Unit 4 Computer Networks
Unit 4 Computer Networks
To ocher
IS~ ............... M
ISP
To oeber ...........
ISPs
l.qe-Dd
- . . . . .M . .M . Point-11>-polot WAN
- LANswitch
'lill WANswitc:h
Bob
Scienufic Books
Fig.: Logical connection at the transport layer
------!l'lll-1D~r.;J;Ji1____________
II YEAR -111 SE&.a
MCA •YlEs1e~
. ~
The transport layer is located between the ne~ork layer and the application layer. Th
layer is responsible for providing services to the application layer; it receives services from ; trallsPott
0
layer In this section, we discuss the seivices that can be provided by the lransport layer. e etwork
. o pr~v
Dynamic ports· The rts . ..,..,;a
Th · po rangmg from ·
49,152 to 65 ' 535 are neither
ey can be used as temnnr;:iin, . controtW nor rPDistered
iv) ---.)f or pnvate port numbers . 1'->
( Socket Addresses . '
A transport-layer protocol in th . .
end, to make a con . e TCP SUlte needs both t~ IP dd
addr~ The die t nekct1on. The.combill{;tiQtL()f an lP..JVidr e a ress and the_.E2!!_number, at each
defi th n soc et address define th . .._. ~ and a port numoer
is callorl a sock
e mes e server process UIDQuely. s e cl1~t P.,rncess uniquely just as ffie dfiver sock~ddress
( .
200 23 _56
Socket addrc~~ [___ _ '>..JI
_8 _ __;;n:::..
• Ra/tu/ P11/Jlicot/011s
r
COM PUfER NETWORKS
~
Fucapsulation and De£apsulatlon
(v)
C1 ,t 11d t'I rrn?ssdgc ft~r to another the transpprt-layer protocol enca£sulates a~d
o f)~c;
dec<'~lc1~ s ~l~sc;~g, s,fiq i-:_ocapsulation happens at the s~ile. When a process has a message >
. d 1t passes the messa~e to the transport layer along with a pair of ,;ocket addresses and somP. other
~~;ces of information, which depend on the tr~r.t.lnyer protocol. The transport layer receives the
data and adds the transpoi t iaycr header. The pack~ajj_he tr~nsport la)(er in the ~ et are cal~_wer
dataarruJ1S, segru,ents, or t1ckets, dep~in__g on what traQsport-layer protocol we use. In general discussion,
~
~re fe-r to transport laver payloads as packets.
De~Jilation happens at the rec iver site. When the message arr~Uhe_destination transport
]ayer.tJ,enea~ b nrc "'ped and the transport layer delivers the message to the process running at the
pphc.ation laver. Th~ 11der socket address is passed to the process in case it needs to respond to +he
b1t?SSage received
Clif'nt Server,
r
Application Process 0 Application
l:iyer layer
l~sport Transport
iayer layer
Logical channel
a. Encapsulation b. Decapsulation
I 4.2 MULTIPLEXING I
What : ... --·t~+~rn.,,..,Jng? Explain its methods.
i----ll
1 Link ~ r----::,
:e t--,e.
-=----i
C----1
N Channels w .---o
C
. ::,
z
r----
For computer communication, though multiplexing techniques like TDM, FDM were initially used
ainly in ba~kbone links connecting multiple data exchanges, later they h;; percolated widely into the
CC~ast miJe link$ too, including inside home networks.
dvantages
1f 110 multiplexing is used between the users a1 t~ r e n t sites that are distance apart, then
eparate t.Ommunication lipes would be required .
Pahul Publicotlons
-~ - -. - - - -- -- - - - - - - - - - - -- - - - - - -- .... -~-~,
Ol'fll!lft¾$
-
than several lines. Multiplexing efficient for utilization of ban wi ·
_ _ . . l - - - - - -- - .
Separate Channels/Links between the devices
-ill •
-
~en_djng_L_Qca_lions
.;
to jt-
s· .
r - ,lots.
penodica11
.
Each time slot inside a fra.me carries data belonging
-----
· In TDM, the basic reeeating unit is a f~e. A TOM frame consists of a fixed number of time slols..
to a specific end node/connection. Thus multiple ~
logical sub-channels/links are created inside a single c~n__nel. It is also possible to give multie!,e sl~ within
a frame to the same user, thereby having the provision of having different capacity sub-channels within
~~~ -
Assuming that there are "n" end users, each requiring a link with a capacity of X Kbps, then to
successfully mqltiplex these each end users on a channel, the channel's capacity needs to be atleast equal
to n times X Kbps.
