CS168 (and EE122) TAs past and present give you…..

Slides:



Advertisements
Similar presentations
Network Operations & administration CS 4592 Lecture 15 Instructor: Ibrahim Tariq.
Advertisements

EE 4272Spring, 2003 Chapter 7 Data Link Control Objectives: Effective & reliable data communication between two directly connected transmitting-receiving.
Assume that a file is transferred from a node A to a node B. The file has been fragmented in 5 frames. Frame 0 is corrupted, the ACK of frame 1 is corrupted,
Go-Back-N Improve Stop-and-Wait by not waiting!
Chapter 11 Data Link Control
Data link control. Data Link Control –Flow Control how much data may sent –Error Control How can error be detected and corrected.
Flow and Error Control. Flow Control Flow control coordinates the amount of data that can be sent before receiving acknowledgement It is one of the most.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 11 Data Link Control and Protocols.
ELEN 602 Lecture 5 Review of last lecture –Error Detection -- parity/CRC etc. Automatic Retransmission Request (ARQ) Reading: Chap
Chapter 6 Errors, Error Detection, and Error Control.
Transport Layer 3-1 Transport Layer r To learn about transport layer protocols in the Internet: m TCP: connection-oriented protocol m Reliability protocol.
EE 122: Error detection and reliable transmission Ion Stoica September 16, 2002.
1 Comnet 2006 Communication Networks Recitation 8 ARQ Protocols & Performance.
UCB Error Control in TCP Jean Walrand U.C. Berkeley
CSE 461: Sliding Windows & ARQ. Next Topic  We begin on the Transport layer  Focus  How do we send information reliably?  Topics  The Transport layer.
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Error Control.
1 K. Salah Module 6.1: TCP Flow and Congestion Control Connection establishment & Termination Flow Control Congestion Control QoS.
Principles of Reliable Data Transfer. Reliable Delivery Making sure that the packets sent by the sender are correctly and reliably received by the receiver.
CS3502: Data and Computer Networks DATA LINK LAYER - 2 WB version.
CSE 461 University of Washington1 Topic The sliding window algorithm – Pipelining and reliability – Building on Stop-and-Wait Yeah! Network.
Go-Back-N ARQ  packets transmitted continuously (when available) without waiting for ACK, up to N outstanding, unACK’ed packets  a logically different.
CS 4396 Computer Networks Lab
Data Link Control Protocols
ARQ Mechanisms Rudra Dutta ECE/CSC Fall 2010, Section 001, 601.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Chapter 11: Flow Control – can occur at layer 2 (data link) and at layer 4 (transport)  You saw the need in the most recent assignment.  Data packets.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data Link Layer We have now discussed the prevalent shared channel technologies  Ethernet/IEEE  Wireless LANs (802.11) We have now covered chapters.
15-1 Last time □ Reliable Data Transfer ♦ Provide rdt over unreliable network layer ♦ FSM model ♦ rdt 1.0: rdt over reliable channels ♦ rdt 2.0: rdt over.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 14.
Chapter 5 Peer-to-Peer Protocols and Data Link Layer PART I: Peer-to-Peer Protocols ARQ Protocols and Reliable Data Transfer Flow Control.
1 Transport Layer Lecture 10 Imran Ahmed University of Management & Technology.
1 TCP III - Error Control TCP Error Control. 2 ARQ Error Control Two types of errors: –Lost packets –Damaged packets Most Error Control techniques are.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data Link and Flow Control Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific.
Forward Error Correction vs. Active Retransmit Requests in Wireless Networks Robbert Haarman.
Chapter 3: Channel Coding (part 3). Automatic repeat request (ARQ) protocols ▫Used in combination with error detection/correction ▫Block of data with.
1 TCP - Part II Relates to Lab 5. This is an extended module that covers TCP data transport, and flow control, congestion control, and error control in.
TCP - Part II Relates to Lab 5. This is an extended module that covers TCP data transport, and flow control, congestion control, and error control in TCP.
Transport Layer: Sliding Window Reliability
Lecture Focus: Data Communications and Networking  Data Link Layer  Data Link Control Lecture 22 CSCS 311.
11.1 Flow and Error Control Flow Control Error Control.
Data Link Layer Flow and Error Control. Flow Control Flow Control Flow Control Specifies the amount of data can be transmitted by sender before receiving.
EE122 TAs past and present give you…..  Transport Algorithms  Stop and Wait  Go Back N  Selective Repeat  Router Architecture  Longest-Prefix-Match.
COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section M Topics: 1.Flow Control and ARQ Protocols.
Telecommunications & Networking Lesson 3. ISO Open System Interconnect (OSI) Application Presentation Session Transport Network Data Link Physical Application.
CSE/EE 461 Sliding Windows and ARQ. 2 Last Time We finished up the Network layer –Internetworks (IP) –Routing (DV/RIP, LS/OSPF) It was all about routing:
1 Direct Link Networks: Reliable Transmission Sections 2.5.
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 3: Transport.
Data Link Layer. Link Layer The data unit to be transmited at the link layer is called a frame. Why link layer? How can it know where a frame begins and.
CSCI 465 D ata Communications and Networks Lecture 11 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Part III. Data Link Layer Chapter 11. Data Link Control COMP 3270 Computer Networks Computing Science Thompson Rivers University.
CSE331: Introduction to Networks and Security Lecture 4 Fall 2002.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Data Link Layer Part II – Sliding Window Protocols.
Transmission Control Protocol (TCP) TCP Flow Control and Congestion Control CS 60008: Internet Architecture and Protocols Department of CSE, IIT Kharagpur.
DATA LINK CONTROL. DATA LINK LAYER RESPONSIBILTIES  FRAMING  ERROR CONTROL  FLOW CONTROL.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Computer Networking Lecture 16 – Reliable Transport.
1 COMP 431 Internet Services & Protocols The Transport Layer Pipelined Transport Protocols Jasleen Kaur March 29, 2016.
NET 222: COMMUNICATIONS AND NETWORKS FUNDAMENTALS ( NET 222: COMMUNICATIONS AND NETWORKS FUNDAMENTALS (PRACTICAL PART) Tutorial 4 : Chapter 7 Data & computer.
Data Link Layer.
Powerpoint Templates Data Communication Muhammad Waseem Iqbal Lec # 15.
Data Link Layer Flow Control.
TCP - Part III TCP Timers Selective Acknowledgements.
TCP Wrap-up TCP Timers Selective Acknowledgements.
Flow Control.
TCP - Part II Relates to Lab 5. This is an extended module that covers TCP flow control, congestion control, and error control in TCP.
CS4470 Computer Networking Protocols
Advanced Computer Networks
Getting Connected (Chapter 2 Part 3)
Presentation transcript:

CS168 (and EE122) TAs past and present give you….

 Transport Algorithms  Stop-and-Wait  Go-Back-N  Selective Repeat  Router Architecture  Longest-Prefix-Match  Head of Line Blocking

 Reliable Data Transmission  ARQ: Automatic Repeat reQuest  FEC: Forward Error Correction  We use ARQ for reliable transport. (Why?)  Sliding Window  transmit window  receive window

 ARQ Examples  Stop-and-Wait ▪ tx window size: 1 ▪ rx window size: 1  Go-Back-N ▪ tx window size: N ▪ rx window size: 1  Selective Repeat ▪ tx window size: N ▪ rx window size: N

 Difference between Go-back-N and SR Alice Bob (1) (2) (3) ACK (1) Reject! Go-back-N Alice Bob (1) (2) (3) ACK (1) Selective Repeat ACK (3)

 TCP Reliable Transmission  A variation of Go-Back-N scheme  Many TCP implementations will buffer correctly received but out-of-order segments.  Selective Acknowledgement (SACK)  Selective Repeat  Cumulative ACKs  The sequence number is in bytes.  Therefore each packet may contain a continuous range of sequence numbers [seq, seq+len).  The receiver send an ACK seq+len for the packet, specifying it have received all data preceding seq+len bytes.  In TCP, an ACK specifies the sequence number of the next byte the receiver expects to receive.

Alice Bob (1) ACK(1) (3) ACK(2) (2) ACK(3) (3) ACK(3) (4) ACK(5) (5) Timeout!

 Tips and Tricks:  Always draw a timing diagram when trying to understand a new protocol!  If the homework/midterm asks for how long something takes, the timing diagram will help you calculate it.

Alice Bob (1) ACK(1) ACK(2) (2) ACK(3) (3) ACK(4) (4) ACK(5) (5) Transmission Delay for one packet: 2ms Propagation Delay for one packet: 30ms 10 packets sent. 32 * 10 = 320 ms

Alice Bob (1) (2) (3) Sliding Window

Alice Bob (1) (2) (3) ACK (1) (4) Sliding Window

Alice Bob (1) (2) (3) ACK (1) ACK (2) (4) (5) Sliding Window

Alice Bob (1) (2) (3) ACK (1) ACK (2) (4) (5) ACK (3) ACK (4) ACK (5) Sliding Window

Alice Bob (1) (2) (3) ACK (1) ACK (2) (4) (5) ACK (3) ACK (4) ACK (5) How long did it take for the LAST packet to be ACKed back to Alice?

Alice Bob (1) (2) (3) ACK (1) ACK (2) (4) (5) ACK (3) ACK (4) ACK (5) How long did it take for the LAST packet to be ACKed back to Alice? = 130ms 64ms 2ms

Alice Bob Alice Bob (1) (2) (3) ACK (1) ACK (2) ACK (3) (4) (5) ….timeout! (4) (5) ACK (4) ACK (5) How long did it take for the LAST packet to be ACKed back to Alice?

Alice Bob Alice Bob (1) (2) (3) ACK (1) ACK (2) ACK (3) (4) (5) ….timeout! (4) (5) ACK (4) ACK (5) 64ms 100ms 2ms 64ms How long did it take for the LAST packet to be ACKed back to Alice? = 230ms

Alice Bob (1) (2) (3) ACK (1) ACK (2) (4) ACK (3) How long did it take for the LAST packet to be ACKed back to Alice?

Alice Bob Alice Bob (1) (2) (3) ACK (1) ACK (2) ACK (3) (4) (5) (4) ACK (4) ACK (5) How long did it take for the LAST packet to be ACKed back to Alice? ….timeout!

Alice Bob Alice Bob (1) (2) (3) ACK (1) ACK (2) ACK (3) (4) (5) (4) ACK (4) ACK (5) How long did it take for the LAST packet to be ACKed back to Alice? = 228ms. ….timeout! 64ms 100ms

 Tips and Tricks:  Convert everything to binary first.  Always match from left-to-right.  Looking for the longest exact match starting from the first bit.

 Tips and Tricks:  Draw out your queues with the packets in them.  Cross out all of the packets that can go across the interconnect in a single round.  Mark “1”  Repeat with the remaining packets, marking 2 after you’ve “scheduled” one round.  Repeat again: 3, 4, etc until all packets are gone.

(1) (2) (3) (1) (2)(3)

(1) (2) (3) (1) (2) (3) (1)

(2) (3) (1) (3) (1,2)

(1) (2) (3) (1,2,3,4)

(1) (2) (3)

(1) (2) (3) (1)

(2) (3) (1)

(2) (3) (1,2)

(1) (2) (3) 3 (1,2,3)