TCP Overview Connection-oriented Byte-stream Full duplex

Slides:



Advertisements
Similar presentations
CSCI-1680 Transport Layer II Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Rodrigo Fonseca.
Advertisements

1 Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie Chapter 5 End-to-End Protocols Copyright © 2010, Elsevier Inc. All rights.
Courtesy: Nick McKeown, Stanford Umar Kalim, NIIT Robin Kravets, UIUC 1 Transmission Control Protocol (TCP), Tahir Azim.
Slide Set 13: TCP. In this set.... TCP Connection Termination TCP State Transition Diagram Flow Control How does TCP control its sliding window ?
CS 6401 Transport Control Protocol Outline TCP objectives revisited TCP basics New algorithms for RTO calculation.
Computer Networks Chapter 5: End-to-End Protocols
Fundamentals of Computer Networks ECE 478/578 Lecture #20: Transmission Control Protocol Instructor: Loukas Lazos Dept of Electrical and Computer Engineering.
1 Chapter 5 End-to-End Protocols Outline 5.1 UDP 5.2 TCP 5.3 Remote Procedure Call.
8. Transport Protocol and UDP 8.1 Transport protocol : End-to-end protocol –IP: Host to host packet delivery –Transport: Process to process communication.
CSS432: End-to-End Protocols 1 CSS432 End-to-End Protocols Textbook Ch5.1 – 5.2 Professor: Munehiro Fukuda.
Provides a reliable unicast end-to-end byte stream over an unreliable internetwork.
1 Reliable Byte-Stream (TCP) Outline Connection Establishment/Termination Sliding Window Revisited Flow Control Adaptive Timeout.
6-May-154/598N: Computer Networks End-to-End Protocols Underlying best-effort network –drop messages –re-orders messages –delivers duplicate copies of.
CSE Computer Networks Prof. Aaron Striegel Department of Computer Science & Engineering University of Notre Dame Lecture 14 – February 23, 2010.
TCP 4/15/2017.
Fundamentals of Computer Networks ECE 478/578 Lecture #21: TCP Window Mechanism Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
CSE 124 Networked Services Fall 2009 B. S. Manoj, Ph.D 10/20/20091CSE 124 Networked Services Fall 2009 Some.
Spring 2003CS 4611 Reliable Byte-Stream (TCP) Outline Connection Establishment/Termination Sliding Window Revisited Flow Control Adaptive Timeout.
TCP. Learning objectives Reliable Transport in TCP TCP flow and Congestion Control.
Spring 2002CS 4611 Reliable Byte-Stream (TCP) Outline Connection Establishment/Termination Sliding Window Revisited Flow Control Adaptive Timeout.
TCP : Transmission Control Protocol Computer Network System Sirak Kaewjamnong.
1 Internet Engineering University of ilam Dr. Mozafar Bag-Mohammadi Transport Layer.
SMUCSE 4344 transport layer. SMUCSE 4344 transport layer end-to-end protocols –transport code runs only on endpoint hosts encapsulates network communications.
1 Introduction to Computer Networks University of ilam Dr. Mozafar Bag-Mohammadi Transport Layer.
1 CS 4396 Computer Networks Lab TCP – Part II. 2 Flow Control Congestion Control Retransmission Timeout TCP:
1 Reliable Byte-Stream (TCP) Outline Connection Establishment/Termination Sliding Window Revisited Flow Control Adaptive Timeout.
Spring 2008CPE Computer Networks1 Reliable Byte-Stream (TCP) Outline Connection Establishment/Termination Sliding Window Revisited Flow Control.
1 End-to-End Protocols User Datagram Protocol (UDP) Transmission Control Protocol(TCP)
1 Reliable Byte-Stream (TCP) Outline Connection Establishment/Termination Sliding Window Revisited Flow Control Adaptive Timeout.
Ilam University Dr. Mozafar Bag-Mohammadi 1 Transport Layer.
EE 122: Transport Protocols Kevin Lai October 16, 2002.
Transmission Control Protocol (TCP) connection-oriented stream data transfer data sent as an unstructured stream of bytes reliability acknowledgements.
1 End-to-End Protocols UDP TCP –Connection Establishment/Termination –Sliding Window Revisited –Flow Control –Congestion Control –Adaptive Timeout.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
1 TCP ProtocolsLayer name DNSApplication TCP, UDPTransport IPInternet (Network ) WiFi, Ethernet Link (Physical)
3. END-TO-END PROTOCOLS (PART 1) Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University 22 March
Univ. of TehranIntroduction to Computer Network1 An Introduction Computer Networks An Introduction to Computer Networks University of Tehran Dept. of EE.
Advanced Computer Networks
3. END-TO-END PROTOCOLS (PART 2) Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University 22 March
TCP - Part II.
Fast Retransmit For sliding windows flow control we waited for a timer to expire before beginning retransmission of a packet TCP uses an additional mechanism.
Chapter 5 TCP Sequence Numbers & TCP Transmission Control
Transport Control Protocol
5. End-to-end protocols (part 1)
Chapter 5 TCP Sliding Window
ECE544: Communication Networks-II Spring 2010
Internet routing Problem: Route from any node to any other node
Transport Layer Unit 5.
CSS432 End-to-End Protocols Textbook Ch5.1 – 5.2
The University of Adelaide, School of Computer Science
The University of Adelaide, School of Computer Science
Transport Control Protocol
CSS432 End-to-End Protocols Textbook Ch5.1 – 5.2
5. End-to-end protocols (part 2)
Lecture 18 – More TCP & Congestion Control
Reliable Byte-Stream (TCP)
Ilam University Dr. Mozafar Bag-Mohammadi
Transmission Control Protocol (TCP) Part II Neil Tang 11/21/2008
State Transition Diagram
Advanced Computer Networks
CSS432 End-to-End Protocols Textbook Ch5.1 – 5.2
The University of Adelaide, School of Computer Science
CSS432 UDP and TCP Textbook Ch5.1 – 5.2
Transport Protocols: TCP Segments, Flow control and Connection Setup
Introduction to Computer Networks
Introduction to Computer Networks
Chapter 5 TCP Sliding Window
Introduction to Computer Networks
Transport Protocols: TCP Segments, Flow control and Connection Setup
TCP: Transmission Control Protocol Part II : Protocol Mechanisms
Presentation transcript:

TCP Overview Connection-oriented Byte-stream Full duplex app writes bytes TCP sends segments app reads bytes Full duplex Flow control: keep sender from overrunning receiver Congestion control: keep sender from overrunning network Application process Application process W rite Read … bytes … bytes TCP TCP Send buffer Receive buffer … Segment Segment Segment T ransmit segments

Remember TCP: Segments, IP: packets, Ethernet: Frames TCP segments are encapsulated as IP data which are encapsulated as Ethernet frame data

Data Link Versus Transport (TCP) Potentially connects many different hosts need explicit connection establishment and termination TCP three way hand-shake Potentially different RTT need adaptive timeout mechanism Potentially long delay in network need to be prepared for arrival of very old packets Sequence number space should be well thought out Potentially different capacity at destination need to accommodate different node capacity Flow control Potentially different network capacity need to be prepared for network congestion Congestion control

Segment Format

Segment Format (cont) Each connection identified with 4-tuple: (SrcPort, SrcIPAddr, DstPort, DstIPAddr) Sliding window + flow control acknowledgment, SequenceNum, AdvertisedWindow Flags SYN, FIN, RESET, PUSH, URG, ACK Checksum pseudo header + TCP header + data

Sequence Number Selection Initial sequence number (ISN) selection Why not simply chose 0? Must avoid overlap with earlier incarnation. New sequence number should be larger than previous number. Why can’t the system remember the previous number used? Requirements for ISN selection Must operate correctly Without synchronized clocks Despite node failures

ISN and Quiet Time Use local clock to select ISN Clock wraparound must be greater than max segment lifetime (MSL) Upon startup, cannot assign sequence numbers for MSL seconds Can still have sequence number overlap If sequence number space not large enough for high-bandwidth connections

Connection Establishment Active participant (client) Passive participant (server) SYN, SequenceNum = x SYN + ACK, SequenceNum = y Acknowledgment = x+1 Three way handshake ACK, Acknowledgment = y + 1

Connection Tear-down Normal termination Allow unilateral close Avoid sequence number overlap TCP must continue to receive data even after closing Cannot close connection immediately: what if a new connection restarts and uses same sequence number and receives retransmitted FIN from the current session?