The Figure given below illustrates a sample TOM scheme with 4 users being setved in a round robin
fashion in the time domain.
• •
Time
- .
's ,User 1) data is always carried -----.,.-
tes four sub-channels. Each user's data is carriad in a specific slot inside each frame. For e.g. Channel-
ii:t the first slot of each frame.
The basi~ principle of any TQM.,based protocol remains the same as described above, though
~ \ \ . there
multiple variants, based on . ·
►-
►
--
The traf}smission speed
Number of frames generated
. per second
. ,
►
► The frame sµuctur~ ~tc.
--
The number of time slots within each frame
~e,i:y!ces
..,
- -
IDM is typically u:sed in W~ digital transmission links, in both trunk and access networks. ISDN
O!gital Network) is an example of a protocol using TOM at the_,access network, ta
ect home users to their neares ISP, using the local loop (telephone link). In ISDN, there are a total of
b-ch~nnels, with two. of them iu;own· as B-Channels (B$arer Channels),_ ea~h with a capacity of
ps being used to carry data and the third kno~n as 0-Chanriel with a capacity of 16Kbps being used
signalling information.
Standard Tl/El serial links are classical examples of TOM based protocols and are used as trunk
between data exchanges. While ·Tl supports an aggregate rate of 1.54 Mbps
with support for 24
-channels, each with a capacity of 64Kbps, El supports an aggregate mte of 2.08
Mbps with support
a
32 sub-channels, e~ch '-1/i!h capacity of 64Kbps. TOM links with higher capacity include T2, T3 and
~ Optical links. -
T~jyj~k)n.Duplex (TDD) is a form of TOM, where within the same TOM
frame, some slots are
for uplink direction (end nodes to netw9rk) and som.e slots are used for downlink direction (network
nd
nodes), therebv_enabling full duplex communication using the same TOM link.
~~.~
Traditional FM
data belonging to eac
diagram given below
Cllanne
j
a. Channel 1 Channel2 Channell
i
100
Channel3
Frequency ( KHz)
j p
310 3200
Frequency (Hz)
.b.
c::'-~
Ru/tu/ P11hlicutio11s -§]~----------_..,...-
COMPUTER NETWORKS
In computer communication, the concept of basic FQ~nd variants of FDM, are widely used both
. LAN and WAN environments. DSL and cable modem links are typical exampl~ of physical layer
ll'l to'cc5ls uslng FDM for achieving high data rates. In DSL, which also uses the standard telephone last
;e
P~e Jocal loop line, multiple sub- carriP.rs, each with a band width of 4KHz. are used to carry users data.
base b and region from O to 4KHZ is left for basic POTS voice calls. Above this, some J1.1mber of sub-
rners are allotted for upstream traffic and a higher number of sub-carriers are alloted for downstream
: roe. Similarly, cable modem has a separate frequency band for upstream traffic and a range of sub-
rriers for downstream traffic.
~ '
An example diagram showing the sub-c~rrier spectrum allocation for POTS, DSL upstream and
downstream directions are given in the diagram below :
l POTS UPSTREAM
(
DOWNSTREAM
)
~ - -- - - ADSU+- - - - - ~
FDM being used in ADSL, with different frequency sub-carriers for POTS, ADSL upstream and
SL downstream.
In DSL, to achieve high data rates, a line coding technique like QAM is used on top of each sub-
·er. Thus both FDM and line coding techniques are combined at the physical layer to achieve high
dband data rates.
FDM is also used in some variants of Fast Ethernet (100 Mbps) and Gigabit Ethernet (1000 Mbps)
protocols, where multiple carriers are used !o achieve the overall data rate supported by the underlying
sical layer.
Wavelength Division Multiplexing (WDM) and DWDM (Dense-WDM) used in optical Networks, are
based on principles similar to FDM, except that their carriers are based on different wavelengths
instead of different frequencies
Frequency Division Duplexing (FDD) is a form of FDM, where some set of frequencies/carriers are
used for carrying uplink direction traffic and some other set of frequencies are used for carrying
downlink traffic, thereby enabling full duplex communicatio n using FDM.
