This document summarizes a research paper that analyzes the transmission time of IPTV multicast service in SDN/OpenFlow environments. It proposes using Dijkstra's and Prim's algorithms in an OpenFlow controller to calculate efficient routing for IPTV multicast traffic. The paper describes implementing the algorithms in a POX controller and emulating the network in Mininet. It then compares the transmission times between an IPTV server and clients when using each algorithm for routing. The results show that Dijkstra's algorithm generally provides shorter transmission times than Prim's algorithm due to calculating routes with fewer hops. However, Prim's algorithm has faster route calculation times on average.
SCTP is a transport layer protocol that provides reliable transmission of data streams over connectionless networks. It supports multi-homing by allowing endpoints to connect over multiple IP addresses, allowing fault tolerance by switching connections if one path fails. SCTP establishes connections using a four-way handshake and supports ordered and unordered delivery of data chunks. It uses sequence numbers, acknowledgments, and retransmissions to ensure reliable and error-free data transfer. Flow control is implemented using a receiver window and congestion control uses mechanisms similar to TCP.
1) Computer networks allow computers to communicate and share resources by connecting them through communication channels. There are several types of networks including LANs, WANs, and MANs.
2) For communication between computers on a network, both sides must agree on protocols which are sets of rules that govern data transmission. The two main protocol stacks are OSI and TCP/IP.
3) The network layer is responsible for delivering packets from source to destination by choosing appropriate paths through routers. It provides connectionless and connection-oriented services to the transport layer above it.
IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...cscpconf
TCP congestion control mechanism is highly dependent on MAC layer Backoff algorithms that
predict the optimal Contention Window size to increase the TCP performance in wireless adhoc
network. This paper critically examines the impact of Contention Window in TCP congestion
control approaches. The modified TCP congestion control method gives the stability of
congestion window which provides higher throughput and shorter delay than the traditional TCP. Various Backoff algorithms that are used to adjust Contention Window are simulatedusing NS2 along with modified TCP and their performance are analyzed to depict the influence of Contention Window in TCP performance considering the metrics such as throughput, delay, packet loss and end-to-end delay
This document summarizes several internet protocols including IP, TCP, UDP, and ICMP. It describes key aspects of each protocol such as their purpose, packet structure, error handling mechanisms, and how they interact to enable communication over the internet. IP is a connectionless protocol that forwards packets based on destination addresses. TCP and UDP are transport layer protocols, with TCP providing reliable connections and UDP being connectionless. ICMP provides error reporting and control for IP. Port numbers and sockets are used to direct communication to specific applications.
Stream Control Transmission Protocol (SCTP) - IntroductionLaili Aidi
The document discusses the Stream Control Transmission Protocol (SCTP), a transport layer protocol that provides reliable message delivery like TCP but with some improvements. SCTP supports multi-homing where an endpoint can be associated with multiple IP addresses simultaneously. It also supports multi-streaming within a single association to reduce head-of-line blocking. SCTP uses a four-way handshake for connection setup and ensures reliable data transfer using transmission sequence numbers and selective acknowledgements.
Overview of transport protocols.
The transport layer (OSI layer 4) is the interface between the network and application (network API).
The transport layer provides data transport service and some level of quality of service (QoS) to the application.
While all transport protocols offer data transport services, they have varying levels of quality of service in terms of error detection and correction, packet ordering and packet delay.
Simple transport protocols like UDP are often connectionless while connection-oriented transport protocols like TCP provide many quality of service properties.
The document summarizes key aspects of the transport layer and two main Internet transport protocols: TCP and UDP. It describes how the transport layer provides logical communication between application processes on different hosts by breaking messages into segments and reassembling them. TCP provides reliable, in-order delivery using congestion control with additive increase/multiplicative decrease, while UDP provides unreliable delivery. The document also discusses causes of network congestion and how TCP detects and responds to packet loss.
SCTP is a transport layer protocol that provides reliable transmission of data streams over connectionless networks. It supports multi-homing by allowing endpoints to connect over multiple IP addresses, allowing fault tolerance by switching connections if one path fails. SCTP establishes connections using a four-way handshake and supports ordered and unordered delivery of data chunks. It uses sequence numbers, acknowledgments, and retransmissions to ensure reliable and error-free data transfer. Flow control is implemented using a receiver window and congestion control uses mechanisms similar to TCP.
1) Computer networks allow computers to communicate and share resources by connecting them through communication channels. There are several types of networks including LANs, WANs, and MANs.
2) For communication between computers on a network, both sides must agree on protocols which are sets of rules that govern data transmission. The two main protocol stacks are OSI and TCP/IP.
3) The network layer is responsible for delivering packets from source to destination by choosing appropriate paths through routers. It provides connectionless and connection-oriented services to the transport layer above it.
IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...cscpconf
TCP congestion control mechanism is highly dependent on MAC layer Backoff algorithms that
predict the optimal Contention Window size to increase the TCP performance in wireless adhoc
network. This paper critically examines the impact of Contention Window in TCP congestion
control approaches. The modified TCP congestion control method gives the stability of
congestion window which provides higher throughput and shorter delay than the traditional TCP. Various Backoff algorithms that are used to adjust Contention Window are simulatedusing NS2 along with modified TCP and their performance are analyzed to depict the influence of Contention Window in TCP performance considering the metrics such as throughput, delay, packet loss and end-to-end delay
This document summarizes several internet protocols including IP, TCP, UDP, and ICMP. It describes key aspects of each protocol such as their purpose, packet structure, error handling mechanisms, and how they interact to enable communication over the internet. IP is a connectionless protocol that forwards packets based on destination addresses. TCP and UDP are transport layer protocols, with TCP providing reliable connections and UDP being connectionless. ICMP provides error reporting and control for IP. Port numbers and sockets are used to direct communication to specific applications.
Stream Control Transmission Protocol (SCTP) - IntroductionLaili Aidi
The document discusses the Stream Control Transmission Protocol (SCTP), a transport layer protocol that provides reliable message delivery like TCP but with some improvements. SCTP supports multi-homing where an endpoint can be associated with multiple IP addresses simultaneously. It also supports multi-streaming within a single association to reduce head-of-line blocking. SCTP uses a four-way handshake for connection setup and ensures reliable data transfer using transmission sequence numbers and selective acknowledgements.
