EC2352 CN Notes - NPR
EC2352 CN Notes - NPR
com
Computer networks
Subject code: EC2352 Year: III Unit: I Title: Introduction to computer networks CODED BY: M.KASI RAJAN AP / CSE
www.Vidyarthiplus.com
Computer Networks
Computer network connects two or more autonomous computers.
can be located
www.Vidyarthiplus.com
Network spread geographically (Country or across Globe) is called WAN (Wide Area Network)
www.Vidyarthiplus.com
Applications of Networks
Resource Sharing Hardware (computing resources, disks, printers) Software (application software) Information Sharing Easy accessibility from anywhere (files, databases) Search Capability (WWW) Communication Email Message broadcast Remote computing Distributed processing (GRID Computing)
www.Vidyarthiplus.com
Network Topology
The network topology defines the way in which computers, printers, and other devices are connected. A network topology describes the layout of the wire and devices as well as the paths used by data transmissions.
www.Vidyarthiplus.com
Bus Topology
Commonly referred to as a linear bus, all the devices on a bus topology are connected by one single cable.
www.Vidyarthiplus.com
Ring Topology
A frame travels around the ring, stopping at each node. If a node wants to transmit data, it adds the data as well as the destination address to the frame. The frame then continues around the ring until it finds the destination node, which takes the data out of the frame. Single ring All the devices on the network share a single cable Dual ring The dual ring topology allows data to be sent in both directions.
www.Vidyarthiplus.com
Mesh Topology
The mesh topology connects all devices (nodes) to each other for redundancy and fault tolerance. It is used in WANs to interconnect LANs and for mission critical networks like those used by banks and financial institutions. Implementing the mesh topology is expensive and difficult.
www.Vidyarthiplus.com
Network Components
Physical Media Interconnecting Devices Computers Networking Software Applications
www.Vidyarthiplus.com
Networking Media
Networking media can be defined simply as the means by which signals (data) are sent from one computer to another (either by cable or wireless means).
www.Vidyarthiplus.com
Networking Devices
HUB, Switches, Wireless Access Modems etc. Routers, Points,
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Applications
E-mail Searchable Data (Web Sites) E-Commerce News Groups Internet Telephony (VoIP) Video Conferencing Chat Groups Instant Messengers Internet Radio
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Network Architecture
Provides a general, effective, fair, and robust connectivity of computers Provides a blueprint Types OSI Architecture Internet Architecture
www.Vidyarthiplus.com
www.Vidyarthiplus.com
OSI ARCHITECTURE
Open Systems Interconnection (OSI) model is a reference model developed by ISO (International Organization for Standardization) in 1984 OSI model defines the communications process into Layers Provides a standards for communication in the network Primary architectural model for inter-computing and Inter networking communications. network communication protocols have a structure based on OSI Model
www.Vidyarthiplus.com
www.Vidyarthiplus.com
OSI Architecture
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Link Layer
Framing Error Detection Reliable Transmission (ARQ protocols) Medium Access Control:
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Link Technologies
Cables:
Cat 5 twisted pair, 10-100Mbps, 100m Thin-net coax, 10-100Mbps, 200m Thick-net coax, 10-100Mbps, 500m Fiber, 100Mbps-2.4Gbps, 2-40km
Leased Lines:
Copper based: T1 (1.544Mbps), T3 (44.736Mbps) Optical fiber: STS-1 (51.84Mbps), STS-N (N*51.84Mbps)
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Link Technologies
Last-Mile Links: POTS (56Kbps), ISDN (2*64Kbps) xDSL: ADSL (16-640Kbps, 1.554-8.448Mbps), VDSL (12.96Mbps55.2Mbps) CATV: 40Mbps downstream, 20Mbps upstream Wireless Links: Cellular, Satellite, Wireless Local Loop
www.Vidyarthiplus.com
www.Vidyarthiplus.com
FRAMING
An efficient data transmission technique It is a message forwarding system in which data packets, called frames, are passed from one or many start-points to one
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Approaches
Byte oriented Protocol(PPP)
BISYNC Binary Synchronous Communication DDCMP Digital Data Communication Message Protocol
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
SYN
SYN
Class
Count
Header
Body
CRC
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Collection of Bits 1.HDLC High-Level Data Link Control 2.Closed Based Framing(SONET) Synchronous Optical Network
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Bit Stufffing After 5 consecutive 1s insert 0 Next bit is 0 stuffed removed Next bit is 1 end of frame or erorr