Spread Spectrum technigues are variants of FOM, where the data ls carried or spread over a wide
range of frequency spectrum. In normal FDM, a single carrier is used to cany data corresponding to
an end node. But in Spread spectrum techniques, multiple carriers are used to carry data
corresponding to an end node, with each carrier carrying a small piece of data. F.tfSS (frequency
Hopping Spread Spectrum) , QSS (Direct Sequence Spread Spectrum) and OFDM (Orthogonal
Frequency Division Multiplexing) are different types of spread spectrum techn~es.
Rahul Pub/lcat/011s
~ ~ - ~ - - - - - - - - - -- - - - - - - - - - - - - - - ~ -
~CA ~
II_Y_EA_R.:......:.::ll~ISEMe
· . . t nt to instant, whereas in DSS, data is .
► In FH~, the frequency of the earner varies from_ 1ns a niers, as shown hi the.diagram ive spit1 into
• 9 n bet~.
Smaller units and simultaneously carried by multiple ca .
. . mer
In frequency hopping, ~:~hich Is
:=nocXi:~~ ~! !f~er and receiver
0
p..,
F1 f2 Fl F4 F6 A F1 Fl
' .
. tll'IM
.. . .
_ ~~·1~~~~~3j~<l
__:,_:_:_:..:..:.=....-;-::-~· . . ,. J_w51l~~
Sa-Camer I
OrthogqnalFteg11ency Division Multiplexing (OFDM) is used for both~ and wirel~ network\
.----
Space Dlvl•l~rt ·Multiplexing (SDM) l,
/ .
· In SOM, the.same set of frequencie~ or same set qf TDM ~lgnats...m;: used in ~o different places that
are~phically wide ·~Ni;n1,pace, so that one does ~at intetf~re w~~ t ~ r . _l.'lliulir communi~tiol\
where the same set of carrier frequenc.ies are reused (frequency reuse) in celis that' ar.e n~t close to on&
another ~ a classi~ example of SOM. Another example of SDM ls the
FM radio b g ~ where tht
· same set of ~er frequencies ~re used in different cities that are ae~aphically~part. These are exampl,t
of techniques where SOM and FDM are_cemblned. ·
C OMPUTER NETWORKS
UNIT--~l~V------------------- -~~~:;:_:.:.::.:..--
.,,-
Cofll
bl natlon of ~-----
FDM, Tf?...M and SOM
- . .
GSM (Global Sy~em for Mobile Communication) protocol co_mbines both TDM and FDM, to
ch1·eve full duplex wireless communication between the mobile handsets and thebase stattoiis':-whfle
a set of freauencies are used as base carriers from mobile handsets to base station, another set of non-
oneerlapping
~ .
frequenaes are used -....~
as t>ase carriers from base stations to mobile handsets, thereb Y ma ki ng
ov of FDM principles. Within each carrier, GSM uses TOM, to carry voice and data belonging to multiple
~bile users simultaneously, each in different time slots. Additionally the same set of carrier frequencies
: d TOM schemes are reused b~yond a certain minimum distance, thereby making use of SOM. Thus
GSM is an example protocol that uses FDM, TDM and SOM
Transmission Control Protocol (TCP) is a connection-oriented, reliable protocol. TCP explicitly defines
n~ecti-9n establishment, d~a transfer, and C.Qnffection tear-down pha';es to provid~ a connection-oriented
rvice. TC-P uses a combination of Gl3N and SR protocols to provide reliability. To achieve this goal, I CP
ses checksum (for error detection), retransmission of lost or corrupted packets, cumulative and selective
cknowledgments, and timers. In this section, we first disc.:iss the services provided by TCP; we then
iscuss the TCP features in more detail: TCP is the m~st corpmon traosp_ort-layer protocol in the Internet.
Process-to-Pfoeess Communication
As with UDP, TCP provides process-to~process communication using port numbers.
Stream Delivery Service
TCP, unlike UDP, is a stream-oriented protocol. Jn UDP, a process senc;is messages with predefined
boundaries to lJDP for delivery."1:115P adds its own .header to each of these messages and delivers it to IP
for transmission. Each message from the process is called a user datagram, and becomes, eventually, one
IP datagram. Neither IP nor UDP reco~ize~ any relationship between the datagrams.