Overview of transport protocols.
The transport layer (OSI layer 4) is the interface between the network and application (network API).
The transport layer provides data transport service and some level of quality of service (QoS) to the application.
While all transport protocols offer data transport services, they have varying levels of quality of service in terms of error detection and correction, packet ordering and packet delay.
Simple transport protocols like UDP are often connectionless while connection-oriented transport protocols like TCP provide many quality of service properties.
The document summarizes key aspects of the transport layer and two main Internet transport protocols: TCP and UDP. It describes how the transport layer provides logical communication between application processes on different hosts by breaking messages into segments and reassembling them. TCP provides reliable, in-order delivery using congestion control with additive increase/multiplicative decrease, while UDP provides unreliable delivery. The document also discusses causes of network congestion and how TCP detects and responds to packet loss.
Performance analysis of tunnel broker through open virtual private networkTELKOMNIKA JOURNAL
Tunnel Broker uses automatic configuration tunneling mechanism for IPv6 clients connected to IPv4 internet. Connectivity between clients and service providers in IPv6 is urgently needed. Open VPN as a provider implemented configures it by a VPN network, so IPv6 and IPv4 public IP clients can easily connect to the server. In this research focused on the performance of tunnel broker mechanism by utilizing open VPN as access to the network. IPv6 tunnel broker is developed by installing Open VPN and providing IPv6 IPs. Implementation of public IP usage in observing the performance of tunnel broker development is done in BCN Telkom Laboratory Network. The measurement results show that TCP and UDP throughput of IPv6 is slightly higher than IPv4. The research using OpenVPN as a server Tunnel Broker for client access to the server is still rarely done, especially in the field of the network based on Internet Protocol.
The document provides an overview of transport layer protocols including UDP, TCP, and SCTP. It discusses the services each protocol provides such as reliable vs unreliable data delivery. For TCP, it describes connection establishment and termination, segments, flow and error control using mechanisms like acknowledgments and retransmissions. It also discusses TCP timers used for retransmission timeouts and congestion control algorithms like slow start and congestion avoidance.
This section discusses process-to-process delivery at the transport layer. It covers three main protocols: UDP, TCP, and SCTP. UDP is a connectionless, unreliable protocol. TCP is connection-oriented and reliable, providing services like streaming, buffers, and congestion/flow control. SCTP combines features of UDP and TCP, being message-oriented, supporting multiple streams and multihoming, and providing reliability. Key aspects like multiplexing, demultiplexing, connections, and reliability models are also covered.
1) Computer networks allow communication and sharing of resources between computer systems and devices through communication channels. There are several types of networks including LANs, WANs, and MANs.
2) For communication between systems, both must agree on a protocol which sets rules for data transmission. The two main protocol stacks are OSI and TCP/IP.
3) The network layer is responsible for delivering packets from source to destination. It uses services from the data link layer and provides services to the transport layer. Common network layer protocols are IP (Internet Protocol) for connectionless service and MPLS for connection-oriented service.
This document discusses transport layer protocols, specifically UDP and TCP. It provides an overview of each protocol, including key properties and operations. UDP allows applications to communicate via multiplexing but does not ensure delivery. TCP establishes reliable, in-order connections and implements flow and congestion control to ensure reliable data transfer. The document outlines TCP connection establishment, data transfer methods, congestion control algorithms, and retransmission timeout estimation.
Performance Analysis and Simulation of OLSR Routing Protocol in MANET ijcnac
Mobile ad hoc network is a collection of wireless nodes that are communicate other
nodes (router) without using access point, infrastructure . Mobile ad-hoc network is an
autonomous system that means no need for depaentd other nodes it have own capability
to handle and controlling all funcitionlity, to sending and receiving all information form
one device to other device. MANET has power full feature that controlling itself by
dynamic nature, multihop,low power and configuration of the system. In this paper we
analyzing, simulation and implements the TC messages and HELLO Message by MPR of
OLSR routing performance checked at 200 nodes on Qualnet 5.0.2 simulator. In Qualnet
simulator to simulate and implement the performance of OLSR routing protocols takes
various performance metrics like hello message sent (HMS) , hello message received
(HMR), TC message generated (TCMG), TC message replied (TCMR), TC messages
received on Constant Bit Rate (CBR) using random waypoint model. In this paper check
the performance OLSR routing protocol gives effective performance for lage networks.
The document summarizes key topics related to transport layer protocols:
- It describes the services provided by the transport layer, including addressing, connection establishment and release, flow control, and multiplexing.
- It provides details on common transport protocols like TCP and UDP, including their packet headers, connection management, congestion control, and performance issues at high speeds.
- It also presents an example transport protocol and uses finite state machines to model its operation and connection management.
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET Journal
This document summarizes a research study that used the ns-3 network simulator to analyze the performance of two routing protocols - Optimized Link State Routing (OLSR) and Adhoc On-demand Distance Vector (AODV) - in a wireless ad hoc network under different conditions. The study varied parameters like packet size, number of nodes, and hello interval (the frequency at which routing information is broadcast) and measured metrics like throughput, delay, jitter, packet delivery ratio, packet loss, and congestion window. The results showed how the performance of the two protocols was impacted by changes to these parameters. The goal was to better understand congestion control and avoidance in wireless ad hoc networks through simulation.
The document discusses various layers and concepts in computer networks and internetworking. It covers the network layer and its responsibilities in delivering packets from source to destination. It then discusses services provided by the network layer to the transport layer, including connection-oriented and connectionless services. Various routing algorithms and concepts are covered such as distance vector routing, link state routing, hierarchical routing, flooding, shortest path algorithms, broadcast routing, and multicast routing.
This document discusses the use and copyright of slides from the textbook "Computer Networking: A Top Down Approach" by Jim Kurose and Keith Ross. It states that the slides are being made freely available for educational use provided that the source is cited and the copyright is acknowledged if posted online. The document asks users to mention the source of the slides if used in a class and to note the authors' copyright if posted on a website.
This document summarizes key concepts about the transport layer in computer networks. It discusses:
1. The transport layer is responsible for process-to-process delivery of data across a network. This involves delivering packets from one process to another, often using a client-server model.
