DOC PREVIEW
Berkeley ELENG 122 - Introduction to Computer Networks Midterm II Review

This preview shows page 1-2-3-4-25-26-27-51-52-53-54 out of 54 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 54 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 54 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 54 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 54 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 54 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 54 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 54 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 54 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 54 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 54 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 54 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 54 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

EECS 122: Introduction to Computer Networks Midterm II ReviewTopics to be CoveredSlide 3Transport LayerUDPTCPTCP ServiceFlow Control vs. Congestion ControlCongestion Window (cwnd)Slide 10Why do You Care About Congestion Control?Solutions?TCP: Slow StartSlow Start ExampleCongestion AvoidanceSlow Start/Congestion Avoidance ExamplePutting Everything Together: TCP PseudocodeThe big picturePacket Loss DetectionFast RetransmitFast RecoveryFast Retransmit and Fast RecoveryTCP FlavorsTCP VegasTCP-SACKSlide 26Packet SchedulingGoals of Packet SchedulingRandom Early Detection (RED)RED AdvantagesExplicit Congestion NotificationECN AdvantagesSlide 33Token Bucket and Arrival CurveSource Traffic CharacterizationSource Traffic Characterization: ExampleQoS Guarantees: Per-hop ReservationPacket Scheduling and Fair QueuingFluid Flow System: ExamplePacket System: ExampleExample: Problem 6.14 (a)Solution: Virtual TimeSlide 43Properties of WFQWhat You Need to KnowSlide 46Differentiated ServicesAdvantages of DiffServDisadvantages of DiffServIntegrated ServicesResource Reservation Protocol: RSVPAdvantages of IntServDisadvantages of IntServSlide 54Katz, Stoica F04EECS 122: Introduction to Computer Networks Midterm II ReviewComputer Science DivisionDepartment of Electrical Engineering and Computer SciencesUniversity of California, BerkeleyBerkeley, CA 94720-17762Katz, Stoica F04Topics to be CoveredTransport ProtocolsCongestion Control and Congestion Avoidance concepts, TCP variantsQoS (Packet Scheduling) and Congestion Control (RED) MechanismsFluid Model and Token Bucket methodEssential DiffServ and IntServ ConceptsP&D: Sections 5.1, 5.2, 6.1- 6.3, 6.4.2, 6.5.1- 6.5.3Project #2 Specification3Katz, Stoica F04Topics to be CoveredTransport ProtocolsCongestion Control and Congestion Avoidance concepts, TCP variantsQoS (Packet Scheduling) and Congestion Control (RED) MechanismsFluid Model and Token Bucket methodEssential DiffServ and IntServ Concepts4Katz, Stoica F04Transport LayerProvide a way to decide which packets go to which applications (multiplexing/demultiplexing)Can provide more reliability, in order delivery, at most once deliveryCan support messages of arbitrary lengthGovern when hosts should send data  can implement congestion and flow control5Katz, Stoica F04UDPUser Datagram ProtocolMinimalist transport protocolSame best-effort service model as IPMessages up to 64KBProvides multiplexing/demultiplexing to IPDoes not provide flow and congestion controlApplication examples: video/audio streaming6Katz, Stoica F04TCPTransmission Control ProtocolReliable, in-order, and at most once deliveryMessages can be of arbitrary lengthProvides multiplexing/demultiplexing to IPProvides congestion control and avoidanceApplication examples: file transfer, chat7Katz, Stoica F04TCP Service1) Open connection2) Reliable byte stream transfer from (IPa, TCP Port1) to (IPb, TCP Port2)•Indication if connection fails: Reset3) Close connection8Katz, Stoica F04Flow Control vs. Congestion ControlFlow control: regulates how much data can a sender send without overflowing the receiverCongestion control: regulates how much data can a sender send without congesting the networkCongestion: dropping packets into the network due to buffer overflow at routers9Katz, Stoica F04Congestion Window (cwnd) Limits how much data can be in transit, i.e., how many unacknowledged bytes can the sender sendEffectiveWindow = MaxWindow – (LastByteSent – LastByteAcked)MaxWindow = min(cwnd, AdvertisedWindow) LastByteAcked LastByteSentsequence number increasesAdvertisedWindow is used for flow control10Katz, Stoica F04Topics to be CoveredTransport ProtocolsCongestion Control and Congestion Avoidance concepts, TCP variantsQoS (Packet Scheduling) and Congestion Control (RED) MechanismsFluid Model and Token Bucket methodEssential DiffServ and IntServ Concepts11Katz, Stoica F04Why do You Care About Congestion Control?Otherwise you get to congestion collapseHow might this happen?-Assume network is congested (a router drops packets) -You learn the receiver didn’t get the packet•Either by ACK or Timeout-What do you do? -Retransmit packet-Still receiver didn’t get the packet (because it is dropped again)-Retransmit again-…. and so on …-And now assume that everyone is doing the same!Network will become more and more congested-And this with duplicate packets rather than new packets!12Katz, Stoica F04Solutions?Increase buffer size. Why not?Slow down-If you know that your packets are not delivered because network congestion, slow downQuestions:-How do you detect network congestion? Use packet loss as indication!-By how much do you slow down?13Katz, Stoica F04TCP: Slow StartGoal: discover congestion quicklyHow? -Quickly increase cwnd until network congested  get a rough estimate of the optimal size of cwnd:-Whenever starting traffic on a new connection, or whenever increasing traffic after congestion was experienced:• Set cwnd =1 • Each time a segment is acknowledged increment cwnd by one (cwnd++).14Katz, Stoica F04Slow Start ExampleThe congestion window size grows very rapidlyTCP slows down the increase of cwnd when cwnd >= ssthresh segment 1cwnd = 1cwnd = 2segment 2segment 3cwnd = 4segment 4segment 5segment 6segment 7cwnd = 8cwnd = 315Katz, Stoica F04Congestion AvoidanceAdditive increase: starting from the rough estimate, slowly increase cwnd to probe for additional available bandwidthMultiplicative decrease: cut congestion window size aggressively if a timeout occursIf cwnd > ssthresh then each time a segment is acknowledged increment cwnd by 1/cwnd (cwnd += 1/cwnd).16Katz, Stoica F04Slow Start/Congestion Avoidance ExampleAssume that ssthresh = 8cwnd = 1cwnd = 2cwnd = 4cwnd = 8cwnd = 9cwnd = 10Roundtrip timesCwnd (in segments)ssthresh17Katz, Stoica F04Putting Everything Together:TCP PseudocodeInitially:cwnd = 1;ssthresh = infinite;New ack received:if (cwnd < ssthresh) /* Slow Start*/ cwnd = cwnd + 1;else /* Congestion Avoidance */ cwnd = cwnd + 1/cwnd;Timeout:/* Multiplicative decrease */ssthresh = cwnd/2;cwnd = 1;18Katz, Stoica F04The big pictureTimecwndTimeoutSlow StartCongestionAvoidancesstresh19Katz, Stoica F04Packet Loss DetectionWait for Retransmission Time Out (RTO)What’s the problem with this? Because RTO is performance killerIn the BSD TCP implementation,


View Full Document

Berkeley ELENG 122 - Introduction to Computer Networks Midterm II Review

Documents in this Course
Lecture 6

Lecture 6

22 pages

Wireless

Wireless

16 pages

Links

Links

21 pages

Ethernet

Ethernet

10 pages

routing

routing

11 pages

Links

Links

7 pages

Switches

Switches

30 pages

Multicast

Multicast

36 pages

Switches

Switches

18 pages

Security

Security

16 pages

Switches

Switches

18 pages

Lecture 1

Lecture 1

56 pages

OPNET

OPNET

5 pages

Lecture 4

Lecture 4

16 pages

Ethernet

Ethernet

65 pages

Models

Models

30 pages

TCP

TCP

16 pages

Wireless

Wireless

48 pages

Load more
Download Introduction to Computer Networks Midterm II Review
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Introduction to Computer Networks Midterm II Review and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Introduction to Computer Networks Midterm II Review 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?