TCP, on the other hand, allow.s the sending process to d~liver data as a stream of bytes and allows
the recei~g process to obtain data as a stream of bytes. TCP creates an envir~nment in which the two
processes seem to be connected by an imaginary "tube" that carries their bytes aaoss the Internet.
Sending R~clvln1
process proceu
I. :"Wi',bSitttl-
Flg.: Stream dollvery
Sending and Receiving Buffers
Because the sending and the receiving processes may not necessarily write or read c(ata at the same
ra~, TCP needs buffers fo1 storage. There are two buffers, the sending 6uff er anct the receiving buffer,
- - - - - - - - - - - - - - - - -- -- J @ t - - - - - - - - - - - - --""'.R
~a-:h-117'
/ -;:P::-:-
ub:-;l-lc:-:'
;:-. <1--:,
. tlo~,u
J
MCA II YEAR Ill SEMESTe
~
re alc;o neces Jry for flow and error
1.. ' fm each direction We will sue ldkr that th c buffers at use a cir ul r rrc1J1 of 1 byte kc tcon1rct
. d b TCP. One way to ,mpIement u buff
~ hanisms use y f er bis tes
o each~
, h b ' a irms
normally t e uffer, c1re hu d a
O 20
sh wn in fig simplic1ty, we have shown two bufft rs t't Tue also show the buffers as the sarn: t'~d{
r housands of bytes d<?pending on the implemc>nta on. Site
cl1 is not always .lw c se.
1
Receiving
process
iCP
-Next
TC'P t,yto to
r read
nts
u et 1g han tes th.a disparity bet:wei:::n the µe .J of th e P~n..9 dnd ~"1rtin~
ec; ncd Ont? more step-before we can send ddta. The network layer, as a sen,i-:e prnvider fa';
_ send dara n pa ki:-ts, not as a stream of Gytes At the transport layer, TCP c numbe
aethermto a pac~~le..d ~egment. TCP dc.lds a heacler t0 each segment lfor control purposes)
,u.s Z'l 2 ce~enf to the nefworf< layer for transmiS5iori Th seqrnents a.re P"'\ ~ t i m io 1
:r-a :rn .. transmitted. This entir~ opPration is transparent to he e e1vmg pr')ct"ss. Later we wi:i se~
-n ~ ts may tiP received out of order, ~t or corrupted, clI1d ffc;Pnt AU of these are handled by the
e·ver with the receiving application process unaware of TCP's activiti~.
Receiving
process
__ ___.._..______--'~1-------------------
--
uNIT • IV
ever,
ibe sender and dem !ti lexing at the receiver. I_-Iowsses.
Uk~ UDJLICE. perfo_rms mµItipl.exing at re · f proce
to be establis e
since TCP 15 a connection-onented protocol, a con.,nection needs
(vii) Conn ectio n-Or iente d Serv ice
ss at site A wants to send to and
TCP, _u_nlike U[)P, !!.a corinection oriented protocol. When a proce
phases occur:
receive data from another process at site 8, the following three
1. The two TCP's establish a logical connection between them.
2. Data are exchanged in both directions.
3. The connection is tenninated.
The TCP segment is encapsulated in
Note that this is a logical connection, not a physical connection.
ted, and then resent. Each may be routed
an IP datagram and can be sent out of order, or lost or corrup
al connection. TCP creates a stream-
over a different path to rea&._h the destination. There is no physic
ivering the bytes iri order to the other
oriented environment in which it accepts the responsibility otdel
.site.
(viii) Relia ble Serv ice
'
mechanism to check ~ e and
TCP is a rel~ ~po rt protocol. It use_s an acknowledgment
section on error control.
sound arrival of data. We will discuss this feature further in the
r ~<l..xt
~ff)
C~ Co ntr ol
f • j) S t) \.0-;:
~ Cof)J~ Oftlm}re
u)
Desc ribe in detai l TCP Cong estio n Control.
.~. .