2. There are two main transport layer protocols - UDP, which is a connectionless and unreliable protocol, and TCP, which establishes connections and provides reliable data delivery.
3. TCP and UDP use port numbers along with IP addresses to uniquely identify processes. TCP also implements flow and error control to ensure reliable data transfer.
The document outlines Chapter 4 of a networking textbook. Chapter 4 covers the network layer, including network layer services, how routers work, routing algorithms, and implementations in the Internet. The key topics covered are virtual circuit versus datagram networks, the functions of routers including forwarding and routing, and routing algorithms like link state and distance vector.
SCTP is a transport layer protocol that combines features of UDP and TCP. It allows multi-streaming so data on blocked streams can still be delivered, supports multihoming to use multiple network interfaces for fault tolerance, and provides reliable and ordered delivery of data. Key SCTP features include a 4-way handshake to prevent DoS attacks, graceful shutdown, and congestion/flow control adapted from TCP to support multihoming. Data is sent in chunks identified by TSN, SI, and SSN numbers.
This document discusses various aspects of transport layer protocols in computer networks, including:
- Addressing processes using port numbers between 0-65,535
- The client-server model where clients use ephemeral ports over 1023 and servers use well-known ports
- Transport layer services like multiplexing, demultiplexing, flow control using buffers, error control using sequence numbers and acknowledgments, and congestion control
- Connection-oriented protocols like TCP provide reliable data delivery compared to connectionless protocols like UDP.
- Stop-and-wait, go-back-N, and selective-repeat protocols aim to increase efficiency over simple retransmission by allowing multiple outstanding packets.
TCP & UDP Streaming Comparison and a Study on DCCP & SCTP ProtocolsPeter SHIN
As a graduate student work, I have compared the performance between TCP and UDP media streaming with empirical results. Also, I have researched on different attempts on UDP to be more reliable, but why its progress has not been as fast as possible
The transport layer accepts data from the session layer, breaks it into packets, and delivers the packets to the network layer. It provides end-to-end communication and ensures reliable delivery of data. The network interface layer sends and receives TCP/IP packets on the network medium. It encompasses the data link and physical layers of the OSI model. TCP/IP is independent of the specific network technology.
Transport Layer Services : Multiplexing And DemultiplexingKeyur Vadodariya
This document discusses the transport layer of computer networks. It begins with introducing the group members and topic, which is the transport layer introduction, services, multiplexing and demultiplexing. Then it provides definitions of the transport layer, its functions and services. It describes how the transport layer provides process to process delivery, end-to-end connections, congestion control, data integrity, flow control, multiplexing and demultiplexing. It explains the differences between connectionless and connection-oriented multiplexing and demultiplexing. In the end, it lists some references.
The document discusses the differences between packets and frames, and provides details on the transport layer. It explains that the transport layer is responsible for process-to-process delivery and uses port numbers for addressing. Connection-oriented protocols like TCP use three-way handshaking for connection establishment and termination, and implement flow and error control using mechanisms like sliding windows. Connectionless protocols like UDP are simpler but unreliable, treating each packet independently.
The document summarizes key aspects of the transport layer. It discusses how the transport layer provides logical communication between application processes running on different hosts by abstracting physical network details. It then describes the services provided by the transport layer including connection-oriented and connectionless services. It also discusses topics like quality of service, transport service primitives, addressing, connection establishment and release, flow control, multiplexing, and crash recovery for the transport layer.
Design and implementation of low latency weighted round robin (ll wrr) schedu...ijwmn
Today’s wireless broadband networks are required to provide QoS guarantee as well as fairness to
different kinds of traffic. Recent wireless standards (such as LTE and WiMAX) have special provisions at
MAC layer for differentiating and scheduling data traffic for achieving QoS. The main focus of this paper is
concerned with high speed packet queuing/scheduling at central node such as base station (BS) or router to
handle network traffic. This paper proposes novel packet queuing scheme termed as Low Latency
Weighted Round Robin (LL-WRR) which is simple and effective amendment to weighted round robin (WRR)
for achieving low latency and improved fairness. Proposed LL-WRR queue scheduling scheme is
implemented in NS-2 considering IEEE 802.16 network [1] with real time video and Constant Bit Rate
(CBR) audio traffic connections. Simulation results show improvement obtained in latency and fairness
using LL-WRR. The proposed scheme introduces extra complexity of computing coefficient but its overall
impact is very small.
MANET Routing Protocols , a case studyRehan Hattab
L. Yi, Y. Zhai, Y. Wang, J. Yuan and I. You , Impacts of Internal Network Contexts on Performance of MANET Routing Protocols: a Case Study, Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing,2012.
UDP is a connectionless transport protocol that does not guarantee packet delivery or order. It is faster than TCP but does not ensure reliability. UDP packets have a header containing source and destination port numbers as well as length fields. The checksum field allows detecting errors but packets are not retransmitted if errors occur. UDP is suitable for real-time applications where speed is critical and packet loss can be tolerated.
Performance analysis of tunnel broker through open virtual private networkTELKOMNIKA JOURNAL
Tunnel Broker uses automatic configuration tunneling mechanism for IPv6 clients connected to IPv4 internet. Connectivity between clients and service providers in IPv6 is urgently needed. Open VPN as a provider implemented configures it by a VPN network, so IPv6 and IPv4 public IP clients can easily connect to the server. In this research focused on the performance of tunnel broker mechanism by utilizing open VPN as access to the network. IPv6 tunnel broker is developed by installing Open VPN and providing IPv6 IPs. Implementation of public IP usage in observing the performance of tunnel broker development is done in BCN Telkom Laboratory Network. The measurement results show that TCP and UDP throughput of IPv6 is slightly higher than IPv4. The research using OpenVPN as a server Tunnel Broker for client access to the server is still rarely done, especially in the field of the network based on Internet Protocol.
The document provides an overview of transport layer protocols including UDP, TCP, and SCTP. It discusses the services each protocol provides such as reliable vs unreliable data delivery. For TCP, it describes connection establishment and termination, segments, flow and error control using mechanisms like acknowledgments and retransmissions. It also discusses TCP timers used for retransmission timeouts and congestion control algorithms like slow start and congestion avoidance.
