九九热最新网址,777奇米四色米奇影院在线播放,国产精品18久久久久久久久久,中文有码视频,亚洲一区在线免费观看,国产91精品在线,婷婷丁香六月天

計(jì)算機(jī)網(wǎng)絡(luò)第五版(英文版)(6)

上傳人:a**** 文檔編號(hào):243065047 上傳時(shí)間:2024-09-14 格式:PPT 頁(yè)數(shù):81 大?。?.04MB
收藏 版權(quán)申訴 舉報(bào) 下載
計(jì)算機(jī)網(wǎng)絡(luò)第五版(英文版)(6)_第1頁(yè)
第1頁(yè) / 共81頁(yè)
計(jì)算機(jī)網(wǎng)絡(luò)第五版(英文版)(6)_第2頁(yè)
第2頁(yè) / 共81頁(yè)
計(jì)算機(jī)網(wǎng)絡(luò)第五版(英文版)(6)_第3頁(yè)
第3頁(yè) / 共81頁(yè)

下載文檔到電腦,查找使用更方便

20 積分

下載資源

還剩頁(yè)未讀,繼續(xù)閱讀

資源描述:

《計(jì)算機(jī)網(wǎng)絡(luò)第五版(英文版)(6)》由會(huì)員分享,可在線閱讀,更多相關(guān)《計(jì)算機(jī)網(wǎng)絡(luò)第五版(英文版)(6)(81頁(yè)珍藏版)》請(qǐng)?jiān)谘b配圖網(wǎng)上搜索。

1、單擊此處編輯母版標(biāo)題樣式,單擊此處編輯母版文本樣式,第二級(jí),第三級(jí),第四級(jí),第五級(jí),*,The Transport Layer,Chapter 6,6.1 The Transport Service,6.1.1Services Provided to the Upper Layers (1),Transport layer adds reliability to the network layer,Offers connectionless (e.g., UDP) and connection-oriented (e.g, TCP) service to applications,6.1.1S

2、ervices Provided to the Upper Layers (2),Transport layer sends,segments,in packets (in frames),Segment,Segment,6.1.2 Transport Service Primitives (1),Primitives that applications might call to transport data for a simple connection-oriented service,Client calls CONNECT, SEND, RECEIVE, DISCONNECT,Cli

3、ent calls CONNECT, SEND, RECEIVE, DISCONNECT,Segment,6.1.2 Transport Service Primitives (2),State diagram for a simple connection-oriented service,Solid lines (right) show client state sequence,Dashed lines (left) show server state sequence,Transitions in italics are due to segment arrivals.,5.1.3 B

4、erkeley Sockets,Very widely used primitives started with TCP on UNIX,Notion of “sockets as transport endpoints,Like simple set plus SOCKET, BIND, and ACCEPT,6.2 Elements of Transport Protocols,6.2.1 Addressing (1),Transport layer adds TSAPs,Multiple clients and servers can run on a host with a singl

5、e network (IP) address,TSAPs are ports for TCP/UDP,Well-known TSAPs,6.2.1 Addressing (2),How a user process in host 1 establishes a connection with a mail,server in host 2 via a process server,Process server,that acts as a proxy for less heavily used servers,6.2.2 Connection Establishment (1),Key pr

6、oblem is to ensure reliability even though packets may be lost, corrupted,delayed, and,duplicated,Dont treat an old or duplicate packet as new,(Use ARQ and checksums for loss/corruption),Approach,Dont reuse sequence numbers within twice the,MSL,(,Maximum Segment Lifetime,) of 2T=240 secs,Three-way h

7、andshake for establishing connection,6.2.2 Connection Establishment (2),Use a sequence number space large enough that it will not wrap, even when sending at full rate,Clock (high bits) advances & keeps state over crash,For a clock rate of,C,and a sequence number space of size,S, we must have,S/CT,Ne

8、ed seq. number not to wrap within T seconds,Need seq. number not to climb too slowly for too long,6.2.2 Connection Establishment (3),Three-way handshake used for initial packet,Since no state from previous connection,Both hosts contribute fresh seq. numbers,CR = Connect Request,6.2.2 Connection Esta

9、blishment (4),Three-way handshake protects against odd cases,Duplicate CR. Spurious ACK does not connect,Duplicate CR and DATA. Same plus DATA will be rejected (wrong ACK).,To avoid an attacker to predict the next initial sequence number,pseudorandom initial sequence numbers,are used for connections