TCP uses different policies to handle the congestion in the netwo
rk. ~ \' d~
C~ngestlon Window
size of the send window is controlled
When we discussed flow control in TCP, we mentioned that the
in each segment tra~lfug in the o_pposite
by the receiver using the value of rwnd, which is advertised received
lowed with the«---
direction. The use of this strategy guarantees that the receive window is never overf
. that the intermediate buffer s, b e ,in the
bytes (no end congestion). This, however, does not mean
from more than onLsender. No matter
routers, do not become congested. A router may receive data
d with data, which results in dropping
h~ar ge the buffers of a router may be, it may be overwhelme
is no con_g~Qn at the other end. but
some segments sent by a specific TCP sender In other words, there ~
the ,~ 15 due- t
is the sign
n the case .
re~ dtlplicate'AC}Ss,
ivec( The network is either sligh
.. '. .. . .
The name of this alg<?ritl:m is misleading; the algorithm starts slowly, but grows exponentially. To
show the idea, let us look at Figure. We assume that rwnd is much larger than cwnd, so that the sender
window size always equals cwnd. We also assume that each segment is of the same size and carries MSS
bytes. For simplicity, we also ignore the delayed-ACK policy and assume that each segment ls acknowledged
individually.
The sender starts with cwnd = 1. This means that the sender can send only one -segment. After the
fust ACK arrives, the acknowledged segment is purged from the window, which means there is now one
-.-.,,-,,-,.::..~-,,-,,-llc_o_tl-011-.,--~--------J@\...--~------------
RK~S
:.:.O=..:::
uNIT . 1v~ _ _ _ _ _ _ __:__ _ _ _ _ _ _ _ _ _~c~o~M~P~U~TE~R~N:,::E:.:,:TW
~ th
tysegment ;lot in the wi nd0w, The size of the congestion window is also increased by 1 because the
e:al of the acknowledgme~t is a good sign that there is no congestion in the network The size of e
a. doW is now 2. After send10g two segments and receiving two individual acknowledgments for them,
w~ · dow now becomes 4, and so on. In other words.
the size of the congesti on wm ·
~Cli.cnt s,,,,, 8
~ .◄••· [ r
: - - - - - - - - - _ ':
, -
- -
Segment
- - -
Rrt : : - ACK
I _:;i
= ◄---RP---
4
2
Til~
l [
! --------
: • . :::::::::::::--
'
1¥ ~ '1 : ~ [ ; !·
' '
8
• tt6Ri:&cgp .,e I I· I; I
◄••. •', ~ · ,:
cwnd t · T
Time Time
. .
Fig.: .Slow start, exponential increase
the size of the congestion window in this algorithm is a function of the nurn~er of ACKs arrived.and can be
detennined as follows. · · · ,·
If an ACK arrives, cwnd = cwnd + 1:
If we look at-the size of the cwnd in terms of round-trip times (RTis), we find that the growth rate
is exponential in tenns of .each round trip time, which is a very aggressive approach:
Start ➔ cwnd = 1 ➔ 2°
1
After 1 RTI ➔ cwnd = cwnd +1 =1 += 1 = 2 ➔ 2
cwnd = cwnd + 2 =2 + 2 = 4 ➔ 2
2
After 2 RTf .➔
➔ cwnd = cwnd + 4 =4 + 4 = 8 ➔ 2
3
After 3 RTI
A slow start cannot continue indefinitely. There must be a threshold to stop this phase. The sender
keeps track of a variable named ssthresh (slow-start threstold). When the size of the window in bytes
reaches this thre;5hold, slow start stops and the next phase starts. ·
•~ the slow-start algorithm, the size of the congatloo
window Increases exponentially until It reachea a thraholcl
We need, however, to mention that the slow-start strategy is slower- in the case of delayed
acknowledgments. Remember, for each ACK, the cwnd is increased by only 1. Hence, if two ·segments
are acknowledged cumulatively, the size of the cwnd increases by only 1, not 2. The growth is still exponential,
but it is not a power of 2. With one ~CK for every two segments, it is a power of 1.5.
5. Congestion Avoidance: Additive Increase
If we continue with the slow-start algorithm, the size of the congestion window increases exponentially.
To a~oid congestion before it happens, we must slow down this exponential growth. TCP defines another
algonthm called congestic;m avoidance, which increases the cwnd addith1ely instead of exponentially. When
~e size of the congestion window reaches the slow-start threshold in the where cwnd == i. the slow- case
start phase stops and the additive phase begins. In this algorithm, each ti~e the whole "window" of
segments ls acknowledged, the size of the congestion window ls increased by one.