This section discusses process-to-process delivery at the transport layer. It covers three main protocols: UDP, TCP, and SCTP. UDP is a connectionless, unreliable protocol. TCP is connection-oriented and reliable, providing services like streaming, buffers, and congestion/flow control. SCTP combines features of UDP and TCP, being message-oriented, supporting multiple streams and multihoming, and providing reliability. Key aspects like multiplexing, demultiplexing, connections, and reliability models are also covered.
1) Computer networks allow communication and sharing of resources between computer systems and devices through communication channels. There are several types of networks including LANs, WANs, and MANs.
2) For communication between systems, both must agree on a protocol which sets rules for data transmission. The two main protocol stacks are OSI and TCP/IP.
3) The network layer is responsible for delivering packets from source to destination. It uses services from the data link layer and provides services to the transport layer. Common network layer protocols are IP (Internet Protocol) for connectionless service and MPLS for connection-oriented service.
This document discusses transport layer protocols, specifically UDP and TCP. It provides an overview of each protocol, including key properties and operations. UDP allows applications to communicate via multiplexing but does not ensure delivery. TCP establishes reliable, in-order connections and implements flow and congestion control to ensure reliable data transfer. The document outlines TCP connection establishment, data transfer methods, congestion control algorithms, and retransmission timeout estimation.
Performance Analysis and Simulation of OLSR Routing Protocol in MANET ijcnac
Mobile ad hoc network is a collection of wireless nodes that are communicate other
nodes (router) without using access point, infrastructure . Mobile ad-hoc network is an
autonomous system that means no need for depaentd other nodes it have own capability
to handle and controlling all funcitionlity, to sending and receiving all information form
one device to other device. MANET has power full feature that controlling itself by
dynamic nature, multihop,low power and configuration of the system. In this paper we
analyzing, simulation and implements the TC messages and HELLO Message by MPR of
OLSR routing performance checked at 200 nodes on Qualnet 5.0.2 simulator. In Qualnet
simulator to simulate and implement the performance of OLSR routing protocols takes
various performance metrics like hello message sent (HMS) , hello message received
(HMR), TC message generated (TCMG), TC message replied (TCMR), TC messages
received on Constant Bit Rate (CBR) using random waypoint model. In this paper check
the performance OLSR routing protocol gives effective performance for lage networks.
The document summarizes key topics related to transport layer protocols:
- It describes the services provided by the transport layer, including addressing, connection establishment and release, flow control, and multiplexing.
- It provides details on common transport protocols like TCP and UDP, including their packet headers, connection management, congestion control, and performance issues at high speeds.
- It also presents an example transport protocol and uses finite state machines to model its operation and connection management.
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET Journal
This document summarizes a research study that used the ns-3 network simulator to analyze the performance of two routing protocols - Optimized Link State Routing (OLSR) and Adhoc On-demand Distance Vector (AODV) - in a wireless ad hoc network under different conditions. The study varied parameters like packet size, number of nodes, and hello interval (the frequency at which routing information is broadcast) and measured metrics like throughput, delay, jitter, packet delivery ratio, packet loss, and congestion window. The results showed how the performance of the two protocols was impacted by changes to these parameters. The goal was to better understand congestion control and avoidance in wireless ad hoc networks through simulation.
The document discusses various layers and concepts in computer networks and internetworking. It covers the network layer and its responsibilities in delivering packets from source to destination. It then discusses services provided by the network layer to the transport layer, including connection-oriented and connectionless services. Various routing algorithms and concepts are covered such as distance vector routing, link state routing, hierarchical routing, flooding, shortest path algorithms, broadcast routing, and multicast routing.
This document discusses the use and copyright of slides from the textbook "Computer Networking: A Top Down Approach" by Jim Kurose and Keith Ross. It states that the slides are being made freely available for educational use provided that the source is cited and the copyright is acknowledged if posted online. The document asks users to mention the source of the slides if used in a class and to note the authors' copyright if posted on a website.
This document summarizes key concepts about the transport layer in computer networks. It discusses:
1. The transport layer is responsible for process-to-process delivery of data across a network. This involves delivering packets from one process to another, often using a client-server model.
2. There are two main transport layer protocols - UDP, which is a connectionless and unreliable protocol, and TCP, which establishes connections and provides reliable data delivery.
3. TCP and UDP use port numbers along with IP addresses to uniquely identify processes. TCP also implements flow and error control to ensure reliable data transfer.
The document outlines Chapter 4 of a networking textbook. Chapter 4 covers the network layer, including network layer services, how routers work, routing algorithms, and implementations in the Internet. The key topics covered are virtual circuit versus datagram networks, the functions of routers including forwarding and routing, and routing algorithms like link state and distance vector.
SCTP is a transport layer protocol that combines features of UDP and TCP. It allows multi-streaming so data on blocked streams can still be delivered, supports multihoming to use multiple network interfaces for fault tolerance, and provides reliable and ordered delivery of data. Key SCTP features include a 4-way handshake to prevent DoS attacks, graceful shutdown, and congestion/flow control adapted from TCP to support multihoming. Data is sent in chunks identified by TSN, SI, and SSN numbers.
This document discusses various aspects of transport layer protocols in computer networks, including:
- Addressing processes using port numbers between 0-65,535
- The client-server model where clients use ephemeral ports over 1023 and servers use well-known ports
- Transport layer services like multiplexing, demultiplexing, flow control using buffers, error control using sequence numbers and acknowledgments, and congestion control
- Connection-oriented protocols like TCP provide reliable data delivery compared to connectionless protocols like UDP.
- Stop-and-wait, go-back-N, and selective-repeat protocols aim to increase efficiency over simple retransmission by allowing multiple outstanding packets.
TCP & UDP Streaming Comparison and a Study on DCCP & SCTP ProtocolsPeter SHIN
As a graduate student work, I have compared the performance between TCP and UDP media streaming with empirical results. Also, I have researched on different attempts on UDP to be more reliable, but why its progress has not been as fast as possible
The transport layer accepts data from the session layer, breaks it into packets, and delivers the packets to the network layer. It provides end-to-end communication and ensures reliable delivery of data. The network interface layer sends and receives TCP/IP packets on the network medium. It encompasses the data link and physical layers of the OSI model. TCP/IP is independent of the specific network technology.
