Chapter6-TransportLayer-Computer Netrworks.ppt

DhamodharSaranya 187 views 99 slides Jul 11, 2024
Slide 1
Slide 1 of 99
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68
Slide 69
69
Slide 70
70
Slide 71
71
Slide 72
72
Slide 73
73
Slide 74
74
Slide 75
75
Slide 76
76
Slide 77
77
Slide 78
78
Slide 79
79
Slide 80
80
Slide 81
81
Slide 82
82
Slide 83
83
Slide 84
84
Slide 85
85
Slide 86
86
Slide 87
87
Slide 88
88
Slide 89
89
Slide 90
90
Slide 91
91
Slide 92
92
Slide 93
93
Slide 94
94
Slide 95
95
Slide 96
96
Slide 97
97
Slide 98
98
Slide 99
99

About This Presentation

Computer Networks Transport Layer by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011


Slide Content

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
The Transport Layer
Chapter 6

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Transport Service
•Upper Layer Services
•Transport Service Primitives
•Berkeley Sockets
•Example of Socket Programming:
Internet File Server

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Services Provided to the Upper Layers
The network, transport, and application layers
Establishment, data transfer and release/ Make it more reliable than the
underlying layer

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Transport Service Primitives (1)
The primitives for a simple transport service

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Transport Service Primitives (2)
Nesting of TPDU (Transport Protocol Data Unit) s, packets, and
frames.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Berkeley Sockets (1)
A state diagram for a simple connection management scheme.
Transitions labeled in italics are caused by packet arrivals. The
solid lines show the client’s state sequence. The dashed lines
show the server’s state sequence.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Berkeley Sockets (2)
The socket primitives for TCP

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Example of Socket Programming:
An Internet File Server (1)
. . . Client code using sockets

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Example of Socket Programming:
An Internet File Server (2)
. . .
. . .
Client code using sockets

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Example of Socket Programming:
An Internet File Server (3)
. . .
Client code using sockets

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Example of Socket Programming:
An Internet File Server (4)
. . .
Server code

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Example of Socket Programming:
An Internet File Server (5)
. . .
Server code
. . .

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Example of Socket Programming:
An Internet File Server (6)
. . .
Server code

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Elements of Transport Protocols (1)
•Addressing
•Connection establishment
•Connection release
•Error control and flow control
•Multiplexing
•Crash recovery

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Similarity between data link and transport
layer
•Connection establishment
•Connection release
•Error control and flow control

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Elements of Transport Protocols (2)
(a)Environment of the data link layer.
(b)Environment of the transport layer.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Addressing (1)
TSAPs, NSAPs, and transport connections

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Addressing (2)
How a user process in host 1 establishes a connection
with a mail server in host 2 via a process server.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Connection Establishment (1)
Techniques for restricting packet lifetime
A.Throwaway transport addresses
B.Each connection a identifier <Peer
transport entity, connection entity>

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Connection Establishment (2)
Maintain history problem if crashed
•Restricted network design.
•Putting a hop counter in each packet.
•Timestampingeach packet.
•Also acknowledgement needs to be
erased with time T

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Connection Establishment (3)
Three protocol scenarios for establishing a connection using a
three-way handshake. CR denotes CONNECTION REQUEST.
Normal operation.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Connection Establishment (4)
Three protocol scenarios for establishing a connection using a
three-way handshake. CR denotes CONNECTION REQUEST. Old
duplicate CONNECTION REQUEST appearing out of nowhere.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Connection Establishment (5)
Three protocol scenarios for establishing a connection using a
three-way handshake. CR denotes CONNECTION REQUEST.
Duplicate CONNECTION REQUEST and duplicate ACK

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Connection Release (1)
Abrupt disconnection with loss of data –one way release or two
way release

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Connection Release (2)
The two-army problem
Synchronize which will go on infinitely

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Connection Release (3)
Four protocol scenarios for releasing a connection.
(a) Normal case of three-way handshake

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Connection Release (4)
Four protocol scenarios for releasing a connection.
(b) Final ACK lost.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Connection Release (5)
Four protocol scenarios for releasing a connection.
(c) Response lost

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Connection Release (6)
Four protocol scenarios for releasing a connection.
(d) Response lost and subsequent DRs lost.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Error Control and Flow Control (1)
(a) Chained fixed-size buffers. (b) Chained variable-sized
buffers. (c)One large circular buffer per connection.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
a)For low-bandwidth bursty traffic, it is better not allot buffer but
dynamically allot buffer
b)Decouple sliding window protoco;

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Error Control and Flow Control (2)
Dynamic buffer allocation. The arrows show the direction of
transmission. An ellipsis (...) indicates a lost TPDU

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
a)Infinite size buffer –k disjoint paths, x packets/sec
b)If the network can handle c TPDU/sec, cycle time –r then
total = cr