www.Vidyarthiplus.com
www.Vidyarthiplus.com
9 rows
90 columuns www.Vidyarthiplus.com
www.Vidyarthiplus.com
ERROR DETECTION
Detecting Errors In Transmission Electrical Interference, thermal noise Approaches Two Dimensional Parity Internet Checksum Algorithm Cyclic Redundancy Check
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Reliable Transmission
Deliver Frames Reliably Accomplished by Acknowledgements and Timeouts ARQ-Automatic Repeat Request
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Fram e
Timeout Timeout Time
ACK
Fram e
ACK
Fram e
Timeout
ACK
(a)
(c)
Sender
Receiver
Sender
Receiver
Fram e
Timeout Timeout
Fram e
ACK
Fram e
Timeout Timeout
Fram e
ACK
ACK
(b)
(d)
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Timeout imeout
(c)
Timeout imeout
(d)
(e)
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Sliding Window
bi-directional data transmission protocol used in the data link layer (OSI model) as well as in TCP
It is used to keep a record of the frame sequences sent respective acknowledgements received by both the users.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Maintain invariant: LFS - LAR <= SWS Advance LAR when ACK arrives SWS Buffer up to SWS frames
LAR LFS
www.Vidyarthiplus.com
www.Vidyarthiplus.com
SWS < (MaxSeqNum+1)/2 is correct rule Intuitively, SeqNum slides between two halves of sequence number space
www.Vidyarthiplus.com
www.Vidyarthiplus.com
LFR LFA
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Ehernet
local-area network (LAN) covered by the IEEE 802.3. two modes of operation:
half-duplex full-duplex modes. .
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Three basic elements : 1. the physical medium used to carry Ethernet signals between computers, 2. a set of medium access control rules embedded in each Ethernet interface that allow multiple computers to fairly arbitrate access to the shared Ethernet channel, 3. an Ethernet frame that consists of a standardized set of bits used to carry data over the system
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Wireless
The process by which the radio waves are propagated through air and transmits data Wireless technologies are differentiated by :
Protocol Connection typePoint-to-Point (P2P) SpectrumLicensed or unlicensed
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Types
Infrared Wireless Transmission
sends data over long distances (regions, states, countries) at up to 2 megabits per second (AM/FM Radio)
Communications Satellites microwave relay stations in orbit around the earth.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Types
Connectionless
each packet is labeled with a connection ID rather than an address. Example:Datagram packet switching
connection-oriented
each packet is labeled with a destination address Example:X.25 vs. Frame Relay
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Star Topology
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Source Routing
0 Switch 1 3 2 3 0 1 1 3 0 0 1 2 Switch 2 3 1 3 2 0 1
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Datagram Switching
No connection setup phase Each packet forwarded independently Sometimes called connectionless model Host D
3 Host C
0 Switch 1 1 2 3
Host A
Host G 1
0 Switch 3 Host B 3 2
Host H
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Datagram Model
There is no round trip delay waiting for connection setup; a host can send data as soon as it is ready. Source host has no way of knowing if the network is capable of delivering a packet or if the destination host is even up. Since packets are treated independently, it is possible to route around link and node failures. Since every packet must carry the full address of the destination, the overhead per packet is higher than for the connection-oriented model.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
B1 G H
B6 I
B4 J
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Algorithm Details
Bridges exchange configuration messages id for bridge sending the message id for what the sending bridge believes to be root bridge distance (hops) from sending bridge to root bridge Each bridge records current best configuration message for each port Initially, each bridge believes it is the root
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Algorithm Details
Bridges exchange configuration messages id for bridge sending the message id for what the sending bridge believes to be root bridge distance (hops) from sending bridge to root bridge Each bridge records current best configuration message for each port Initially, each bridge believes it is the root
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Computer networks
Subject code: EC2352 Year: III Unit: II Title: Introduction to network layers CODED BY: M.KASI RAJAN AP / CSE