Transport Layer Services : Multiplexing And DemultiplexingKeyur Vadodariya
This document discusses the transport layer of computer networks. It begins with introducing the group members and topic, which is the transport layer introduction, services, multiplexing and demultiplexing. Then it provides definitions of the transport layer, its functions and services. It describes how the transport layer provides process to process delivery, end-to-end connections, congestion control, data integrity, flow control, multiplexing and demultiplexing. It explains the differences between connectionless and connection-oriented multiplexing and demultiplexing. In the end, it lists some references.
The document discusses the differences between packets and frames, and provides details on the transport layer. It explains that the transport layer is responsible for process-to-process delivery and uses port numbers for addressing. Connection-oriented protocols like TCP use three-way handshaking for connection establishment and termination, and implement flow and error control using mechanisms like sliding windows. Connectionless protocols like UDP are simpler but unreliable, treating each packet independently.
The document summarizes key aspects of the transport layer. It discusses how the transport layer provides logical communication between application processes running on different hosts by abstracting physical network details. It then describes the services provided by the transport layer including connection-oriented and connectionless services. It also discusses topics like quality of service, transport service primitives, addressing, connection establishment and release, flow control, multiplexing, and crash recovery for the transport layer.
Design and implementation of low latency weighted round robin (ll wrr) schedu...ijwmn
Today’s wireless broadband networks are required to provide QoS guarantee as well as fairness to
different kinds of traffic. Recent wireless standards (such as LTE and WiMAX) have special provisions at
MAC layer for differentiating and scheduling data traffic for achieving QoS. The main focus of this paper is
concerned with high speed packet queuing/scheduling at central node such as base station (BS) or router to
handle network traffic. This paper proposes novel packet queuing scheme termed as Low Latency
Weighted Round Robin (LL-WRR) which is simple and effective amendment to weighted round robin (WRR)
for achieving low latency and improved fairness. Proposed LL-WRR queue scheduling scheme is
implemented in NS-2 considering IEEE 802.16 network [1] with real time video and Constant Bit Rate
(CBR) audio traffic connections. Simulation results show improvement obtained in latency and fairness
using LL-WRR. The proposed scheme introduces extra complexity of computing coefficient but its overall
impact is very small.
MANET Routing Protocols , a case studyRehan Hattab
L. Yi, Y. Zhai, Y. Wang, J. Yuan and I. You , Impacts of Internal Network Contexts on Performance of MANET Routing Protocols: a Case Study, Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing,2012.
UDP is a connectionless transport protocol that does not guarantee packet delivery or order. It is faster than TCP but does not ensure reliability. UDP packets have a header containing source and destination port numbers as well as length fields. The checksum field allows detecting errors but packets are not retransmitted if errors occur. UDP is suitable for real-time applications where speed is critical and packet loss can be tolerated.
The document contains a list of experiments related to computer networking. It includes 7 experiments covering topics like defining different types of LANs, WANs and MANs; describing network devices and topologies; implementing framing methods like bit stuffing, byte stuffing and character stuffing; and implementing routing algorithms such as simple redundancy check, cyclic redundancy check, checksum, and Hamming code. For each experiment, it provides details about the concepts and includes sample C code programs to demonstrate the techniques.
Optimization of Low-efficiency Traffic in OpenFlowSoftware Defined NetworksJose Saldana
This paper proposes a method for optimizing bandwidth usage in Software Defined Networks (SDNs) based on OpenFlow. Flows of small packets presenting a high overhead, as the ones generated by emerging services, can be identified by the SDN controller, in order to remove header fields that are common to any packet in the flow, only during their way through the SDN. At the same time, several packets can be multiplexed together in the same frame, thus reducing the number of sent frames. Four kinds of small-packet traffic flows are considered (VoIP, UDP and TCP-based online games, and ACKs from TCP flows). Both IPv4 and IPv6 are tested, and significant bandwidth savings (up to 68 % for IPv4 and 78 % for IPv6) can be obtained for the considered kinds of traffic.
Traffic Engineering in Software Defined Networking SDNijtsrd
The traditional single path routing can cause imbalanced link utilization and is not efficient for all traffic types such as long lived large flows. Moreover, it can lead to low network throughput and high network latency. Traffic engineering TE is a key solution to solve these problems of single path. The main purpose of TE is to optimize the network resource utilization and improve network performance by measuring and controlling network traffic. One of the TE approach for large flows is multipath routing which distribute traffic load among available multiple paths. However, most of multipath solutions do not classify traffic flows for example elephant or mice and do not concern the existing delays of routes. Therefore, to be intelligent multipath routing based on traffic types, we proposed three main folds 1 large flow detection approach by using sFlow analyzer in real time, 2 measuring end to end delays of available paths between source node and destination node where large flow occurred and 3 reroute the large flow to minimum round trip time delay path in order to improve network performance. Through experimental results, our proposed method gains over 30 77 throughput improvement over reactive forwarding application which is implemented in ONOS controller. Aung Htein Maw "Traffic Engineering in Software-Defined Networking (SDN)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26618.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-network/26618/traffic-engineering-in-software-defined-networking-sdn/aung-htein-maw
The document discusses the network layer and routing algorithms. It begins by defining the network layer and its responsibilities like routing packets across networks using logical addressing. It then discusses network layer design issues such as store-and-forward packet switching and services provided to the transport layer. Implementation of connectionless and connection-oriented services are explained along with a comparison of virtual-circuit and datagram networks. Finally, it covers routing algorithms like flooding and distance vector routing where routers maintain routing tables and exchange information with neighbors.
The document discusses network layer concepts including network layer design issues, routing algorithms, and protocols. It provides 3 key points:
1) The network layer is responsible for delivering packets between endpoints over multiple links using store-and-forward packet switching. It implements both connectionless and connection-oriented services for the transport layer.
2) Common routing algorithms discussed include shortest path algorithms like Dijkstra's algorithm, flooding, and distance vector routing. Flooding broadcasts all packets while distance vector uses the Bellman-Ford equation to iteratively calculate the shortest paths.