~--------------@f-----------:R:-=-ah:u- :;l~P:ub;:-;ll;:ca::,,;:o=ns
MCA II YEAR Ill SEMESTER
Server.
I
I
: _ Segment
: -ACK
RIT
1+3 :
liZil-l&JilalB-<··. T
cwnd
. .. :
The send
ur ACKs arrive. the ....... .
ne e>.ira empty segrn,ent slot in ~ e stze of the c
fhe-size of window is now 5 After senc:hn ~e segments and r
fuE size of the con~estion window mes 6, and so on. I
~dow in this algo~thm is also a fun the numbetof ACK.c:
as follows: ·
I ·· · , cwnd ~ cwn
I thep
TR .
a I e • I,.. I e
r Ii
-----------------1~1
Rahu/ Publications ----------------
UNIT . IV"- ---- ' - - - - - - - - - - - - - - - - - - - -COMPUT ER NETWORKS
;.--
JICY Transition
. . .
po We discussed three congestion policies in TCP. Now the questions when each of these policies 15
d and when TCP moves from one policy to another. To answer these question s, we need to refer to
ose rsions of TCP: Taho TCP, Reno TCP, and New Reno TCP.
three ve
faho TCP . . .
The early TCP, known as Taho TCP. used only two different algorithms in their congesti on policy.
start and congestio n avoidance. We use fig. to show the FSM for this version of '{CP. However, we
slo: to mention that we have deleted some small trivial actions, such as incremen ting and resetting th
e
nee ber of duplicate ACKs, to make the FSM less crowded and simpler.
nurn
;-3 •2 Timer Manage ment
Discuss about TCP timer.
To perform their operatio ns smoothly , most TCP impleme ntations use at least four timers:
smission, persistence, keepalive, and TIME-WAIT. __,_ ,
-1._ _
Retrans mission Timer --:) u..J~ J ~ dOf"t
· '(e__c..~v;-4
.. ~r:o..:Jt~
~ddt ~ dJr0e..D t o._~ OJ')
To retransmit lost segments, TCP employs one retransmission timer (for the whole connecti on period)
at handles the retransmission time-out (RTO), the ~ting time for an acknowl edgment of a segment
.
e can define the following rules for the retransmission timer:
When TCP sends the segment in front of ~e ~ queue, _!Lsta~ tj"le tjm_er.
When the timer expires, TCP resends the first segment in front of the queue, and restarts the tiroex:
When a segment or segments are cumulatively acknowledged, the segment or segment s are purged
from the queue.
If the queue is empty, TCP stops the timer; otherwise, TCP restarts the timer.
Round-Trip Time (RTI)
To calculate the retransmission time-out (RTO), we first ·need to calculate the round- trip time
(RlT). However, calculatir.g RTT in TCP is an involved process.
Measured RTf: We need to find how long it takes to send a segment and receive an acknowl edgment
for it. This is the measure d RTT. We need to remembe r that the segment s and their acknowl edgment s
do not have a one-to-o ne relationship; several segments may be acknowl edged together. The
measured round-trip time for a segment is the time required for the segment to reach the destinati on
and be acknowledged, although the ·acknowled gment may include other segment s. Note that in
TCP only one RTI measure ment can be in progress 'at any time. This means that if an RTT
measurement is started, no other measurem ent starts until the value of this RTI is finalized. We use
the notation RTTM to stand for measured RTT.
In TCP, there can be only one R1T measure ment In progres s at any time.
~moo~e d RTT: The measured RTI, RTTw is likely to change for each round trip. The fluctuation
~ so high in today's Internet that a single measure ment alone cannot be used for retransmission
:::~out purposes. Most implementations use a smoothe d RTI, called RTis. which is a weighted
age of RTTM and the previous RTT5 , as shown below:
- -- - - - - - - - - - - - --l@DJ--~\----------R-a-:-h-ul-;-;;Pu-.:-b;:-;l:;:ic::a,:;io:n::s
MCA II YEAR Ill SEMesyl!
~
Initially ➔ Novalue
After first measurement ➔ RTI5 == RTIM
After each measurement ➔ RTIs = (1 _ a.) RTfs + a. x RTIM
The Value of a is implementation-dependent, but it is normally set to 1/8. In o~her words, the new
RTIs is calculated as 7/8 of the old RTIS and 1/8 of the current R1TM' '1
► th
RIT Deviation: Most implementations do not just use RTf5; they also calculate e RIT deviation
called RTI , based on the RTI and RTiw using the following formulas. (The value of P is als~
0 5
implementation-dependent, but is usually set to 1/4.)
