15-441 Computer Networking Lecture 16 – Transport Protocols.

Slides:



Advertisements
Similar presentations
Transport Layer3-1 Transport Overview and UDP. Transport Layer3-2 Goals r Understand transport services m Multiplexing and Demultiplexing m Reliable data.
Advertisements

CSE551: Computer Network Review r Network Layers r TCP/UDP r IP.
Computer Networks 2 Lecture 2 TCP – I - Transport Protocols: TCP Segments, Flow control and Connection Setup.
CPSC 441: Intro, UDP1 Transport Layer Instructor: Carey Williamson Office: ICT Class Location:
Chapter 3 outline 3.1 transport-layer services
EEC-484/584 Computer Networks Lecture 15 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
1 Lecture 14 MPLS Intro to Transport, Reliability, and TCP Networking, Spring 2007 As usual, adapted from Srini Seshan and David Anderson, ,
Transport Layer 3-1 outline r TCP m segment structure m reliable data transfer m flow control m congestion control.
Transport Layer 3-1 Fast Retransmit r time-out period often relatively long: m long delay before resending lost packet r detect lost segments via duplicate.
Computer Communication Digital Communication in the Modern World Transport Layer Multiplexing, UDP
Chapter 3: Transport Layer
Transport Layer 3-1 Transport Layer r To learn about transport layer protocols in the Internet: m TCP: connection-oriented protocol m Reliability protocol.
Transport Layer3-1 Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable data transfer.
Computer Networking Lecture 16 – Transport Protocols.
Transport Layer 3-1 Transport Layer r To learn about transport layer protocols in the Internet: m TCP: connection-oriented protocol m Reliability protocol.
Lecture 8 Chapter 3 Transport Layer
Lecture 7 – Transport Protocols
CPSC 441: Intro, UDP1 Instructor: Anirban Mahanti Office: ICT Class Location: ICT 121 Lectures: MWF 12:00 – 12:50 Notes.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
2: Application Layer 1 1DT066 Distributed Information System Chapter 3 Transport Layer.
Some slides are in courtesy of J. Kurose and K. Ross Review of Previous Lecture Electronic Mail: SMTP, POP3, IMAP DNS Socket programming with TCP.
3-1 Transport services and protocols r provide logical communication between app processes running on different hosts r transport protocols run in end.
8-1 Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable data transfer m flow.
Transport Layer Transport Layer. Transport Layer 3-2 Chapter 3 Transport Layer Computer Networking: A Top Down Approach Featuring the Internet,
Review: –What is AS? –What is the routing algorithm in BGP? –How does it work? –Where is “policy” reflected in BGP (policy based routing)? –Give examples.
Data Communications and Computer Networks Chapter 3 CS 3830 Lecture 12 Omar Meqdadi Department of Computer Science and Software Engineering University.
CS 1652 The slides are adapted from the publisher’s material All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Jack Lange.
Network LayerII-1 RSC Part III: Transport Layer 1. Basic Concepts Redes y Servicios de Comunicaciones Universidad Carlos III de Madrid These slides are,
Transport Layer 3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All.
Transport Layer and UDP Tahir Azim Ref:
Transport Layer 3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Part.
Chapter 3 Transport Layer
Transport Layer1 Ram Dantu (compiled from various text books)
1 Transport Layer Lecture 7 Imran Ahmed University of Management & Technology.
Computer Networking Lecture 16 – Transport Protocols Dejian Ye, Liu Xin.
Lecture91 Administrative Things r Return homework # 1 r Review some problems in homework # 1 r Questions about grading? Yona r WebCT for CSE245 is working!
CSE679: Computer Network Review r Review of the uncounted quiz r Computer network review.
Computer Networking Review 2 – Transport Protocols.
Transport Layer3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July A.
Lecture 15 – Transport Protocols Eric Anderson Fall Computer Networking.
Transport Layer 3-1 Chapter 3 Outline r 3.1 Transport-layer services r 3.2 Multiplexing and demultiplexing r 3.3 Connectionless transport: UDP.
Chapter 3: Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable data transfer.
Computer Network Management Review 2 – Transport Protocols Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought.
Transport Layer3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley,
Computer Networking Lecture 16 – Transport Protocols Copyright ©, Carnegie Mellon University.
Transport Layer 3-1 Internet Transport Layer Lecture 8 Dr. Najla Al-Nabhan.
Prof. Younghee Lee 1 1 Computer Networks u Lecture 5: Transport services and protocols Prof. Younghee Lee * Some part of this teaching materials are prepared.
MULTIPLEXING/DEMULTIPLEXING, CONNECTIONLESS TRANSPORT.
Transport Protocols.
Advanced Computer Networking Review 2 – Transport Protocols Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought.
Transport Layer3-1 Chapter 3: Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable.
Introduction 1-1 source application transport network link physical HtHt HnHn M segment HtHt datagram destination application transport network link physical.
CSEN 404 Transport Layer II Amr El Mougy Lamia AlBadrawy.
2: Transport Layer 11 Transport Layer 1. 2: Transport Layer 12 Part 2: Transport Layer Chapter goals: r understand principles behind transport layer services:
Computer Networking Lecture 16 – Reliable Transport.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
Computer Networking Lecture 15 – Transport Protocols Copyright ©, Carnegie Mellon University.
Computer Networking Transport Layer.
Chapter 3 outline 3.1 Transport-layer services
Review 2 – Transport Protocols
Introduction of Transport Protocols
Internet and Intranet Protocols and Applications
TCP and Congestion Control (1)
Transport Layer Our goals:
Lecture 16 – Transport Protocols
Chapter 5 Transport Layer Introduction
Transport Protocols: TCP Segments, Flow control and Connection Setup
Transport Protocols: TCP Segments, Flow control and Connection Setup
Transport Layer Our goals:
Presentation transcript:

Computer Networking Lecture 16 – Transport Protocols

Lecture 16: Transport Protocols2 Announcements Mid-semester grades Based on project1 + midterm + HW1 + HW2 42.5% of class If you got a D+,D, D- or F  must meet with Dave or me 57.5% of class grade remains!

Lecture 16: Transport Protocols3 Feedback (positive) Likes: 12: lectures (or some aspect of lectures) 8: project 4: recitations 3: HW 2: cookies More: 3: more practical apps/tools (IRC, IPTV, BitTorrent, P2P, ethereal) 3: more examples/more animations/more details 3: more overview/summaries 2: more project advice

Lecture 16: Transport Protocols4 Feedback (negative) Project/HW 5: project writeup 5: need more/more complex checkpoints/need at beginning 4: HW tedious/poorly written 2: project too hard HW not covered in lecture HW makeup grade Lectures 3: define terms/acronym/memorization hell 3: textbook bad/relationship to lectures unclear lecture relationship to the book Srini's lectures are slow-paced Interaction vs. bboard more direct answers on bboard want review session for exam

Lecture 16: Transport Protocols5 Outline Transport introduction Error recovery & flow control

Lecture 16: Transport Protocols6 Transport Protocols Lowest level end-to- end protocol. Header generated by sender is interpreted only by the destination Routers view transport header as part of the payload Transport IP Datalink Physical Transport IP Datalink Physical IP router

Lecture 16: Transport Protocols7 Functionality Split Network provides best-effort delivery End-systems implement many functions Reliability In-order delivery Demultiplexing Message boundaries Connection abstraction Congestion control …

Lecture 16: Transport Protocols8 Transport Protocols UDP provides just integrity and demux TCP adds… Connection-oriented Reliable Ordered Point-to-point Byte-stream Full duplex Flow and congestion controlled

Lecture 16: Transport Protocols9 UDP: User Datagram Protocol [RFC 768] “No frills,” “bare bones” Internet transport protocol “Best effort” service, UDP segments may be: Lost Delivered out of order to app Connectionless: No handshaking between UDP sender, receiver Each UDP segment handled independently of others Why is there a UDP? No connection establishment (which can add delay) Simple: no connection state at sender, receiver Small header No congestion control: UDP can blast away as fast as desired

Lecture 16: Transport Protocols10 UDP, cont. Often used for streaming multimedia apps Loss tolerant Rate sensitive Other UDP uses (why?): DNS, SNMP Reliable transfer over UDP Must be at application layer Application-specific error recovery Source port #Dest port # 32 bits Application data (message) UDP segment format Length Checksum Length, in bytes of UDP segment, including header

Lecture 16: Transport Protocols11 UDP Checksum Sender: Treat segment contents as sequence of 16-bit integers Checksum: addition (1’s complement sum) of segment contents Sender puts checksum value into UDP checksum field Receiver: Compute checksum of received segment Check if computed checksum equals checksum field value: NO - error detected YES - no error detected But maybe errors nonethless? Goal: detect “errors” (e.g., flipped bits) in transmitted segment – optional use!

Lecture 16: Transport Protocols12 High-Level TCP Characteristics Protocol implemented entirely at the ends Fate sharing Protocol has evolved over time and will continue to do so Nearly impossible to change the header Use options to add information to the header Change processing at endpoints Backward compatibility is what makes it TCP

Lecture 16: Transport Protocols13 TCP Header Source portDestination port Sequence number Acknowledgement Advertised windowHdrLen Flags 0 ChecksumUrgent pointer Options (variable) Data Flags: SYN FIN RESET PUSH URG ACK

Lecture 16: Transport Protocols14 Evolution of TCP TCP & IP RFC 793 & TCP described by Vint Cerf and Bob Kahn In IEEE Trans Comm 1983 BSD Unix 4.2 supports TCP/IP 1984 Nagel’s algorithm to reduce overhead of small packets; predicts congestion collapse 1987 Karn’s algorithm to better estimate round-trip time 1986 Congestion collapse observed 1988 Van Jacobson’s algorithms congestion avoidance and congestion control (most implemented in 4.3BSD Tahoe) BSD Reno fast retransmit delayed ACK’s 1975 Three-way handshake Raymond Tomlinson In SIGCOMM 75