10、 in practice.,a),b),Problems: 4,6.2.3 Connection Release (1),Key problem is to ensure reliability while releasing,Asymmetric release (when one side breaks connection) is abrupt and may lose data,X,6.2.3 Connection Release (2),Symmetric release (both sides agree to release) cant be handled solely by

11、the transport layer,Two-army problem shows pitfall of agreement,Attack?,Attack?,6.2.3 Connection Release (3),Normal release sequence, initiated by transport user on Host 1,DR=Disconnect Request,Both DRs are ACKed by the other side,6.2.3 Connection Release (4),Error cases are handled with timer and r

12、etransmission,Final ACK lost, Host 2 times out,Lost DR causes retransmissions,Extreme: Many lost DRs cause both hosts to timeout,6.2.4 Error Control and Flow Control (1),Foundation for error control is a sliding window (from Link layer) with checksums and retransmissions,Flow control,manages bufferi

13、ng at sender/receiver,Issue is that data goes to/from the network and applications at different times,Window tells sender available buffering at receiver,Makes a variable-size sliding window,The sender and receiver need to,dynamically adjust,their buffer allocations,6.2.4 Error Control and Flow Cont

14、rol (2),Different buffer strategies trade efficiency / complexity,a) Chained fixed-size buffers,b) Chained variable-size buffers,c) One large circular buffer,6.2.4 Error Control and Flow Control (3),Flow control example: As data is limited by Bs buffer,0,1,2,3,0,1,2,3,0,1,2,3,0,1,2,3,1,2,3,4,1,2,3,4

15、,1,2,3,4,1,2,3,4,1,2,3,4,2,3,4,5,3,4,5,6,3,4,5,6,3,4,5,6,3,4,5,6,7,8,9,10,Bs Buffer,6.2.4 Error Control and Flow Control (4),The carrying capacity of the network limits the maximum flow,If the network can handle,c,segments/sec and the round-trip time is,r, the senders window should be,cr,The window

16、size should be adjusted frequently, to track changes in the carrying capacity,6.2.5 Multiplexing,Kinds of transport / network sharing that can occur,Multiplexing: connections share a network address,Inverse multiplexing: addresses share a connection,Multiplexing,Inverse Multiplexing,6.2.6 Crash Reco

17、very,Application needs to help recovering from a crash,Transport can fail since A(ck) / W(rite) not atomic,Write Short reports (6-1),1. There is crash recovery in connection between ATM and remote data base in a bank. Design a solution which is beneficial to costumer or the bank. Is there a fair sol

18、ution for both parts? If yes, design the solution, if no, give your reason.,6.3 Congestion Control,Two layers are responsible for congestion control,Transport layer, controls the offered load,Network layer, experiences congestion,Delay begins to rise sharply when congestion sets in,Goodput rises mor

19、e slowly than load when congestion sets in,6.3.1 Desirable Bandwidth Allocation (1),Efficient use of bandwidth gives high goodput, low delay,The load with the,highest power,represents an efficient load for the transport entity to place on the network.,Bottleneck link,6.3.1 Desirable Bandwidth Alloca

20、tion (2),Fair use gives bandwidth to all flows (no starvation),This is,max-min fair, which maximizes the minimum bandwidth flows get, then lets flows go ahead when they are able to use excess bandwidth.,Max-min fairness gives equal shares of bottleneck,6.3.1 Desirable Bandwidth Allocation (3),We wan

21、t bandwidth levels to converge quickly when traffic patterns change,Flow 1 slows quickly when Flow 2 starts,Flow 1 speeds up quickly when Flow 2 stops,6.3.2 Regulating the Sending Rate (1),Sender may need to slow down for different reasons,Flow control, when the receiver is not fast enough left,Cong

22、estion, when the network is not fast enough right,Our focus is dealing with this problem congestion,A fast network feeding a low-capacity receiver, flow control is needed,A slow network feeding a high-capacity receiver, congestion control is needed,6.3.2 Regulating the Sending Rate (3),Different con

23、gestion signals the network may use to tell the transport endpoint to slow down (or speed up),Except the following list, Windows includes Compound TCP that uses both packet loss and delay as feedback signals.,6.3.2 Regulating the Sending Rate (4),If two flows increase/decrease their bandwidth in the