3) Protocols discussed include IPv4, IPv6, ARP, RARP, DHCP, and ICMP. Connectionless transmission uses datagrams while connection
Distributed gateway-based load balancing in software defined networkTELKOMNIKA JOURNAL
To achieve an internet with high availability and reliability, needs two or more data paths so the process for sending data can be faster. Load balancing is often plays a significant role for this technique to properly utilized every gateway in the network. This research, implemented load balancing in software defined network architecture using floodlight controller. Evaluation is done by measuring QoS (delay, bit rate, packet rate, packet success rate) while sending various traffics through the network such as UDP Flow, VoIP, and DNS. Performance of load balancer is work well, because the results after load balancing is better than before. Which is the value of delay after load balancing is decreased about 30-55% compared to before load balancing, also the values of bit rate, packet rate dan packet success rate after load balancing is increased about 10-30% compared to before load balancing.
Since there exist a system, which basically deal with PHY, MAC and Scheduler functionality of LTE, the new
simulation model supports for LTE RLC and PDCP protocol, together with EPC data plane features. This results in end to
end IP connectivity over LTE-EPC. For simulation we are using ns-3. In this paper, we provide an overview of the design
criteria and architecture of the proposed model.
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...IRJET Journal
This document discusses network routing and routing algorithms. It begins by defining routing as the process of determining the path that data packets will take from a source to a destination across a network. There are three main functions of routing: path determination, switching, and call setup. The document then discusses several common routing algorithm strategies, including greedy, dynamic programming, and divide-and-conquer approaches. It also describes specific routing algorithms like Dijkstra's algorithm, Bellman-Ford algorithm, and Floyd-Warshall algorithm. Finally, it discusses performance metrics for comparing routing algorithms, such as throughput, latency, hop count, bandwidth, and packet loss.
TCP and UDP are transport layer protocols that package and deliver data between applications. TCP provides reliable, ordered delivery through connection establishment and packet sequencing. UDP provides faster, unreliable datagram delivery without connections. Common applications using TCP include HTTP, FTP, and SMTP. Common UDP applications include DNS, DHCP, and streaming media.
The document discusses routing protocols used in internets and autonomous systems. It describes how distance vector routing protocols like RIP work by sharing routing tables between neighbors. It also explains link state routing protocols like OSPF, where each router shares information about connected links and all routers can independently calculate optimal routes. Finally, it outlines path vector routing and BGP, which is used for inter-domain routing between autonomous systems and considers routing policies.
A widely used TCP protocol is originally developed for wired networks. It has many variants to detect and control congestion in the network. However, Congestion control in all TCP variants does not show similar performance in MANET as in wired network because of the fault detection of congestion. In this paper, we do a performance comparison between TCP variants NEW RENO, SACK and Vegas in AODV and DSR reactive (On-Demand) routing protocols. Network traffic between nodes is provided by using File Transfer Protocol (FTP) application. Multiple scenarios are created and the average values of each performance parameter are used to evaluate the performance. The results show that TCP variants perform better in terms of throughput and Packet drop with DSR routing protocol compared with AODV routing protocol. TCP variants show a lower Jitter in AODV compared with DSR.
A COMPARISON OF CONGESTION CONTROL VARIANTS OF TCP IN REACTIVE ROUTING PROTOC...ijcsit
A widely used TCP protocol is originally developed for wired networks. It has many variants to detect and
control congestion in the network. However, Congestion control in all TCP variants does not show similar
performance in MANET as in wired network because of the fault detection of congestion. In this paper, we
do a performance comparison between TCP variants NEW RENO, SACK and Vegas in AODV and DSR
reactive (On-Demand) routing protocols. Network traffic between nodes is provided by using File Transfer
Protocol (FTP) application. Multiple scenarios are created and the average values of each performance
parameter are used to evaluate the performance. The results show that TCP variants perform better in
terms of throughput and Packet drop with DSR routing protocol compared with AODV routing protocol.
TCP variants show a lower Jitter in AODV compared with DSR.
A widely used TCP protocol is originally developed for wired networks. It has many variants to detect and control congestion in the network. However, Congestion control in all TCP variants does not show similar performance in MANET as in wired network because of the fault detection of congestion. In this paper, we do a performance comparison between TCP variants NEW RENO, SACK and Vegas in AODV and DSR reactive (On-Demand) routing protocols. Network traffic between nodes is provided by using File Transfer Protocol (FTP) application. Multiple scenarios are created and the average values of each performance parameter are used to evaluate the performance. The results show that TCP variants perform better in terms of throughput and Packet drop with DSR routing protocol compared with AODV routing protocol. TCP variants show a lower Jitter in AODV compared with DSR.
IRJET- Survey on Adaptive Routing AlgorithmsIRJET Journal
This document discusses several adaptive routing algorithms for wireless networks and optical networks. It provides 3 key points:
1) Adaptive routing algorithms dynamically change their routing decisions based on changes in network topology and traffic levels. They aim to optimize parameters like distance, number of hops, and estimated transmission time.
2) Several adaptive routing algorithms are described, including centralized and distributed algorithms, algorithms using the A-star and Dijkstra's algorithms, and fault-aware algorithms to route around failed nodes or links.
3) Improved dynamic routing algorithms for elastic optical networks are proposed that select paths based on the number of links or weights accounting for link usage and available spectrum. The algorithms aim to efficiently route requests while
This document discusses transport layer protocols. It begins by introducing the three main transport layer protocols in TCP/IP - UDP, TCP, and SCTP. It then focuses on UDP and TCP, explaining their packet formats, features, and how they provide different types of services. For UDP, it describes how it is a simple connectionless protocol suited for applications that require low latency. For TCP, it explains how it provides reliable, in-order byte streams using connection establishment and maintenance features like flow control, congestion control, and error recovery. The document contains examples and diagrams to illustrate these concepts.
The transport layer chapter discusses process-to-process delivery and the transport layer protocols TCP and UDP. TCP provides reliable, connection-oriented data transfer using sequencing, acknowledgements and retransmissions. UDP provides simpler, connectionless delivery without reliability. Well-known ports are assigned for standard services like DNS, HTTP, FTP. TCP uses sliding windows and congestion control to prevent overwhelming the receiver. Reliability and flow control are implemented end-to-end rather than just link-by-link.
