CS211/Fall 2003 10/06 Outline for This Lecture Application of e2e over wireless Application Level Framing Integrated Layer Processing Course Project Introduction.

Slides:



Advertisements
Similar presentations
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
Advertisements

Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
Lecture 2 Protocol Layers CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger.
EE228A Project, Fall 2000 Yunfei Deng, Kenneth Cheung, Daniil Khidekel Professor Jean Walrand 12/5/2000 Modular TCP.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
OSI Model MIS 416 – Module II Spring 2002 Networking and Computer Security.
Semester Copyright USM EEE442 Computer Networks Introduction: Protocols En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex, UK)
Protocols and the TCP/IP Suite
EE 4272Spring, 2003 EE4272: Computer Networks Instructor: Tricia Chigan Dept.: Elec. & Comp. Eng. Spring, 2003.
Computer Network Architecture and Programming
EE 4272Spring, 2003 Protocols & Architecture A Protocol Architecture is the layered structure of hardware & software that supports the exchange of data.
Real-time Transport Protocol Matt Boutell CS457: Computer Networks November 15, 2001.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Transport Protocols Slide 1 Transport Protocols.
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
Chapter 2 Network Models.
Gursharan Singh Tatla Transport Layer 16-May
Process-to-Process Delivery:
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
Lecture 1 The OSI Model Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Presentation on Osi & TCP/IP MODEL
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Protocol Layering Chapter 10. Looked at: Architectural foundations of internetworking Architectural foundations of internetworking Forwarding of datagrams.
29. Apr INF-3190: Multimedia Protocols Multimedia Protocols Foreleser: Carsten Griwodz
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
1 Chapter 16 Protocols and Protocol Layering. 2 Protocol  Agreement about communication  Specifies  Format of messages (syntax)  Meaning of messages.
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications.
The OSI Model.
University of the Western Cape Chapter 12: The Transport Layer.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 03_b Protocol Layering Instructor: Dr. Li-Chuan Chen Date: 09/15/2003 Based in part upon slides of Prof.
COP 4930 Computer Network Projects Summer C 2004 Prof. Roy B. Levow Lecture 3.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
03 - Winter 2006ECE 766 Computer Interfacing and Protocols 1 Protocol Hierarchies First networks: hardware comes first Increased complexity  network architecture.
Chapter 2 Protocols and the TCP/IP Suite 1 Chapter 2 Protocols and the TCP/IP Suite.
William Stallings Data and Computer Communications
Prepared by Engr.Jawad Ali BSc(Hons)Computer Systems Engineering University of Engineering and Technology Peshawar.
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Protocols and Architecture Slide 1 Use of Standard Protocols.
Network Models.
1 Chapter 4. Protocols and the TCP/IP Suite Wen-Shyang Hwang KUAS EE.
1 Protocol Layering Myungchul Kim Tel:
Protocol Layering Chapter 11.
ALF-ILP Based on Slides by Anthony D. Joseph. ALF and ILP Clark and Tennenhouse, 1990 –Application Level Framing (ALF) ALF solves problems with strictly-layered.
1 Protocols and Protocol Layering. 2 Protocol Agreement about communication Specifies –Format of messages –Meaning of messages –Rules for exchange –Procedures.
COMPUTER NETWORK AND DESIGN CSCI 3385K. Host-to-Host Communications Model Older model Proprietary Application and combinations software controlled by.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Computer Networking A Top-Down Approach Featuring the Internet Introduction Jaypee Institute of Information Technology.
Network Models.
Networking Using the OSI Model.
Lecture (2).
Click to edit Master subtitle style
Presented by Muhammad Abu Saqer
Packet Switching Datagram Approach Virtual Circuit Approach
Understand the OSI Model Part 2
Understanding the OSI Reference Model
Protocols and the TCP/IP Suite
Foreleser: Carsten Griwodz
Process-to-Process Delivery:
OSI Model The Seven Layers
Lecture 2: Overview of TCP/IP protocol
Network Architecture for Cyberspace
Network Architecture Models
Protocols and the TCP/IP Suite
Computer Networking A Top-Down Approach Featuring the Internet
OSI Reference Model Unit II
Process-to-Process Delivery: UDP, TCP
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Presentation transcript:

CS211/Fall /06 Outline for This Lecture Application of e2e over wireless Application Level Framing Integrated Layer Processing Course Project Introduction

CS211/Fall /06 Application of e2e over wireless Explanation of proxy-based design in class –Security –Transcoding –TCP

CS211/Fall /06 Architectural Considerations for a New Generation of Protocols Protocol function analysis Application Level Framing Integrated Layer Processing

