ECEN 619-600 - PowerPoint PPT Presentation

About This Presentation
Title:

ECEN 619-600

Description:

ECEN 619-600 Internet Protocols and Modeling Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc Grading (Tentative): HW: 20% ... – PowerPoint PPT presentation

Number of Views:75
Avg rating:3.0/5.0
Slides: 38
Provided by: Bry48
Category:
Tags: ecen | file | protocol | transfer

less

Transcript and Presenter's Notes

Title: ECEN 619-600


1
ECEN 619-600 Internet Protocols and Modeling
  • Course Materials Papers, Reference Texts
    Bertsekas/Gallager, Stuber, Stallings, etc
  • Grading (Tentative) HW 20, Projects 40,
    Exam-120, Exam-II20
  • Lecture notes and Paper Reading Lists available
    on-line TBA
  • Class Website http//ece.tamu.edu/xizhang/ECEN61
    9/start.php
  • Research Interests and Projects
    URLhttp//ece.tamu.edu/xizhang
  • Instructor Professor Xi Zhang
  • E-mail xizhang_at_ece.tamu.edu
  • Office WERC 331

2
TCP Closed-loop flow control and Self-Clocking
Principle-1
3
TCP Closed-loop flow control and Self-Clocking
Principle-2
  • Sender sends packets back-to-back to receiver
  • The vertical line is bandwidth
  • The horizontal line is time
  • Each of shaded box is a packet
  • Bandwidth Time Bits, and so the area of each
    box is the packet size.
  • The number of bits doesnt change as a packet
    goes through the network so a packet squeezed
    into the smaller long-haul bandwidth must spread
    out in time.

4
TCP Closed-loop flow control and Self-Clocking
Principle-3
  • The time Pb represents the minimum packet spacing
    on the slowest link in the path (the bottleneck).
  • As the packets leave the bottleneck for the
    destination net, nothing changes the inter packet
    interval so on the receivers net packet spacing
    Pr Pb.
  • If the receiver processing time is the same for
    all packets, the spacing between ACKs on the
    receivers net Ar Pr Pb.

5
TCP Closed-loop flow control and Self-Clocking
Principle
  • If the time slot Pb was big enough for a packet,
    its big enough for an ACK so the ACK spacing is
    preserved along the return path. Thus the ACK
    spacing on the senders net As Pb.
  • So, if packets after the first burst are sent
    only in response to an ACK, the senders packet
    spacing will be exactly match the packet time on
    the slowest link in the path gt Self-Clocking
    is achieved.

6
Two versions of TCP Protocols
  • TCP-tahoe (Jacobson, 1988)
  • Time-out based protocol - use timeout to detect
    packet loss and congestions
  • TCP-reno (Jacobson, 1990)
  • Triple-ACK and time-out based - Use
    triple-duplicate ACK to same sequence number and
    timeouts to detect packet loss and congestions
  • Use fast retransmissions and fast recovery
  • Skip Slow Start phase

7
TCP-tahoe Protocol
8
TCP-reno Protocol
9
                                           
                                          Slide 2
of 33
10
                                           
                                          Slide 3
of 33
11
                                           
                                          Slide 4
of 33
12
                                           
                                          Slide 5
of 33
13
                                           
                                          Slide 6
of 33
14
                                           
                                          Slide 7
of 33
15
                                           
                                          Slide 8
of 33
16
                                           
                                          Slide 9
of 33
17
                                           
                                          Slide
10 of 33
18
                                           
                                          Slide
11 of 33
19
                                           
                                          Slide
12 of 33
20
TCP protocol control variable
  • Bandwidth m in packets/sec,
  • Service time 1/m
  • Round Trip Time (RTT) T sec
  • Buffer size B in packets
  • Path pipeline capacity
  • Wpipe mTB1

21
TCP/IP Layers 5-Layer Protocol Model
  • 1) Physical layer
  • 2) Network access layer
  • 3) Internet layer
  • 4) Host-to-host, or transport layer
  • 5) Application layer

22
TCP/IP Physical Layer
  • Covers the physical interface between a data
    transmission device and atransmission medium or
    network
  • Physical layer specifies
  • Characteristics of the transmission medium
  • The nature of the signals
  • The data rate
  • Other related matters

23
TCP/IP Network Access Layer
  • Concerned with the exchange of data between an
    end system and the network to which it's attached
  • Software used depends on type of network
  • Circuit switching
  • Packet switching (e.g., X.25)
  • LANs (e.g., Ethernet)
  • Others

24
TCP/IP Internet Layer
  • Uses internet protocol (IP)
  • Provides routing functions to allow data to
    traverse multiple interconnected networks
  • Implemented in end systems and routers

25
TCP/IP Host-to-Host, or Transport Layer
  • Commonly uses transmission control protocol (TCP)
  • Provides reliability during data exchange
  • Completeness
  • Order

26
TCP/IP Application Layer
  • Logic supports user applications
  • Uses separate modules that are peculiar to each
    different type of application

27
Protocol Data Units (PDUs)
28
TCP Header Format
29
IP Header Format-1 IPv4 Header
30
IP Header Format-2 IPv6 Header (Newer Version
since 1995)
31
Common TCP/IP Applications
  • Simple mail transfer protocol (SMTP)
  • Provides a basic electronic mail facility
  • File Transfer Protocol (FTP)
  • Allows files to be sent from one system to
    another
  • TELNET
  • Provides a remote logon capability

32
Service Access Point (SAP) under TCP/IP Concepts
33
Internetworking Terms
  • Communication network facility that provides a
    data transfer service among devices attached to
    the network
  • Internet collection of communication networks,
    interconnected by bridges/routers
  • Intranet internet used by an organization for
    internal purposes
  • Provides key Internet applications
  • Can exist as an isolated, self-contained internet

34
Internetworking Terms
  • End System (ES) device used to support end-user
    applications or services
  • Intermediate System (IS) device used to connect
    two networks
  • Bridge an IS used to connect two LANs that use
    similar LAN protocols
  • Router - an IS used to connect two networks that
    may or may not be similar (such as WAN and LAN)

35
Functions of a Router
  • Provide a link between networks
  • Provide for the routing and delivery of data
    between processes on end systems attached to
    different networks
  • Provide these functions in such a way as not to
    require modifications of the networking
    architecture of any of the attached sub-networks

36
An Example of Router Applications
37
Network Differences Routers Must Accommodate
  • Addressing schemes
  • Different schemes for assigning addresses
  • Maximum packet sizes
  • Different maximum packet sizes requires
    segmentation
  • Interfaces
  • Differing hardware and software interfaces
  • Reliability
  • Network may provide unreliable service
Write a Comment
User Comments (0)
About PowerShow.com