1) The document analyzes how three variants of TCP (NewReno, Vegas, and Westwood) perform over three ad hoc routing protocols (DSDV, AODV, DSR) in static and mobile ad hoc network environments using network simulation.
2) Simulation results show that in mobile ad hoc networks with fewer nodes, NewReno over AODV has the lowest packet loss rate, while Vegas over DSDV and AODV performs best in both static and mobile networks.
3) Westwood over DSR also has low packet loss rates in both static and mobile environments.
2. has been designed to handle UDP packet sending and
receiving among IPTV server and clients.
II. IPTV MULTICAST SERVICE IN SDN/OPENFLOW
A. Proposed model
We propose an application of Multiflow model [5] as a
part of routing algorithm in Fig.1. We apply Prim’s and
Dijkstra’s algorithms to achieve minimum delay of UDP
packet delivery between IPTV server and clients. We then
compare the performance of Dijkstra’s and Prim’s algorithms
in our POX controller.
Server Client Network Equipments OF Controller
Forward IGMP Query
IGMP Query
IGMP Join
Flood IGMP Query
to all switches
Q
U
E
R
Y
J
O
I
N
Forward IGMP Join
Calculate route
Forward rules to each switch
Add rules into
Flow table
IGMP Leave
L
E
A
V
E
Forward IGMP Leave
Remove client depart
the group
Forward remove client
Delete rules depart
Flow table
Forward rules to each switch
Add rules into
Flow table
Fig. 1. Multiflow model [5]
The Multiflow model composes of three steps
1) IGMP query
The IPTV server sends IGMP query to Open vSwitch to
announce its service. The IGMP query packet is composed of
IP multicast group. When the Open vSwitch receives IGMP
query packet for the first time, it forwards the packet to the
POX controller, which calculates the route of that packet and
adds that route to the Open vSwitch’s flow table.
2) IGMP join
When the client receives IGMP query packet and wishes to
join the multicast group, it sends IGMP join packet to the
nearest Open vSwitch. The IGMP join packet is then
forwarded to the POX controller, where a user’s program
performs route calculation.
3) IGMP leave
When the client wishes to leave the multicast group, it
sends an IGMP leave packet to Open vSwitch, which will
forward the packet to the controller. The controller then
removes the multicast route to the client from the flow table.
TABLE 1. DIJKSTRA FUNCTION ALGORITHM
Algorithm 1 Dijkstra function
Input: R_G (set of Open vSwitches and port numbers)
S (initial Open vSwitch), SW (set of Open vSwitches)
Output: TREE (Dijkstra path)
1: let TREE be an empty dictionary
2: let Q be an empty list
3: for END is in R_G.keys():
4: if S is END : continue
5: else :
6: call Dijkstra function and return value to DIJ and ROT
7: let PART be an empty list
8: while 1 :
9: add END to the end of PATH
10: if END = S : break
11: add value of END in ROT to END
12: reverse the elements of PATH
13: add the number of elements in PATH to LEN
14: for L in range (LEN-1) :
15: add the value of position L in PATH to SW1
16: add the value of position L+1 in PATH to SW2
17: if SW2 is None : continue
18: else :
19: add the value of G[SW1][SW2] to PORT
20: add set of SW1,SW2,PORT to TREE
21: return TREE
TABLE 2. SHORTEST FUNCTION ALGORITHM
Algorithm 2 Shortest function
Input: G = (V,E), S (initial Open vSwitch), E (destination Open vSwitch)
Output: DIJ,ROT
1: let G be the graph of proposed topology that composes of V, pair of
nodes(Open vSwitch), and E, edge weight between 2 nodes
2: let N_W be the initial edge weight of node S, equal to {S,0}
3: let DIJ and ROT be an empty dictionary
4: for node v is in N_W :
5: let value of DIJ equal to N_W
6: if node v is node E :
7: break:
8: for node w is the value of node v in G :
9: find weight of (vi,wi) = DIJ[v] + weight of (v,w) in G
10: if node wi is already in DIJ :
11: if weight of (vi,wi) < the value of node w in DIJ :
12: show Value Error
13: elif node wi is not already in N_W or
weight of (vi,wi) < value of node w in N_W :
14: add set of node wi and weight of (vi,wi) to N_W
15: add set of node vi and node wi to ROT
16: return (DIJ,ROT)
B. Routing algorithms
This paper proposes the use of Dijkstra’s and Prim’s
algorithms to calculate shortest path tree of IPTV network.
While Dijkstra’s algorithm finds the shortest paths of the
chosen node to every other nodes resulting in the minimum
distance tree from the chosen node, Prim’s algorithm finds the
shortest paths among all nodes, represented as the minimum
spanning tree.
3. When the POX controller receives IGMP join packet for the
first time, it calculates using the assigned routing algorithm.
1) Dijkstra’s algorithm
There are two functions, Dijkstra and Shortest functions, in
Dijkstra’s algorithm code, shown in Table 1 and 2,
respectively. Dijkstra function defines the source and
destination Open vSwitch pair, which is input into the Shortest
function. The Shortest function then calculates the shortest
path between the initial and destination Open vSwitches.
Dijkstra function collects the shortest paths of all Open
vSwitches to create Dijkstra path.
2) Prim’s algorithm
We design Prim function to calculate Prim’s algorithm,
shown in Table 3. The operation of Prim function relies on the
heap function [6] to choose the minimum edge weight of the
pair of Open vSwitches. Prim function collects the minimum
edge weight of each edge to create Prim path.