CS211/Fall /06 Three design goals for new protocols High-speed protocol operations –Greater network capacity  gigabit operations Protocols working with diverse networking technologies –A wider range of networking technologies Service integration for protocols –Working with different media

CS211/Fall /06 Structuring Principles for Protocol Architectures Flexible decomposition of the architecture Protocol architecture: decomposition into functional modules, semantics of individual modules, and syntax used to effect the protocol It mostly refers to a layered structure, e.g. OSI or Internet TCP/IP layering Layering may not be the most effective modularity for implementation Differentiating the architecture of a protocol suite and the engineering of a specific end/relay node No one-to-one mapping is needed Flexible decomposition: deferral of engineering decisions to the implementor and avoidance of inessential constraints

CS211/Fall /06 Comments on layering Layering is the semantic isolation of functional modules, not a fundamental engineering principle

CS211/Fall /06 Core functions of Protocols Core part: Data transfer –Data manipulation: read or modify the data –Transfer control: regulate the data transfer Other operations –Session initiation –Service location, discovery, etc.

CS211/Fall /06 Six Data Manipulation Functions Associated with different layers, common overhead Moving to/from the network – involves serial-to-parallel transformation Error detection –Checksum etc Buffering for retransmission –Loss recovery by the sender Encryption Moving to/from application address space –User data system address space net interface Presentation formatting –Reformatted into common data representation

CS211/Fall /06 Transfer control operations Flow/congestion control Detecting network transmission failure problems Acknowledgment –Positive ack, negative ack. –No one is absolute better than the other, depending on the error frequency Multiplexing Timestamping Framing

CS211/Fall /06 Performance: control vs. manipulation Minimize correlations of data manipulation and transfer control Transfer Control steps are not computationally complex –Steps for incoming packets: demultiplexing, error checking, in order checking, compute & send ACK Data manipulation is computation intensive –More obvious target for overhead reduction –Presentation conversion is a key factor Up to 97% of the protocol stack overhead 30 times slower

CS211/Fall /06 Presentation Processing Problem: optimize presentation conversion It is application dependent and specific –Application process is the typical overhead –Application is not prevented from performing presentation conversion as data arrives Impact of lost and mis-ordered data –Prevents immediate processing as data arrives –Application stops presentation conversion operations –Usual approach for lower layers: insert “synchronization points” in data stream –Extending this idea up through presentation to application

CS211/Fall /06 Application Level Framing Given application more control: Application should have the option of dealing with a lost data Reconstitute the lost data (recompute/buffer by applications) Ignore the lost data Application level framing Application breaks the data into suitable aggregates Application Data Units (ADUs) Lower layers preserve the ADU frame boundaries ADU takes place of packet as the unit of manipulation ADUs become the unit of error recovery Should be upper bounded: for recovery Lower bounded: application specified Question: what about network cannot handle large ADUs?

CS211/Fall /06 Presentation Conversion Architecture Sender computes a name for each ADU that permits the receiver to understand its place in the sequence of ADUs produced by the sender Sender uses a transfer syntax that permits ADU to be processed out of order

CS211/Fall /06 Applications of ALF In image transport, multimedia transport protocol designs ITP from Berkeley and MIT Explanation of ITP design in class

CS211/Fall /06 Integrated Layer Processing Layered engineering is not fundamental How to implement a layered protocol suite –Layered engineering: Sequential processing through each layer  not an efficient engineering –ILP: vertical integration –ILP: performing all the manipulation steps in one or two integrated processing loops, instead of serially

CS211/Fall /06 More on ILP Ordering constraint –Data manipulation can only be done after specific control steps, –Data manipulation can only be done once the data unit is in order –Layered multiplexing (extract the data before it can be demultiplexed) Minimize inter-layer ordering constraints imposed on implementors –Encryption processing Example: entwine the session-specific encryption operations with data link level operations – pipelining of presentation conversion Drawback of ILP: complex design due to fully customized implementation

CS211/Fall /06 Application of ILP over wireless Rethinking of the cross-layer design in wireless protocols Some examples shown in class

CS211/Fall /06 Two Steps for an overall structure Step 1: ADUs are received from the network –Handle misordering of transmission units Step 2: pass a complete ADU to applications for data manipulations –Handle misordering of complete ADUs ILP is an engineering principle, to be applied only when useful

CS211/Fall /06 Summary Protocol Funcation Analysis –Data manipulation costs more than transfer control operations –Presentation costs more than others combined –It is necessary to keep processing pipeline going to improve implementation efficiency Application level framing –Application data units are natural pipelining units Key engineering principle: integrated layer processing –Different functions are next to each other, not “on top of” –Allows applications to process their data incrementally