Initially ➔ No value
After first measurement ➔ RTIO = R1iJ2
After each measurement ➔ RTr0 =. (1 MRTI'o
Retransmls&'lon Time-out (RTO) The value of
"1nd ~ts deviation. Most im lem~nta
Origmal Initial
After any measuremen t RTO = R
ln -0th er words1 take the running smooth .
smoothed ~verage .value of RJfO {noWlally a '5malrvalue).
Rahul Puhl/cations
,e;<!. ~ec~- tti ~ R- trlli:,i ~1s. ~'13 r b ~ ½ 1J$ °I d<itc; .
fl
~~-~
,11}\IT nmer
TIME-WAIT (2MSL) timer is used during
-
subset of telephony QoS is grade of service (GoS)
requirements, which ~om prises aspects of a
~e termination. The maximum segment connection relating to capacity and co~age of a . ·
~~
.
c0n~. (MSL) is the amount of time any segment network, for example guarante ed maximum
1ueti:st in a network before being disco/ded. The blocking probability and outage probability.
~n 1ernentation needs to choose a v~lue for MSL. o In the field of computer networking and
:rnrnon values are 30 seconds, 1 mmute, or even other packe!,:switched telecomm unication
. tes . The 2MSL timer is used when .TCP networks, the traffic engineering term refers to
Z rninu
0
rms an active close and sends the final ACK resource reservation cont~ol mechanisms rather
perf nnection must' stay open for 2 MSL amount
'f}leCO
than the achieved service quality. Quality of servi½e
of tirne to allow TCP to resend the final ACK in case is the ability to provide different p1ority to differ.ent
the ACK is lost. This requires that the RTO timer at applicptions, users, or data flows, or to guarantee a
the other end times ; ,an~;ew FIN and ACK certain level of performance to a data flow.'
segments are resent. ' \J ~ (!!f.::('et l':f.t3i e i~ex~. ~~~uir ed bit rate, delay, jitter,
packet dropping probability and/or bit error rate
[ 4.4 QUALIFY OF SERVICES
may be guaranteed. Quality of service guarantees
()6:J)efin e QoS: Explain the specific .are importa~t if the n,.?twork capacity is insuffi~ent,
P purpose of QoS. ..==) .1?c,._c,d. . ,. • especially for real-time streaming multi~ed ia
~""lC,t· .
~
'
--
<1',ef,~
- ? -,....
ffi~.!:)~ l.~(I ~)
mp. ~pplicatio ns such as voice over IP, online games and
?,.:) ~eJa j . IP-T\l, since these often require f ~ t rate and .
Meaning ,Y s nl()-f ,-= v~cd'Of) "'10 flfe delay sensitive, and .in netwc;,rks where the
Quality of service (QoS) is the ove?a t capacity is a limited resource, for example in cellular
. . . O t ~--)ft) 11 1~
perfonnance of a telenhony or computer network, data communication. ' ....1....,.1,,. .. \~SQ..rt:J"
~-~ ~
~~ ~VaCF ~~ ~ tA.. Hrt>t' ~~--~ oJ '
particularly the performance seen by the user$ o A network or protocol thal supports g_~
t1e network. To qua~titatively ~u-;;-qu ;!ity of
may agree on a traffic con~ct with the application
~ice, several related aspects of the network
software and r~erve ~pacity in the rw;work nodes,
service are often considered, such as error rates,
for example during a session establishment phase:
b.!ndwidth, throughput,'. tt,.ans.mission delay, .
During the session it may monitor the achieved level
avai)ability, jitter, etc. Qualify.of service js particularly
of performance, for example th~ <lea rate and
iniportant for the traosport of traffic with ~pedal
d!lay, and dyn~ical ly control scheduling priorities
re~ements. In particular, much technology has
in the network nodes. It may release the ~erved
been developed to allow computer networks to
cal?acity during.a teM down phase.
become as useful as telephone networks for ~u~Ho
co~ersations, as well as supportin g new A best-effort network or service does not
applications with even st;ricter service demands. suppo~ quality of service. An alternative to complex
In the field of telephony, quality of service ~S control mechanisms is to provide b,igtl quality
was defined by the ITU in 1994.. Quality of service communication over a best-effort network by over-
· requirements on all the aspects of a provisioning the capacity so that it is sufficient for
comPnses
~nnection,_ such as service response time, loss, the ~xpected peak traffic load. The resulting absence
signal t0 .