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Internetworking
An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. different kinds of network technologies that can be interconnected by routers and other networking devices to create an internetwork
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Types
Local-area networks (LANs)enabled multiple users in a relatively small geographical area to exchange files and messages, as well as access shared resources such as file servers and printers. Wide-area networks (WANs) interconnect LANs with geographically dispersed users to create connectivity. technologies used for connecting LANs include T1, T3, ATM, ISDN, ADSL, Frame Relay, radio links, and others.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
ETH
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Datagram Delivery
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Packet Format
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Routing
www.Vidyarthiplus.com
Router
A router is a device that determines the next network point to which a packet should be forwarded toward its destination Allow different networks to communicate with each other A router creates and maintain a table of the available routes and their conditions and uses this information to determine the best route for a given packet. A packet will travel through a number of network points with routers before arriving at its destination. There can be multiple routes defined. The route with a lower weight/metric will be tried first.
www.Vidyarthiplus.com
Routing
www.Vidyarthiplus.com
Routing
www.Vidyarthiplus.com
Routing
www.Vidyarthiplus.com
Routing Protocols
Static Routing Dynamic Routing
IGP (Interior Gateway Protocol): Route data within an Autonomous System RIP (Routing Information Protocol) RIP-2 (RIP Version 2) OSPF (Open Shortest Path First) IGRP (Interior Gateway Routing Protocol) EIGRP (Enhanced Interior Gateway Routing Protocol) IS-IS
www.Vidyarthiplus.com
www.Vidyarthiplus.com
the shortest path tree is contained in the routing table Calculations are based on the Bellman-Ford algorithm
www.Vidyarthiplus.com
C
3
A 4 D
5
E
C (., ) (2, 2)
D (., ) (3, 1)
E (., ) (4, 2)
www.Vidyarthiplus.com
3 6
4 5 D E
Example of simple network with 5 nodes (routers) and 6 links (interfaces) The cost of all links is assumed to be 1
www.Vidyarthiplus.com
Advantages
simple to implement low requirement in processing and memory at the nodes suitable for small networks
www.Vidyarthiplus.com
Disadvantages
Slow convergence Bouncing effect Counting to infinity problem
www.Vidyarthiplus.com
Slow Convergence
2 A XXX B C
3 6
4 5 D E
link 1 breaks
When a link breaks the routers are supposed to reestablish the routing tables
www.Vidyarthiplus.com
3 6
4 5 D E
www.Vidyarthiplus.com
4 5 D XXX E
A sends its old routing table before D sends the new routing table
Iskra Djonova-Popova www.Vidyarthiplus.com
www.Vidyarthiplus.com
Subnets
Each organization assigns IP addresses to specific computers on its networks IP addresses are assigned so that all computers on the same LAN have similar addresses Each of these lans is known as a TCP/IP subnet Any portion of the IP address can be designated as a subnet using a subnet mask*
* Subnet masks tell computers what part of an IP address is to be used to determine whether a destination is on the same or a different subnet
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Subnet Addressing
www.Vidyarthiplus.com
Figure 5-6
www.Vidyarthiplus.com
Subnet Addressing
Example 1
Suppose that the first two bytes are the subnet indicator with addresses of the form 131.156.x.x Then, 131.156.29.156 and 131.156.34.215 would be on the same subnet. The subnet mask would be 255.255.0.0, which corresponds to 11111111.11111111.00000000.00000000, where 1 indicates that the position is part of the subnet address and a 0 indicates that it is not.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Subnet Addressing
Example 2
Partial bytes can also be used as subnets. For example, consider the subnet mask 255.255.255.128, which is 11111111.11111111.11111111.10000000. Here, all computers with the same first three bytes and last byte from 128 to 254 would be on the same subnet.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Providing Addresses
Providing addresses to networked computers
Static addressing Dynamic addressing
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Static Addressing
Each computer is given an address through a configuration file Stored on individual computers Problems
Moves, changes, adds and deletes Individuals could change their own IP address Network renumbered
www.Vidyarthiplus.com
Dynamic Addressing
Server supplies a network layer address automatically
Each time user logs in For a specific lease period
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Dynamic Addressing
