Internet and Intranet Protocols and Applications The Internet: Delay, Errors, Detection February, 2002 Joseph Conron Computer Science Department New York.

Slides:



Advertisements
Similar presentations
Primitives for Achieving Reliability 3035/GZ01 Networked Systems Kyle Jamieson Department of Computer Science University College London.
Advertisements

Assume that a file is transferred from a node A to a node B. The file has been fragmented in 5 frames. Frame 0 is corrupted, the ACK of frame 1 is corrupted,
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
COMT Performance of Data Communications Protocols General Protocol Concepts.
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
Answers of Exercise 7 1. Explain what are the connection-oriented communication and the connectionless communication. Give some examples for each of the.
Data link control. Data Link Control –Flow Control how much data may sent –Error Control How can error be detected and corrected.
8-Reliability and Channel Coding Dr. John P. Abraham Professor UTPA.
Chapter 6 Errors, Error Detection, and Error Control.
Transport Layer 3-1 Transport Layer r To learn about transport layer protocols in the Internet: m TCP: connection-oriented protocol m Reliability protocol.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 12 Introduction to Computer Networks.
1 Fall 2005 Protocols and layering Qutaibah Malluhi Computer Science and Engineering Qatar University.
The Data Link Layer Chapter 3. Position of the data-link layer.
EE 122: Error detection and reliable transmission Ion Stoica September 16, 2002.
CMPE 150 – Winter 2009 Lecture 6 January 22, 2009 P.E. Mantey.
1 Link Layer & Network Layer Some slides are from lectures by Nick Mckeown, Ion Stoica, Frans Kaashoek, Hari Balakrishnan, and Sam Madden Prof. Dina Katabi.
20101 The Data Link Layer Chapter Design Issues Controls communication between 2 machines directly connected by “wire”-like link Services Provided.
Internetworking Fundamentals (Lecture #2) Andres Rengifo Copyright 2008.
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
Networking. Protocol Stack Generally speaking, sending an message is equivalent to copying a file from sender to receiver.
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
SEPT, 2005CSI Part 2.2 Protocols and Protocol Layering Robert Probert, SITE, University of Ottawa.
18-Aug-154/598N: Computer Networks Overview Direct link networks –Error detection - Section 2.4 –Reliable transmission - Section 2.5.
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
1 Chapter 16 Protocols and Protocol Layering. 2 Protocol  Agreement about communication  Specifies  Format of messages (syntax)  Meaning of messages.
Computer Networks Performance Metrics. Performance Metrics Outline Generic Performance Metrics Network performance Measures Components of Hop and End-to-End.
Wireless TCP Prasun Dewan Department of Computer Science University of North Carolina
University of the Western Cape Chapter 12: The Transport Layer.
SMUCSE 4344 transport layer. SMUCSE 4344 transport layer end-to-end protocols –transport code runs only on endpoint hosts encapsulates network communications.
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
COMT 4291 Performance of Data Communications Protocols General Protocol Concepts.
Transport Layer Moving Segments. Transport Layer Protocols Provide a logical communication link between processes running on different hosts as if directly.
Introduction1-1 Chapter 1 Computer Networks and the Internet Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose,
Chapter 12 Transmission Control Protocol (TCP)
Chapt 3 Data Link Layer1 Data Link Layer Functions –Provides services to network layer Well-defined interface –Framing –Flow control – between adjacent.
Chapter 5 Peer-to-Peer Protocols and Data Link Layer PART I: Peer-to-Peer Protocols ARQ Protocols and Reliable Data Transfer Flow Control.
Internet Protocols. Address Resolution IP Addresses are not recognized by hardware. If we know the IP address of a host, how do we find out the hardware.
Chapter 24 Transport Control Protocol (TCP) Layer 4 protocol Responsible for reliable end-to-end transmission Provides illusion of reliable network to.
Error/Flow Control Modeling (ARQ Modeling). © Tallal Elshabrawy 2 Data Link Layer  Data Link Layer provides a service for Network Layer (transfer of.
What is the Speed of the Internet? Internet Computing KUT Youn-Hee Han.
Review of key networking techniques: –Reliable communication over unreliable channels –Error detection and correction –Medium access control –routing –Congestion.
Transport Layer: Sliding Window Reliability
CSE 413: Computer Network Circuit Switching and Packet Switching Networks Md. Kamrul Hasan
Delay in packet switched network. Circuit switching In Circuit switched networks the resources needed along a path (buffers and link transmission rate)
LECTURE 12 NET301 11/19/2015Lect NETWORK PERFORMANCE measures of service quality of a telecommunications product as seen by the customer Can.
1 Transport Layer: Basics Outline Intro to transport UDP Congestion control basics.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Principles of reliable data transfer 0.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
1 Protocols and Protocol Layering. 2 Protocol Agreement about communication Specifies –Format of messages –Meaning of messages –Rules for exchange –Procedures.
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Lecture # 3: WAN Data Communication Network L.Rania Ahmed Tabeidi.
1 TCP ProtocolsLayer name DNSApplication TCP, UDPTransport IPInternet (Network ) WiFi, Ethernet Link (Physical)
A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their original slides that accompany the.
2003 컴퓨터 통신 1 Foundation # 컴퓨터 통신 2 Outline A Detailed FTP Example Layering Packet Switching and Circuit Switching Some terms –Data rate, “Bandwidth”
Computer Networking Lecture 16 – Reliable Transport.
CSEN 404 Introduction to Networks Amr El Mougy Lamia AlBadrawy.
DMET 602: Networks and Media Lab Amr El Mougy Yasmeen EssamAlaa Tarek.
Powerpoint Templates Data Communication Muhammad Waseem Iqbal Lec # 15.
DMET 602: Networks and Media Lab
Data Link Layer Flow Control.
Reliable Transport I: Concepts
Data Link Layer What does it do?
Net301 LECTURE 10 11/19/2015 Lect
CS4470 Computer Networking Protocols
Getting Connected (Chapter 2 Part 3)
The Transport Layer Reliability
Transport Layer Outline Intro to transport UDP
Computer Networks Protocols
Error Checking continued
Presentation transcript:

Internet and Intranet Protocols and Applications The Internet: Delay, Errors, Detection February, 2002 Joseph Conron Computer Science Department New York University

Internet: Congestion and Reliability Definition of reliable communication –Packets are delivered without modification. –Packets are delivered in order. –Packets are delivered exactly once. –Packets are delivered within some maximum time. –The sender and receiver(s) agree.

Internet: RTT and Delay Round Trip Time (RTT) –the time measured from send of request to receipt of response (from application view, this is called response time). Good Idea –keep average RTT small! Sources of Delay –Processing delay –Queuing delay –Transmission Delay –Propagation delay

Internet: Delay Processing delay –Time to process packet header and determine disposition Queuing delay –Time packet waits on a queue prior to transmission onto the link Transmission delay –Time for all bits of packet to be transmitted = L/R where L is packet size in bits and R is transmit rate in bits/sec. Propagation delay –Time from first bit is “on the wire” until bit is seen at the receiver = d/s where d is link distance (meters) and s is propagation speed of link (2*10 8 to 3*10 8 meters/sec)

Internet: How big are these delays? Example –NY to CA, T1 Link (1.54*10 6 bps), no routers –d = 5*10 6 m, s = 3*10 8 m/sec –So, propagation delay = 1.67*10 -2 sec = 16.7 msec –What is absolute minimum RTT? –For 1024 byte IP packet: Td = 8*1024/(1.54*10 6 ) = 5.3 msec –So, to send 1 packet and get 1 packet in response takes AT LEAST 44 msec! And that’s with a direct link – no routers!

Internet: detecting trouble Routers can drop packets (why?) But how do packets get out of order? How are they duplicated? How can they be corrupted? And most importantly, how can we detect this?

Internet: blame it on congestion! Routers can drop packets because: –They have no resources (memory) to process packet –The packet time-to-live (TTL) has expired (no route to host) Hhow do packets get out of order? –Packets n and n+1 take different routes –Path for packet n is more congested than path for packet n+1, hence n+1 packet arrives before packet n

Internet: how do duplicates occur! Well, we can only blame congestion indirectly. Suppose sender times out waiting for ACK for packet n? Suppose receiver actually got first packet n and sent ACK, but ACK is dropped due to congestion. Sender resends packet n! Receiver sees it as a duplicate! Can the ACK be duplicated?

Internet: packet corruption How can packets be corrupted? –Typically caused by a transient failure within the transmission medium, but relatively rare these days. –Can a software bug cause corruption? –What about an intruder (malicious tamper)?

Internet: sender/receiver agreement Sender wants to know that receiver has the packet) Most common technique: positive acknowledgment. TCP uses positive ack in sliding window mechanism.

Error detection mechanisms Sequence numbers –Defines order (for all n, n-1 before n) –Implies packet existence ( if receiver gets packet n+1, then there must be a packet n) –Detects duplicates (if all packets up to n have been received, then any packet < n is a duplicate) Timers –Using our knowledge of delays and the application, we can set time limits for responses.

Error detection mechanisms Detecting corruption –Check sums –CRC (Cyclic Redundancy Check) –Reed Solomon Codes –FEC (Forward Error Correction) –Message Digests