Lecture 16: Transport Protocols15 TCP Through the 1990s ECN (Floyd) Explicit Congestion Notification 1993 TCP Vegas (Brakmo et al) delay-based congestion avoidance 1994 T/TCP (Braden) Transaction TCP 1996 SACK TCP (Floyd et al) Selective Acknowledgement 1996 Hoe NewReno startup and loss recovery 1996 FACK TCP (Mathis et al) extension to SACK

Lecture 16: Transport Protocols16 Outline Transport introduction Error recovery & flow control

Lecture 16: Transport Protocols17 Stop and Wait Time Packet ACK Timeout ARQ Receiver sends acknowledgement (ACK) when it receives packet Sender waits for ACK and timeouts if it does not arrive within some time period Simplest ARQ protocol Send a packet, stop and wait until ACK arrives SenderReceiver

Lecture 16: Transport Protocols18 Recovering from Error Packet ACK Timeout Packet ACK Timeout Packet Timeout Packet ACK Timeout Time Packet ACK Timeout Packet ACK Timeout ACK lostPacket lost Early timeout DUPLICATE PACKETS!!!

Lecture 16: Transport Protocols19 How to recognize a duplicate Performance Can only send one packet per round trip Problems with Stop and Wait

Lecture 16: Transport Protocols20 How to Recognize Resends? Use sequence numbers both packets and acks Sequence # in packet is finite  How big should it be? For stop and wait? One bit – won’t send seq #1 until received ACK for seq #0 Pkt 0 ACK 0 Pkt 0 ACK 1 Pkt 1 ACK 0

Lecture 16: Transport Protocols21 How to Keep the Pipe Full? Send multiple packets without waiting for first to be acked Number of pkts in flight = window Reliable, unordered delivery Several parallel stop & waits Send new packet after each ack Sender keeps list of unack’ed packets; resends after timeout Receiver same as stop & wait How large a window is needed? Suppose 10Mbps link, 4ms delay, 500byte pkts 1? 10? 20?11020 Round trip delay * bandwidth = capacity of pipe

Lecture 16: Transport Protocols22 Sliding Window Reliable, ordered delivery Receiver has to hold onto a packet until all prior packets have arrived Why might this be difficult for just parallel stop & wait? Sender must prevent buffer overflow at receiver Circular buffer at sender and receiver Packets in transit  buffer size Advance when sender and receiver agree packets at beginning have been received

Lecture 16: Transport Protocols23 Receiver Sender Sender/Receiver State …… Sent & AckedSent Not Acked OK to SendNot Usable …… Max acceptable Receiver window Max ACK receivedNext seqnum Received & AckedAcceptable Packet Not Usable Sender window Next expected

Lecture 16: Transport Protocols24 Sequence Numbers How large do sequence numbers need to be? Must be able to detect wrap-around Depends on sender/receiver window size E.g. Max seq = 7, send win=recv win=7 If pkts 0..6 are sent succesfully and all acks lost Receiver expects 7,0..5, sender retransmits old 0..6!!! Max sequence must be  send window + recv window

Lecture 16: Transport Protocols25 Window Sliding – Common Case On reception of new ACK (i.e. ACK for something that was not acked earlier) Increase sequence of max ACK received Send next packet On reception of new in-order data packet (next expected) Hand packet to application Send cumulative ACK – acknowledges reception of all packets up to sequence number Increase sequence of max acceptable packet

Lecture 16: Transport Protocols26 Loss Recovery On reception of out-of-order packet Send nothing (wait for source to timeout) Cumulative ACK (helps source identify loss) Timeout (Go-Back-N recovery) Set timer upon transmission of packet Retransmit all unacknowledged packets Performance during loss recovery No longer have an entire window in transit Can have much more clever loss recovery

Lecture 16: Transport Protocols27 Go-Back-N in Action

Lecture 16: Transport Protocols28 Selective Repeat Receiver individually acknowledges all correctly received pkts Buffers packets, as needed, for eventual in-order delivery to upper layer Sender only resends packets for which ACK not received Sender timer for each unACKed packet Sender window N consecutive seq #’s Again limits seq #s of sent, unACKed packets

Lecture 16: Transport Protocols29 Selective Repeat: Sender, Receiver Windows

Lecture 16: Transport Protocols30 Important Lessons Transport service UDP  mostly just IP service TCP  congestion controlled, reliable, byte stream Types of ARQ protocols Stop-and-wait  slow, simple Go-back-n  can keep link utilized (except w/ losses) Selective repeat  efficient loss recovery Sliding window flow control Addresses buffering issues and keeps link utilized

Lecture 16: Transport Protocols31 Next Lecture Congestion control TCP Reliability

EXTRA SLIDES The rest of the slides are FYI

Lecture 16: Transport Protocols33 Ponder This… A bus station is where a bus stops. A train station is where a train stops. A work station is where… Maybe that explains why it was so hard getting project 1 done …. ouch