Congestion Control, the Internet Transport Protocols, and UDP By: Mike Krupinski and Jaesma Woods.

Slides:



Advertisements
Similar presentations
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Advertisements

Chapter 6 The Transport Layer.
Prentice HallHigh Performance TCP/IP Networking, Hassan-Jain Chapter 2 TCP/IP Fundamentals.
CCNA – Network Fundamentals
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Transport Layer Network Fundamentals – Chapter 4.
CSCI 4550/8556 Computer Networks
Transmission Control Protocol (TCP)
Intermediate TCP/IP TCP Operation.
IS333, Ch. 26: TCP Victor Norman Calvin College 1.
BZUPAGES.COM 1 User Datagram Protocol - UDP RFC 768, Protocol 17 Provides unreliable, connectionless on top of IP Minimal overhead, high performance –No.
Transport Layer – TCP (Part1) Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
TELE202 Lecture 14 TCP/UDP (2) 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »TCP/UDP (1) »Source: chapter 17 ¥This Lecture »TCP/UDP (2) »Source: chapter.
Copyright 1999, S.D. Personick. All Rights Reserved. Telecommunications Networking II Lecture 32 Transmission Control Protocol (TCP) Ref: Tanenbaum pp:
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
CSEE W4140 Networking Laboratory Lecture 6: TCP and UDP Jong Yul Kim
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Transport Layer.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Transport Protocols Slide 1 Transport Protocols.
1 K. Salah Module 6.1: TCP Flow and Congestion Control Connection establishment & Termination Flow Control Congestion Control QoS.
TCP. Learning objectives Reliable Transport in TCP TCP flow and Congestion Control.
Gursharan Singh Tatla Transport Layer 16-May
Process-to-Process Delivery:
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
1 Transport Layer Computer Networks. 2 Where are we?
Copyright 2003 CCNA 1 Chapter 9 TCP/IP Transport and Application Layers By Your Name.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
Congestion Control, Internet Transport Protocols: UDP
TCP : Transmission Control Protocol Computer Network System Sirak Kaewjamnong.
TCP Lecture 13 November 13, TCP Background Transmission Control Protocol (TCP) TCP provides much of the functionality that IP lacks: reliable service.
26-TCP Dr. John P. Abraham Professor UTPA. TCP  Transmission control protocol, another transport layer protocol.  Reliable delivery  Tcp must compensate.
University of the Western Cape Chapter 12: The Transport Layer.
SMUCSE 4344 transport layer. SMUCSE 4344 transport layer end-to-end protocols –transport code runs only on endpoint hosts encapsulates network communications.
Copyright 2002, S.D. Personick. All Rights Reserved.1 Telecommunications Networking II Topic 20 Transmission Control Protocol (TCP) Ref: Tanenbaum pp:
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
1 TCP: Reliable Transport Service. 2 Transmission Control Protocol (TCP) Major transport protocol used in Internet Heavily used Completely reliable transfer.
03/11/2015 Michael Chai; Behrouz Forouzan Staffordshire University School of Computing Streaming 1.
Packet switching network Data is divided into packets. Transfer of information as payload in data packets Packets undergo random delays & possible loss.
Institute of Technology Sligo - Dept of Computing Chapter 12 The Transport Layer.
Chapter 24 Transport Control Protocol (TCP) Layer 4 protocol Responsible for reliable end-to-end transmission Provides illusion of reliable network to.
1 End-to-End Protocols User Datagram Protocol (UDP) Transmission Control Protocol(TCP)
4343 X2 – The Transport Layer Tanenbaum Ch.6.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Congestion Control: UDP. What is Congestion Control? Refers to the management of packet loss and signal degradation Handled by both Network and Transport.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Computer Networks 1000-Transport layer, TCP Gergely Windisch v spring.
1 TCP ProtocolsLayer name DNSApplication TCP, UDPTransport IPInternet (Network ) WiFi, Ethernet Link (Physical)
Process-to-Process Delivery:
3. END-TO-END PROTOCOLS (PART 1) Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University 22 March
1 Chapter 24 Internetworking Part 4 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
The Transport Layer Implementation Services Functions Protocols
The Transport Layer Congestion Control & UDP
PART 5 Transport Layer Computer Networks.
Understand the OSI Model Part 2
Internet and Intranet Protocols and Applications
Congestion Control, Internet transport protocols: udp
Transport Layer Unit 5.
TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
Process-to-Process Delivery:
Dr. John P. Abraham Professor UTPA
Advanced Computer Networks
TRANSMISSION CONTROL PROTOCOL
Dr. John P. Abraham Professor UTPA
Congestion Control, Internet Transport Protocols: UDP
The Transport Layer Chapter 6.
Lecture 21 and 22 5/29/2019.
Process-to-Process Delivery: UDP, TCP
Transport Layer 9/22/2019.
Presentation transcript:

Congestion Control, the Internet Transport Protocols, and UDP By: Mike Krupinski and Jaesma Woods

Scenario: Angry driver Other angry driver

What is congestion control: Controlling congestion relating to packet transfers over a network. If too many packets are sent at once, then you have a problem. Oh no.