24、 same way when the network signals free/busy they will not converge to a fair allocation,+/ percentage,+ / constant,6.3.2 Regulating the Sending Rate (5),The,AIMD,(,Additive Increase Multiplicative Decrease,) control law does converge to a fair and efficient point!,TCP uses AIMD for this reason,User

25、 1s bandwidth,User 2s bandwidth,6.3.3 Wireless Issues,Wireless links lose packets due to transmission errors,Do not want to confuse this loss with congestion,Or connection will run slowly over wireless links!,Masking strategy,Wireless links use ARQ, which masks errors,Discussing Topics (6-1),1. Summ

26、arize a transport protocol that is designed for wireless links, especially a wireless mesh network.,6.4 The Internet Transport Protocols: UDP,6.4.1 Introduction to UDP (1),UDP (User Datagram Protocol) is a shim over IP,Header has ports (TSAPs), length and checksum,6.4.1 Introduction to UDP (2),Check

27、sum covers UDP segment and IP pseudoheader,Fields that change in the network are zeroed out,Provides an end-to-end delivery check,The UDP checksum operation is mandatory with IPv6 for all packets,6.4.2 UDP Header Compression Using 6LoWPAN (1),UDP headers using LOWPAN_NHC,The UDP compression format,B

28、its 0 through 4 represent the NHC ID and 11110 indicates the specific UDP header compression encoding,C: Checksum,1: All 16 bits of Checksum are elided.,P: Ports,11: First 12 bits of both Source Port and Destination Port are 0xf0b and elided. The remaining 4 bits for each are carried in-line,The UDP

29、 Length field MUST always be elided and is inferred from lower layers using the 6LoWPAN Fragmentation header or the IEEE 802.15.4 header.,6.4.2 UDP Header Compression Using 6LoWPAN (2),Compressing UDP Ports,Allows a particular range of ports number (0xf0b0 to 0xf0bf) to be compressed down to 4 bits,

30、Should avoid using those ports as dynamic ports whenever possible,Compressing UDP Checksum,A compressor in the source transport endpoint MAY elide the UDP Checksum if it is authorized by the upper layer.,A decompressor that expands a 6LoWPAN packet with the C bit set MUST compute the UDP Checksum on

31、 behalf of the source node and place that value in the restored UDP header,6.4.3 RPC (Remote Procedure Call),RPC connects applications over the network with the familiar abstraction of procedure calls,Stubs package parameters/results into a message,UDP with retransmissions is a low-latency transport

32、,6.4.4 Real-Time Transport (1),RTP (Real-time Transport Protocol) provides support for sending real-time media over UDP,Often implemented as part of the application,6.4.4 Real-Time Transport (2),RTP header contains fields to describe the type of media and synchronize it across multiple streams,RTCP

33、sister protocol helps with management tasks,6.4.4 Real-Time Transport (3),Buffer at receiver is used to delay packets and absorb jitter so that streaming media is played out smoothly,6.4.4 Real-Time Transport (4),High jitter, or more variation in delay, requires a larger playout buffer to avoid play

34、out misses,Propagation delay does not affect buffer size,Problems: 17, 20,6.5 The Internet Transport Protocols: TCP,6.5.1 The TCP Service Model (1),TCP provides applications with a reliable byte stream between processes; it is the workhorse of the Internet,Popular servers run on well-known ports,6.5

35、.1 The TCP Service Model (2),Applications using TCP see only the byte stream right and not the segments left sent as separate IP packet,s,6.5.2 The TCP Segment Header,TCP header includes addressing (ports), sliding window (seq. / ack. number), flow control (window), error control (checksum) and more

36、.,Problems: 18,6.5.3 TCP Connection Establishment,TCP sets up connections with the three-way handshake,Release is symmetric, also as described before,6.5.4 TCP Connection State Modeling (1),The TCP connection finite state machine has more states than our simple example from earlier.,6.5.4 TCP Connec

37、tion State Modeling (2),Solid line is the normal path for a client.,Dashed line is the normal path for a server.,Light lines are unusual events.,Transitions are labeled by the cause and action, separated by a slash.,6.5.5 TCP Sliding Window (1),TCP adds flow control to the sliding window as before,A

38、CK + WIN is the senders limit,6.5.5 TCP Sliding Window (2),Need to add special cases to avoid unwanted behavior,E.g., silly window syndrome below,6.5.6 TCP Timer Management,TCP estimates retransmit timer from segment RTTs,Tracks both average and variance (for Internet case),Timeout is set to average