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Multiplexing
(a) Multiplexing.(b) Inverse multiplexing.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Crash Recovery
Different combinations of client and server strategy

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
The Internet Transport Protocols: TCP (1)
•Introduction to TCP
•The TCP service model
•The TCP protocol
•The TCP segment header
•TCP connection establishment
•TCP connection release

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
The Internet Transport Protocols: TCP (2)
•TCP connection management modeling
•TCP sliding window
•TCP timer management
•TCP congestion control
•TCP futures

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
The TCP Service Model (1)
Some assigned ports
Internet Daemon (inetd) attach itself to multiple ports and wait
for the first connection request, then fork to that service

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
a)All TCP connections are full duplex and point-to-point
b)Each connection has exactly two ends
c)TCP doesn’t support multicasting or broadcasting.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
The TCP Service Model (2)
(a)The TCP is byte-stream and not a message-stream, so
messages are not differentiated.
(b)Four 512-byte segments sent as separate IP diagrams
(c)The 2048 bytes of data delivered to the application in a
single READ call

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
The TCP Service Model (2)
(a)To force data out --PUSH flag
(b)Too many PUSH-es then all PUSH are collected together
and sent.
(c)URGENT –on pushing Ctrl-C to break-off remote
computation, the sending application puts some control flag

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
TCP Header
TCP segment –20 byte IP header, 20 –byte TCP header, total
65,535 = 64 KB

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
The TCP Segment Header
Ack no = one more –what is next expected
TCP Header –how many optional field
CWR/ECE –Congestion controlling bits (ECE –Echo, CWR –Congestion
window reduced)
URG –Urgent, (URGENT POINTER –OFFSET) ACK –Acknowledgement,
PSH –Pushed RST –reset, SYN = 1 (CONNECTION REQUEST,
CONNECTION ACEEPTED), ACK =0 (REQUEST) ACK = 1(ACCEPT)
WINDOW SIZE = HOW MANY BUFFERS MAY BE GRANTED, CAN BE
ZERO

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
The TCP Segment Header
CHECK SUM –IP ADDR + TCP HEADER + DATA,
ADD ALL THE 16 BITS WORD IN ONES COMPLEMENT AND
THEN TAKE ONE’ COMPLEMENT OF THE SUM
ON ADD WITH CHECKSUM –SUMMATION WOULD BE
ZERO
CROSS LAYER

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
The TCP Segment Header
INSTEAD OF GO-BACK-N, HAVE NAKS

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
TCP Connection Establishment
(a)TCP connection establishment in the normal case.
(b)Simultaneous connection establishment on both sides.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
TCP Connection Release
a)Either party send with the FIN bit set
b)When the FIN is acknowledged, that direction is shut down
for new data
c)Full closing (TWO FIN and TWO ACK)

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
TCP Connection Management Modeling (1)
The states used in the TCP connection
management finite state machine.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
TCP Connection Management Modeling (2)
TCP connection management
finite state machine.
The heavy solid line is the
normal path for a client. The
heavy dashed line is the
normal path for a server. The
light lines are unusual events.
Each transition is labeled by
the event causing it and the
action resulting from it,
separated by a slash.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
TCP Sliding Window (1)
Window management in TCP
When send –with ) window size –a). Urgent bytes and b). 1-
byte to make the receiver to reannounce the next byte
expected

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Nagle’s Algorithm
a)Interactive Editor ---Sending 1-byte would involve 162 bytes
(40 to send, 40 to ACK, 41 to update, 40 to ack)
b)Nagle’s Algorithm –When data comes into the sender one
byte at a time, just send the first byte and buffer the rest until
the outstanding byte is acknowledged

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
TCP Sliding Window (2)
Silly window syndrome … Clark’s solution –prevent receiver from
sending a window update for 1 byte.
Specifically the receiver should not send a window update until it
get the maximum segement advertised free

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
a)Receiver –Block READ from the application until a large
chunk of data arrives
b)Out of order –0, 1,2,4,5,6,7

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
TCP Congestion Control --Regulating the
Sending Rate (1)
A fast network feeding a low-capacity receiver

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Regulating the Sending Rate (2)
A slow network feeding a high-capacity receiver

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
TCP Congestion Control
a)Two windows –the window a receiver window grants
b)Congestion window
c)Slow start –1024 byte -move exponentially –SLOW START
d)Set threshold –grow linearly after that

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
TCP Congestion Control (3)
Slow start followed by additive increase in TCP Tahoe.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
TCP Timer Management
(a). Retransmission timer
(a)Probability density of acknowledgment arrival times in data
link layer. (b) … for TCP

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Retransmission Timer
a)RTT = \alpha RTT + (1-\alpha) M
b)Time-out = \beta . RTT
c)D = \alpha . D + (1 -\alpha) |RTT –M|
d)Timeout = RTT + 4 x D

