

Van Jacobson’s algorithms Evolution of TCP 1984 Nagel’s algorithm to reduce overhead of small packets; predicts congestion collapse 1975 Three-way handshake Raymond Tomlinson In SIGCOMM 75 1987 Karn’s algorithm to better estimate round-trip time 1990 4.3BSD Reno fast retransmit delayed ACK’s 1983 BSD Unix 4.2 supports TCP/IP 1986 Congestion collapse observed 1988 Van Jacobson’s algorithms congestion avoidance and congestion control (most implemented in 4.3BSD Tahoe) 1974 TCP described by Vint Cerf and Bob Kahn In IEEE Trans Comm 1982 TCP & IP RFC 793 & 791 1975 1980 1985 1990 Lecture 7: 09-18-2002

TCP Through the 1990s 1993 1994 1996 1994 T/TCP (Braden) Transaction SACK TCP (Floyd et al) Selective Acknowledgement 1993 TCP Vegas (Brakmo et al) real congestion avoidance 1994 ECN (Floyd) Explicit Congestion Notification 1996 Hoe Improving TCP startup 1996 FACK TCP (Mathis et al) extension to SACK 1993 1994 1996 Lecture 7: 09-18-2002

Transport introduction Error recovery TCP flow control Outline Akamai Transport introduction Error recovery TCP flow control Lecture 7: 09-18-2002

Stop and Wait ARQ Simplest ARQ protocol Receiver sends acknowledgement (ACK) when it receives packet Sender waits for ACK and timeouts if it does not arrive within some time period Simplest ARQ protocol Send a packet, stop and wait until ACK arrives Sender Receiver Packet Timeout ACK Time Lecture 7: 09-18-2002

Recovering from Error Packet Packet Packet Timeout Timeout Timeout ACK Application may get duplicates in the case of early timeouts Packet Packet Packet ACK Timeout Timeout Timeout ACK ACK ACK lost Packet lost Early timeout Lecture 7: 09-18-2002

Problems with Stop and Wait How to recognize a duplicate Performance Can only send one packet per round trip Lecture 7: 09-18-2002

How to Recognize Resends? Use sequence numbers both packets and acks Sequence # in packet is finite -- how big should it be? For stop and wait? One bit – won’t send seq #1 until received ACK for seq #0 Pkt 0 ACK 0 Pkt 0 ACK 0 Pkt 1 ACK 1 Lecture 7: 09-18-2002

How to Keep the Pipe Full? Send multiple packets without waiting for first to be acked Number of pkts in flight = window Reliable, unordered delivery Several parallel stop & waits Send new packet after each ack Sender keeps list of unack’ed packets; resends after timeout Receiver same as stop & wait How large a window is needed? Suppose 10Mbps link, 4ms delay, 500byte pkts 1? 10? 20? Round trip delay * bandwidth = capacity of pipe Lecture 7: 09-18-2002

Sliding Window Reliable, ordered delivery Receiver has to hold onto a packet until all prior packets have arrived Why might this be difficult for just parallel stop & wait? Sender must prevent buffer overflow at receiver Circular buffer at sender and receiver Packets in transit  buffer size Advance when sender and receiver agree packets at beginning have been received Lecture 7: 09-18-2002

Sender/Receiver State Max ACK received Next seqnum Next expected Max acceptable … … … … Sender window Receiver window Sent & Acked Sent Not Acked Received & Acked Acceptable Packet OK to Send Not Usable Not Usable Lecture 7: 09-18-2002

Window Sliding – Common Case On reception of new ACK (i.e. ACK for something that was not acked earlier) Increase sequence of max ACK received Send next packet On reception of new in-order data packet (next expected) Hand packet to application Send cumulative ACK – acknowledges reception of all packets up to sequence number Increase sequence of max acceptable packet Lecture 7: 09-18-2002

Loss Recovery On reception of out-of-order packet Send nothing (wait for source to timeout) Cumulative ACK (helps source identify loss) Timeout (Go-Back-N recovery) Set timer upon transmission of packet Retransmit all unacknowledged packets Performance during loss recovery No longer have an entire window in transit Can have much more clever loss recovery Lecture 7: 09-18-2002

Go-Back-N in Action Lecture 7: 09-18-2002

Selective Repeat Receiver individually acknowledges all correctly received pkts Buffers packets, as needed, for eventual in-order delivery to upper layer Sender only resends packets for which ACK not received Sender timer for each unACKed packet Sender window N consecutive seq #’s Again limits seq #s of sent, unACKed packets Lecture 7: 09-18-2002

Selective Repeat: Sender, Receiver Windows Lecture 7: 09-18-2002

Sequence Numbers How large do sequence numbers need to be? E.g. Must be able to detect wrap-around Depends on sender/receiver window size E.g. Max seq = 7, send win=recv win=7 If pkts 0..6 are sent succesfully and all acks lost Receiver expects 7,0..5, sender retransmits old 0..6!!! Max sequence must be  send window + recv window Xxx picture Lecture 7: 09-18-2002

Transport introduction Error recovery TCP flow control Outline Akamai Transport introduction Error recovery TCP flow control Lecture 7: 09-18-2002

Sequence Number Space Each byte in byte stream is numbered. 32 bit value Wraps around Initial values selected at start up time TCP breaks up the byte stream in packets. Packet size is limited to the Maximum Segment Size Each packet has a sequence number. Indicates where it fits in the byte stream 13450 14950 16050 17550 packet 8 packet 9 packet 10 Lecture 7: 09-18-2002

TCP Flow Control TCP is a sliding window protocol For window size n, can send up to n bytes without receiving an acknowledgement When the data is acknowledged then the window slides forward Each packet advertises a window size Indicates number of bytes the receiver has space for Original TCP always sent entire window Congestion control now limits this Lecture 7: 09-18-2002

Window Flow Control: Send Side Sent but not acked Not yet sent Sent and acked Next to be sent Lecture 7: 09-18-2002

Window Flow Control: Send Side Packet Sent Packet Received Source Port Dest. Port Source Port Dest. Port Sequence Number Sequence Number Acknowledgment Acknowledgment HL/Flags Window HL/Flags Window D. Checksum Urgent Pointer D. Checksum Urgent Pointer Options.. Options.. App write acknowledged sent to be sent outside window Lecture 7: 09-18-2002

Window Flow Control: Receive Side Receive buffer Acked but not delivered to user Not yet acked window Lecture 7: 09-18-2002

TCP Persist What happens if window is 0? TCP Persist state Receiver updates window when application reads data What if this update is lost? TCP Persist state Sender periodically sends 1 byte packets Receiver responds with ACK even if it can’t store the packet Lecture 7: 09-18-2002

Performance Considerations The window size can be controlled by receiving application Can change the socket buffer size from a default (e.g. 8Kbytes) to a maximum value (e.g. 64 Kbytes) The window size field in the TCP header limits the window that the receiver can advertise 16 bits  64 KBytes 10 msec RTT  51 Mbit/second 100 msec RTT  5 Mbit/second Lecture 7: 09-18-2002

Next Lecture TCP connection setup TCP reliability Congestion control