Tear-down Packet Exchange Sender Receiver FIN FIN-ACK Data write Data ack FIN FIN-ACK

State Transition Diagram CLOSED LISTEN SYN_RCVD SYN_SENT ESTABLISHED CLOSE_WAIT LAST_ACK CLOSING TIME_WAIT FIN_WAIT_2 FIN_WAIT_1 Passive open Close Send/ SYN SYN/SYN + ACK SYN + ACK/ACK ACK /FIN FIN/ACK ACK + FIN/ACK Timeout after two segment lifetimes Active open /SYN

Sliding Window Revisited Sending application LastByteWritten TCP LastByteSent LastByteAcked Receiving application LastByteRead LastByteRcvd NextByteExpected Sending side LastByteAcked < = LastByteSent LastByteSent < = LastByteWritten buffer bytes between LastByteAcked and LastByteWritten Receiving side LastByteRead < NextByteExpected NextByteExpected < = LastByteRcvd +1 buffer bytes between NextByteRead and LastByteRcvd

Flow Control Fast sender can overrun receiver: Possible solutions: Packet loss, unnecessary retransmissions Possible solutions: Sender transmits at pre-negotiated rate Sender limited to a window’s worth of unacknowledged data Flow control different from congestion control

Flow Control Send buffer size: MaxSendBuffer Receive buffer size: MaxRcvBuffer Receiving side LastByteRcvd - LastByteRead < = MaxRcvBuffer AdvertisedWindow = MaxRcvBuffer - (NextByteExpected - NextByteRead) Sending side LastByteSent - LastByteAcked < = AdvertisedWindow EffectiveWindow = AdvertisedWindow - (LastByteSent - LastByteAcked) LastByteWritten - LastByteAcked < = MaxSendBuffer block sender if (LastByteWritten - LastByteAcked) + y > MaxSenderBuffer Always send ACK in response to arriving data segment Persist when AdvertisedWindow = 0

Round-trip Time Estimation Wait at least one RTT before retransmitting Importance of accurate RTT estimators: Low RTT -> unneeded retransmissions High RTT -> poor throughput RTT estimator must adapt to change in RTT But not too fast, or too slow! Problem: If the instantaneously calculated RTT is 10, 20, 5, 12, 3 , 5, 6; what RTT should we use for calculations?

Initial Round-trip Estimator Round trip times exponentially averaged: New RTT = a (old RTT) + (1 - a) (new sample) Recommended value for a: 0.8 - 0.9 Retransmit timer set to b RTT, where b = 2 Every time timer expires, RTO exponentially backed-off

Retransmission Ambiguity Original transmission Original transmission ACK Sample RTT Sample RTT retransmission retransmission ACK

Karn’s Retransmission Timeout Estimator Accounts for retransmission ambiguity If a segment has been retransmitted: Don’t count RTT sample on ACKs for this segment Keep backed off time-out for next packet Reuse RTT estimate only after one successful transmission

Karn/Partridge Algorithm Do not sample RTT when retransmitting Double timeout after each retransmission Sender Receiver Original transmission ACK SampleR TT Retransmission

Jacobson’s Retransmission Timeout Estimator Key observation: Using b RTT for timeout doesn’t work At high loads round trip variance is high Solution: If D denotes mean variation Timeout = RTT + 4D

Jacobson/ Karels Algorithm New Calculations for average RTT Diff = SampleRTT - EstRTT EstRTT = EstRTT + (d x Diff) Dev = Dev + d( |Diff| - Dev) where d is a factor between 0 and 1 Consider variance when setting timeout value TimeOut = m x EstRTT + f x Dev where m = 1 and f = 4 Notes algorithm only as good as granularity of clock (500ms on Unix) accurate timeout mechanism important to congestion control (later)

Congestion 10 Mbps 100 Mbps 1.5 Mbps If both sources send full windows, we may get congestion collapse Other forms of congestion collapse: Retransmissions of large packets after loss of a single fragment Non-feedback controlled sources

Congestion Response Avoidance keeps the system performing at the knee delay throughput load load Avoidance keeps the system performing at the knee Control kicks in once the system has reached a congested state

Separation of Functionality Sending host must adjust amount of data it puts in the network based on detected congestion Routers can help by: Sending accurate congestion signals Isolating well-behaved from ill-behaved sources