Bootp and DHCP
Software installed on the client instructs the client to contact the server using data link layer addresses Message asks server to assign the client a unique network layer address Server runs corresponding software that sends the client its network address and subnet mask
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Leasing
Bootp or DHCP server can either:
Assign the same network layer address to the client each time the client requests it (bootp) Lease the network address from the next available on a list of authorized addresses for as long as the client is connected or for a specified amount of time -- common with isps and dial-up users (DHCP)
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Address Resolution
The process of:
Translating an application layer address to a network address (server name resolution) Translating the server name address to a data link layer address (data link layer address resolution)
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Address Resolution
Server name resolution
Accomplished by the use of domain name service (DNS) Computers called name servers provide these DNS services
Address data base includes: server names and their corresponding IP address
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Weber State University
DNS Request Client computer DNS Response DNS Server sol.acs.unt.edu 137.90.2.122
Internet
DNS Request
Figure 5-7
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Address Resolution
Data link layer address resolution
Broadcast message is sent to all computers in its subnet
if your IP address is xxx.Yyy.Zzz.Ttt, please send your data link layer address Uses address resolution protocol (ARP)
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Network Routing
The process of determining the route a message will take through the network
Centralized Decentralized
Static routing Dynamic routing Broadcast or multicast routing
www.Vidyarthiplus.com
G A
A C A E E C
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Internet Routes
WSU Canada Other destinations
UEN
Asia
WSU Destination Route UEN Utah Oxford Europe U of Toronto Canada U of Singapore Asia UC Stanford West Coast Other Other
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Types of Routing
Centralized routing Static routing (decentralized) Dynamic routing (adaptive and decentralized)
Distance vector Link state
Other types
Broadcast routing Multicast routing
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Centralized Routing
All routing decisions are made by one computer Main routing for star and mesh topologies Routing tables located on each computer
Central computer sends updated tables as needed Routing table tells the device where to send messages
Simplicity - no wasted resources Hardware failures or changing conditions cause table to be out of sync
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Decentralized Routing
Each of the following types of routing fall under the heading of decentralized routing Each device makes its own routing decisions with the use of a formal routing protocol Routing protocols are self-adjusting
Can automatically adapt to changes in the network configuration
Drawbacks
Slows down the network with status messages Requires more processing by each computer
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Static Routing
Routing table developed by the network manager or some type of committee
Initial table sent to each computer which then updates the routing table as needed Reroutes as needed with down or removed circuits Updated when new devices announce their presence Used in relatively static networks that have few routing options
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Disadvantages
Requires more processing by each computer Wastes network capacity
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Routing Protocols
RIP, IGP, OSPF, EGP, BGP Distance vector routing protocols (RIP, Appletalk,IPX, IGRP)
Routers inform neighboring routers of table Closest router is used to route packets
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Routing Protocols
Border Gateway Protocol Internet Control Message Protocol Routing Information Protocol Open Shortest Path First Enhanced Interior Gateway Routing Protocol
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Routing Protocols
Internet protocols
BGP (border gateway protocol)
Exchanges information between autonomous systems about the condition of the internet Complex, hard to administer, exterior routing protocol
www.Vidyarthiplus.com
Routing Protocols
OSPF (open shortest path first)
Link state interior routing protocol used on the internet Counts number of computers, network traffic, network error rates to select the best route Doesnt broadcast to all devices just to routing devices Preferred TCP/IP, but also used by IPX/SPX