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Retransmission Timer
a)Karn’s algorithm –In dynamic estimation of RTT when a
segment times out and is resend.
b)It is not clear whether the acknowledgement is from the
original or resend.
c)SO don’t include resend packets RTT into calculation.
d)Each time failure double Time-out time

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Persistence Timer
a)When Persistence timer goes off the transmitter pings the
receiver whether buffer space is available
Keepalive TImer
If idle checks whether the connection is active and then if not
closes connection
CONTROVERSIAL –It may stop healthy connection due to
transient network partitioning

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
The Internet Transport Protocols: UDP
•Introduction to UDP
•Remote Procedure Call
•Real-Time Transport

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Introduction to UDP (1)
The UDP header.
Checksum not used (digitized speech)
Does not flow-control, error control or timing
Does Multiplexing
UDP useful –client-server situations, client sends a short
request to the server and expects a short reply back. If
time-out retransmit rather than establish connection
Use-case –host name to a DNS server

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Remote Procedure Call
get_ip_address(host_name)

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Remote Procedure Call
Steps in making a remote procedure call. The stubs are shaded.
Packing the parameters is called marshalling

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Remote Procedure Call
get_ip_address(host_name)
Pointer, global variable

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Real-Time Transport (1)
(a) The position of RTP in the protocol stack. (b) Packet nesting.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Real-Time Transport (1)
It is difficult to say which layer RTP is in
It is generic and application independent
Best Description -transport protocol implemented in the
application layer
Basic Function of RTP –multiplex several real-time data streams
onto a single stream of UDP packets.
Each packet is given a number one higher than its predecessor.
Allows the destination to determine whether any packets are
missing
Then interpolate

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Real-Time Transport (1)
Timestamp
Relative values can be obtained
Allow multiple streams (audio/video) to combine together

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Real-Time Transport (2)
The RTP header

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Real-Time Transport (3)
Smoothing the output stream by buffering packets

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Real-Time Transport (3)
High jitter

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Real-Time Transport (4)
Low jitter

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
TCP Congestion Control (1)
Slow start from an initial congestion window of 1 segment

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
TCP Congestion Control (2)
Additive increase from an initial congestion
window of 1 segment.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
TCP Congestion Control (4)
Fast recovery and the sawtooth pattern of TCP Reno.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Performance Issues
•Performance problems in computer networks
•Network performance measurement
•System design for better performance
•Fast TPDU processing
•Protocols for high-speed networks

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Performance Problems in Computer
Networks
The state of transmitting one megabit from San Diego to Boston.
(a) At t = 0. (b) After 500 μ sec.
(c) After 20 msec. (d) After 40 msec.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Network Performance Measurement (1)
Steps to performance improvement
1.Measure relevant network parameters,
performance.
2.Try to understand what is going on.
3.Change one parameter.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Network Performance Measurement (2)
Issues in measuring performance
•Sufficient sample size
•Representative samples
•Clock accuracy
•Measuring typical representative load
•Beware of caching
•Understand what you are measuring
•Extrapolate with care

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Network Performance Measurement (3)
Response as a function of load.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
System Design for Better Performance (1)
Rules of thumb
1.CPU speed more important than network speed
2.Reduce packet count to reduce software overhead
3.Minimize data touching
4.Minimize context switches
5.Minimize copying
6.You can buy more bandwidth but not lower delay
7.Avoiding congestion is better than recovering from it
8.Avoid timeouts

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
System Design for Better Performance (2)
Four context switches to handle one packet
with a user-space network manager.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Fast TPDU Processing (1)
The fast path from sender to receiver is shown with a heavy
line. The processing steps on this path are shaded.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Fast TPDU Processing (2)
(a) TCP header. (b) IP header. In both cases, the shaded fields
are taken from the prototype without change.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Protocols for High-Speed Networks (1)
A timing wheel

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Protocols for High-Speed Networks (2)
Time to transfer and acknowledge a
1-megabit file over a 4000-km line

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Delay Tolerant Networking
•DTN Architecture
•The Bundle Protocol

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
DTN Architecture (1)
Delay-tolerant networking architecture

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
DTN Architecture (2)
Use of a DTN in space.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
The Bundle Protocol (1)
Delay-tolerant networking protocol stack.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
The Bundle Protocol (2)
Bundle protocol message format.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Congestion Control
•Desirable bandwidth allocation
•Regulating the sending rate

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Desirable Bandwidth Allocation (1)
(a) Goodputand (b) delay as a function of offered load

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Desirable Bandwidth Allocation (2)
Max-min bandwidth allocation for four flows

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Desirable Bandwidth Allocation (3)
Changing bandwidth allocation over time

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Regulating the Sending Rate (3)
Some congestion control protocols

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Regulating the Sending Rate (4)
Additive Increase Multiplicative Decrease (AIMD) control law.
User 1’s allocation
User 2

s allocation

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
End
Chapter 6