TABLE 3. PRIM FUNCTION ALGORITHM
Algorithm 3 Prim function
Input: G = (V,E), VER
Output: MST
1: let G be the graph of proposed topology that composes of V, pair of
nodes(Open vSwitch), and E, edge weight between 2 nodes
2: let VER be the list of Open vSwitches
3: let ADJ be an empty dictionary
4: for node n1, node n2, edge weight c in G :
5: add c, n1, n2 be the value of n1 to ADJ
6: add c, n2, n1 be the value of n2 to ADJ
7: let MST be an empty list
8: add the value of VER[0] to USED
9: add the value of ADJ[0] to EDG_U
10: convert EDG_U to heap function
11: while EDG_U :
12: return the smallest value of EDG_U to COT, N1, N2 and remove it
13: if N2 is not already in USED :
14: add N2 to USED
15: add COT, N1, N2 to the end of MST
16: for E in ADJ[2] :
17: if value of E[2] is not already in USED :
18: push E onto EDG_U
19: return MST
III. RESULT
A. Experiment Setup
The software in the experiment are shown in Table 4
TABLE 4. SOFTWARES AND VERSIONS
Software Version
Mininet 2.2
OpenFlow 1.0
Open vSwitch 1.4.6
POX 3.0
In the experiment, Mininet, a network emulator, is used to
create virtual hosts, switches, and controllers. We use POX
controller, which is programmed in Python.
Fig.2 and 3 illustrate the experimental network topology,
which consists of two IPTV servers (h1,h2), four clients (h3-
h6), twelve Open vSwitches (s1-s12) and an OpenFlow
controller (c0). The POX controller connects with all Open
vSwitches.
This experiment measures transmission time between
IPTV server 1 to each client. The POX controller can run one
algorithm at a time. The method follows these steps below:
Step 1: IPTV server 1 announces its service by sending
IGMP query to adjacent Open vSwitches. The POX controller
calculates the route of IGMP query, which is shown in Fig.2.
Step 2: All clients send IGMP join packets to join the
multicast group of IPTV server 1. The POX controller
calculates routes and adds a flow entry to each Open vSwitch.
The routes calculated by Dijkstra’s and Prim’s algorithms are
shown in Fig.3.
Step 3: IPTV server 1 sends UDP packet to each client. We
use Wireshark to capture the transmission time between IPTV
server and client.
Fig. 2. IGMP packet routes
Fig. 3. IPTV packet routes
Dijkstra’s algorithm computes the minimum distance from
the server to each client and returns a minimum distance tree
from the server. Prim’s algorithm returns a minimum
spanning, a tree which connects all nodes and keeps minimum
overall distance. From Fig.3, the routes from IPTV server 1 to
4. client 2 are different. The number of hops on the route
obtained from Dijkstra’s algorithm is only 4 hops whereas that
obtained from Prim’s algorithm is 6 hops
(a)
(b)
(c)
(d)
Fig. 4. The time of client sends IGMP join and receives the first packet:
(a) server 1 to client 1 , (b) server 1 to client 2,
(c) server 1 to client 3, (d) server 1 to client 4.
Fig. 5. The time of route calculation.
B. Result and discussion
The transmission time between IPTV server 1 to each
client shown in Fig.4. The X-axis is the number of the
experiments. We experiment by sending the joint/receive
packet from IPTV server 1 to clients. For each client, we send
100 joint/receive packets. The Y-axis is the transmission time
which composes of the time of route calculation and time of
UDP packet delivery.
The transmission time of Fig.4 (b) shows the result of
packet transmission time from IPTV server 1 to client 2. The
transmission time values of Prim’s algorithm are higher than
Dijkstra’s algorithm around 4.9 milliseconds. The
transmission times of client 4 conform to the number of hops
in Fig.3 that Prim’s algorithm has the number of hops more
than Dijkstra’s algorithm. In other case, the results show the
same routes obtained from Prim and Dijkstra but little
different in transmission time. This is because of different
route calculation time of two algorithms. The route calculation
time of two algorithms are also shown in Fig. 5. We
performed experiments by sending joint packet 500 times. The
average route calculation of Dijkstra’s algorithm is 1.53
milliseconds and the average route calculation of Prim’s
algorithm is 0.37 milliseconds. Thus, the route calculation
values of 2 algorithms are different around 1.16 milliseconds.
IV. CONCLUSION AND FUTURE WORK
This paper proposes an application of SDN/OpenFlow with
IPTV multicasting application. In order to obtain an efficient
IPTV service routing, Dijkstra’s and Prim’s algorithms are
selected to comparatively calculate the minimum total edge
weight. Our experiments compare the transmission time of the
first joint/receive packet of client when using Dijkstra’s and
Prim’s algorithms. We define the edge weight as the distance
between two adjacent nodes. We can implement Dijkstra’s and
Prim’s algorithm in POX controller to IPTV multicast service.
This paper is the starting point of our IPTV experiment on
SDN. The future experiment will involve a larger network
topology and more IPTV servers/clients to test the limit of the
POX controller in calculating routes. Transmission time will
be analyzed and PSNR value will be used to determine the
quality of videos sent from the IPTV server.
5. ACKNOWLEDGMENT
This research has been supported by the Special Task
Force for Activating Research (STAR) Funding in Wireless
Network and Future Internet Research Group, Chulalongkorn
University, Thailand, and is based on the collaborations
of OF@TIEN project.
REFERENCES
[1] C. C. Wen, C. S. Wu and M. T. Yang, “Hybrid Tree Based Explicit
Routed Multicast for QoS Supported IPTV Service,” Global
Telecommunications Conference, GLOBECOM 2009, IEEE, pp. 1-6,
Nov-Dec 2009.
[2] J. Ko, S. Park and E. Lee, “An Extended PIM-SM for Efficient Data
Transmission in IPTV Services,” Proceeddings of 2010 2nd
International
Conference on Network Infrastructure and Digital Content, IC-NIDC
2010, pp. 115-119, September 2010.
[3] L. Prete, F. Farina, M. Campanella and A. Biancini, “Energy efficient
minimum spanning tree in OpenFlow networks,” European Workshop
on Software Defined Networking, EWSDN, pp.36-41, October 2012.
[4] P. McDonagh, C. Olariu, A. Hava and C. Thorpe, “Enabling IPTV
Service Assurance using OpenFlow,” 27th International Conference on
Advanced Information Networking and Applications Workshops,
WAINA, pp.1456-1460, March 2013.
[5] L. Bondan, L. F. Muller and M. Kist, “Multiflow: Multicast clean-slate
with anticipated route calculation on OpenFlow programmable
networks,” Journal of Applied Computing Research, vol.2, n.2, pp.68-
74, Jul-Dec 2012.
[6] Heap queue algorithm [Online]. Avalible from
https://docs.python.org/2/library/heapq.html