_ - -noise ratio, crosstalk, echo, interrupts, of network congestion eliminates the need for QoS
frequenc
- Y response, loudness levels, and so on. A mechanisms.
Ra~ul Publications
MCA
QoS is sometimes used as a quality measure, rate {the maximum throughput). that can b
with many alternative definitio;s, rather than provided to a certain data stream rnay be t e
. d' oo
referring to the ability to rese1ve resources. Quality low for real-time mu Itime ta services if all data
streams _get the same scheduling Pricmt
of service sometimes refers to the leyel of guali!Y of
Dropped packets The routers rnight fail ;
service, i.e. the guaranteed service quality. [3] High ·
deliver {drop) some packets i their data load~
QoS is often confused with a high level of a(§__corrupted, or the packets arrive when the
p~rformance or achieved service quality, for router bufferis__..ere p)ready full. The receivin
example highJ2!!_raje, low latency and law bit error
probability.
application may ask for this information
be retransmitted, possibly causing severe
t:
delays in the overall transmission.
An alternative and disputable definition of
QoS, used especially in application layer services 2. Errors
f"'"'~ te'ephon and streaming v1deb, is
a.- Sometimes packets are ro-~......._..t
requ1t"ements on a 1ebic that reflects or predicts e1Torb caused by noise
fuE:: sUbJecti\, ely e.xpelienced quality. In this context, espec1a y s com.ruunications
bos is the acceptable cumul,g!ilte eff€ct on long copper wires. The receiver has to det
~bscribm· satisfaction. of all imperfections ~fecting t~ and, just a~ if the packet wac; c'ru >p
fue service. Other terms with similar meamng are may ask for this information to
fue quality of experience (QoE) subjective business retransmitted. Latency It might take a lo
concept. the required "user perq;ivad P:!!o~ance". _time for each packet to reach its de;,tindtic
\41 the required "degree of satisfactio~ of the user" because it gets hefd up in long qu ues, ur
or the targeted "number of hapey customers". takes a less direct route to avoid congestio
Examples of measures and measure_ment methods · This is different from throughput, as the del
are mean opinion score (MOS), perceptual speech can build up over time even if the throughp
¾
The User Datagram Protocol (UDP) is one of
datagram.
.. a, ca1I~
the core members of the Internet protocol suite.
The protocol was designed by David P. Reed in 1980 UDP provides two services not ProVid
and fonnally defined in RFC 768. the JP layer. It provides port number erj ~J
. . s to h
distingU1sh d1fferent user requests and Opt· e~
UDP uses a simple connectionle:s ' IOnaij
checksum capability to verify that the data atri~,a
· · um of protocol
transmission model w1'th a mm1m
intact. v~
mechanism. It has no handshaking dialogues, and
thus exposes any unreliability of the underlyi~g TCP has emerg~d as the d9mi
I
network
1
~m· There 1s
projocbl to the user· 5 pr---~~- used for the bulk of Internet con
. 0 ~d ri·ng ' or duplicate
p_e guaran1~;."~ deI1ver~ services for b
..,....~~--=--•;4,f~·-••~-·~-:..:
protection. UDP_ provid~ £hecksums for data packets, che
integrity, and port numbers for addressing different reassemblin
functions at the source and destination of the these additi
datagram. ·tion
With
•
UDP, computer applic~fions canIr-<'send•
----------------1~
R"ltul Publications
l-------------- ------
•
COMPUTER NETWORKS
UDP provides application multiplexing (via ► In 1Pv6 Jumbo grams it is possible to have
port numbers) and integrity verification (via UDP packets of size greai£.r_ than 65,535
checksum) of the header and payload.[4] If bytes.[5] RFC 2675 specifies that the length
..
transmission reliability is desired, it must be field is set to zero if the length of the UDP
implemented in the user's application. header plus UDP data is greater than 65,535.
ob1ects
Connection-oriented (TCP)
~ Flow control: keep sender from ovenunnlng receiver
\~ bTil ·
Rahul Puh/lcalions