www.Vidyarthiplus.com
Broadcast Routing
Sends the message to all computers on the network Only computer with correct address processes the message Used only in bus networks Wastes network bandwidth
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Multicasting
Similar to broadcasting Only works within one LAN or subnet Messages sent from one computer to another on the network is called a unicast message Messages sent to a group of computers is called a multicast message Targeting a specific work group IGMP (internet group management protocol)
Sends an IGMP multicast request to the routing computer Assigned a special class D IP address to identify the group The routing computer sets the data link layer address All participating machines will process messages sent to this address Sends a IGMP message notifying of end of session
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Computer networks
Subject code: EC2352 Year: III Unit: III Title: Introduction to Transport layer CODED BY: M.KASI RAJAN AP / CSE
www.Vidyarthiplus.com
www.Vidyarthiplus.com
TCP Overview
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Segment format
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Connection establishment
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Simple demultiplexor
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Caused By
the shortage of buffer space. slow links. slow processors Possible solutions
End-to-end versus link-by-link control Rate-Based versus Credit-Based control The rate-based traffic-flow technique constantly Integrated congestion control
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
lout
Host B
www.Vidyarthiplus.com
Scenario 2: Retransmits
one router, finite buffers sender retransmission of lost packet
Host A
lin : original data l'in : original data, plus retransmitted data
lout
Host B
www.Vidyarthiplus.com
www.Vidyarthiplus.com
in
Host B
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Roughly,
CongWin Bytes/sec CongWin is dynamic, RTT function of rate =
How does sender perceive congestion? loss event = timeout or 3 duplicate acks TCP sender reduces rate (CongWin) after loss event three mechanisms:
AIMD slow start conservative after timeout events
www.Vidyarthiplus.com
www.Vidyarthiplus.com
TCP AIMD
multiplicative decrease: cut CongWin in half after loss event
congestion window 24 Kbytes
additive increase: increase CongWin by 1 MSS every RTT in the absence of loss events: probing
16 Kbytes
8 Kbytes
time
www.Vidyarthiplus.com
When connection begins, increase rate exponentially fast until first loss event
www.Vidyarthiplus.com
www.Vidyarthiplus.com
RTT
time
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Refinement (more)
Q: When should the exponential increase switch to linear? A: When CongWin gets to 1/2 of its value before timeout.
Implementation:
Variable Threshold At loss event, Threshold is set to 1/2 of CongWin just before loss event
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Additive increase, resulting in increase of CongWin by 1 MSS every RTT Fast recovery, implementing multiplicative decrease. CongWin will not drop below 1 MSS. Enter slow start
Threshold = CongWin/2, CongWin = Threshold, Set state to Congestion Avoidance Threshold = CongWin/2, CongWin = 1 MSS, Set state to Slow Start
SS or CA
Duplicate ACK
SS or CA
Increment duplicate ACK CongWin and Threshold not changed count for segment being www.Vidyarthiplus.com acked
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Mechanisms
router-centric: DECbit and RED Gateways host-centric: TCP Vegas
www.Vidyarthiplus.com
www.Vidyarthiplus.com
DECbit
www.Vidyarthiplus.com
www.Vidyarthiplus.com
DECbit
Add binary congestion bit to each packet header Router monitors average queue length over last busy+idle cycle set congestion bit if average queue length greater than 1 w hen packet arrives attempts to balance throughput against delay
www.Vidyarthiplus.com
www.Vidyarthiplus.com
DECbit
End Hosts destination echos bit back to source source records how many packets resulted in set bit if less than 50% of last window's worth had bit set, then increase C ongestionWindow by 1 packet if 50% or more of last window's worth had bit set, then decrease C ongestionWindow by 0.875 times
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com
UDP datagram
31
148
www.Vidyarthiplus.com
UDP pseudoheader
0 8 16 Source IP Address Destination IP Address 00000000 Protocol = 17 UDP Length 31
1.Pseudoheader is to ensure that the datagram has indeed reached the correct destination host and port. 2. The padding of 0s and pseudoheader is only for the computation of checksum and not be transmitted.
www.Vidyarthiplus.com
Figure 8.17
149
www.Vidyarthiplus.com
www.Vidyarthiplus.com