How is this achieved? 1.Bandwidth should be properly allocated 2.Well measured goodput

Efficiency and Power: An efficient allocation of bandwidth uses all network capacity. Use of goodput (rate of useful packets arriving at receiver) As load increases, goodput increases Power will rise with the offered load. Power = load/delay Proposed by Kleinrock

Max/Min Fairness Definition: bandwidth given to one flow cannot be increased without decreasing the bandwidth given to another flow with an allocation that is no larger (Really long defintion).

Convergence and sending rate: The ideal operating point of a network varies over time. Sending rate may be limited by two factors: flow control and congestion Ex: A guy at the post office gets too much mail. He freaks out and storms out. A lot of mail is lost because of this. Plus, he hates his job.

Wireless Issues: High throughput requires very little packet loss Sender may not be aware of wireless links if all he knows is a wired link. Internet paths are hectic because there is no simple way to tell what links are being used.

Internet Transport Protocols: UDP Two main protocols: – Connectionless – Connection-oriented They complement one-another The connectionless protocol is UDP, so it just sends stuff. The connection-oriented protocol is TCP, so it does all the work. In other words, it’s the guy that takes up the slack.

What is UDP? An acronym for User Datagram Protocol – Provides a way for apps to send encapsulated IP datagrams w/o a connection. Transports segments consisting of 8-byte header followed by payload Ports act as identifiers for end points within starting and ending machines

Source Port vs. Destination Port Source port is the incoming segment Destination port handles outgoing segment The UDP length of the packet includes header and data – Min is 8 bytes UDP DOES NOT: – Handle flow control – Handle congestion control – Handle retransmission

Remote Procedure Call: Information can be transported from the caller to callee in the parameter and come back in procedure result – Calling procedure is known as client – Called procedure is known as server Calling remote procedures must have lib. Procedure known as client stub Server must have a procedure known as server stub.

Real Time Transport Protocols Examples would be Internet Radio, music-on- demand, videoconferencing, video-on demand.

RTP Contd. Purpose is to multiplex several real-time data streams on single streams of UDP packets. Packets aren’t treated by routers Each packet is given higher number than last. Incorporates time stamping – Associates time stamp with first sample in each packet.

Questions Part One: 1. What is the formula for power? 2. What are some wireless issues? 3. What is UDP? 4. What is RTP and what are some examples? 5. What are the two main protocols of the Internet?

Oh look!!! A video!!! Let’s watch! Ox8D2YBRIrQ

RTCP: Real time Transport Control Protocols Handles feedback, synchronization, and the user interface Does not transport media samples First function is handling feedback on delay or bandwidth congestion

Buffering and Jitter Control: Jitter is the variation in delay – Solution is to buffer the data Two solutions in scenarios: – Packet can be skipped – Playback can be paused until the packet arrives Ex: Watching a slow video on Youtube

Playback Point: How long to wait at the receiver for media before playing it out. – High jitter may need to be further out. Incorporation of talkspurts can assist with avoiding delay – Used in pauses in video/audio

Transmission Control Protocol: Designed to provided reliable end-to-end byte stream over an unreliable network. Different networks provide different layouts so this presents great challenges TCP must adapt to these changes

TCP Service Model End points in the model are known as sockets – Each socket has a number and a sixteen bit number known as a port A socket may be used for multiple connections at the same time. Port numbers below 1024 are reserved for standard services.

Internet Daemons May attach itself to multiple ports and wait for first incoming connection System administrators often set up permanent daemons on ports All TCP connections are full duplex and point- to-point which means traffic can go in both directions or has exactly two end points.

Byte Streams: TCP connections are byte streams Message boundaries are not preserved end to end It may split packets into chunks in various numeric forms. Files in UNIX often follow this concept

Urgent data: Focuses priority on a certain connection Data is flagged with an Urgent Flag, which prioritizes the data Everything is transmitted into the particular data.

TCP Segments and MTUs A TCP segment consists of a fixed twenty byte header – Followed by zero or more data bytes A MTU (Maximum Transfer Unit) is measured in 1500 bytes – Defines upper bound on segment size

TCP Connection Establishment: Server Client Destination These tree must have a three-way agreement between one another.

TCP Sliding Window: Measured in how much data is buffered for the sender so he can send more data. Window probe: Used to prevent deadlock if a window update is ever lost. Senders are not required to send data as soon as they come from application.

TCP Congestion Control: Congestion occurs when load is too much to handle TCP maintains congestion window, whose size is the number of bytes the sender may have in the network. Congestion collapse occurs when goodput drops precipitously.

TCP Implementation: TCP uses selective acknowledgements known as SACK, which lists ranges of received bytes. – Allows sender to more directly decide what packets to retransmit. SACK is strictly advisory information. – TCP can use SACK to recover more easily from situations.

Questions Part 2: What is SACK? What is Urgent Data? What does RTCP Stand For? What is Buffering?

Hooray. You survived.