39、 plus 4 x variance,6.5.7 TCP Congestion Control (1),TCP uses AIMD with loss signal to control congestion,Implemented as a congestion window (cwnd) for the number of segments that may be in the network,Uses several mechanisms that work together,6.5.7 TCP Congestion Control (2),Congestion window contr

40、ols the sending rate,Rate is cwnd / RTT; window can stop sender quickly,ACK clock (regular receipt of ACKs) paces traffic and smoothes out sender bursts,6.5.7 TCP Congestion Control (3),Slow start grows congestion window exponentially,Doubles every RTT while keeping ACK clock going,6.5.7 TCP Congest

41、ion Control (4),Additive increase grows cwnd slowly,Adds 1 every RTT,Keeps ACK clock,6.5.7 TCP Congestion Control (5),Slow start followed by additive increase (TCP Tahoe),Threshold is half of previous loss cwnd,6.5.7 TCP Congestion Control (6),With fast recovery, we get the classic sawtooth (TCP Ren

42、o),Retransmit lost packet after 3 duplicate ACKs,New packet for each dup. ACK until loss is repaired,6.5.7 TCP Congestion Control (7),SACK (Selective ACKs) extend ACKs with a vector to describe received segments and hence losses,Allows for more accurate retransmissions / recovery,Problems: 25, 26, 2

43、7, 28, 30,Discussing Topics (6-2),2. Problems: 38, 39, 40,6.5.8 SSL,The Secure Sockets Layer (1),TLS,(Transport Layer Security) is the IETF version,6.5.8 SSL,The Secure Sockets Layer (2),Phases in SSL V3 connection establishment (simplified),Only the client (Alice) authenticates the server (Bob),Ses

44、sion key computed on both sides (E,B, R,A, R,B,),6.5.8 SSL,The Secure Sockets Layer (3),Data transmission using SSL. Authentication and encryption for a connection use the session key,6.6 Performance Issues,6.6.1 Performance Problems,Unexpected loads often interact with protocols to cause performanc

45、e problems,Need to find the situations and improve the protocols,Examples,Broadcast storm: one broadcast triggers another,Synchronization: a building of computers all contact the DHCP server together after a power failure,Tiny packets: some situations can cause TCP to send many small packets instead

46、 of few large ones,6.6.2 Measuring Network Performance,Measurement is the key to understanding performance but has its own pitfalls.,Example pitfalls:,Caching: fetching Web pages will give surprisingly fast results if they are unexpectedly cached,Timing: clocks may over/underestimate fast events,Int

47、erference: there may be competing workloads,6.6.3 Host Design for Fast Networks,Poor host software can greatly slow down networks.,Rules of thumb for fast host software:,Host speed more important than network speed,Reduce packet count to reduce overhead,Minimize data touching,Minimize context switch

48、es,Avoiding congestion is better than recovering from it,Avoid timeouts,6.6.4 Fast Segment Processing (1),Speed up the common case with a fast path pink,Handles packets with expected header; OK for others to run slowly,6.6.4 Fast Segment Processing (2),Header fields are often the same from one packe

49、t to the next for a flow; copy/check them to speed up processing,6.6.5 Header Compression,Overhead can be very large for small packets,40 bytes of header for RTP/UDP/IP VoIP packet,Problematic for slow links, especially wireless,Header compression mitigates this problem,Runs between Link and Network

50、 layer,Omits fields that dont change or change predictably,40 byte TCP/IP header 3 bytes of information,Gives simple high-layer headers and efficient links,6.6.7 Protocols for “Long Fat Networks (1),Networks with high bandwidth (“Fat) and high delay (“Long) can store much information inside the netw

51、ork,Requires protocols with ample buffering and few RTTs, rather than reducing the bits on the wire,6.6.7 Protocols for “Long Fat Networks (2),You can buy more bandwidth but not lower delay,Need to shift ends (e.g., into cloud) to lower further,Problems: 31, 32, 33, 34, 35, 36, 37,6.7 Delay Tolerant

52、 Networking,DTNs (Delay Tolerant Networks) store messages inside the network until they can be delivered,6.7.1DTN Architecture (1),Messages called bundles are stored at DTN nodes while waiting for an intermittent link to become a contact,Bundles might wait hours, not milliseconds in routers,May be n

53、o working end-to-end path at any time,6.7.1 DTN Architecture (2),Example DTN connecting a satellite to a collection point,6.7.2 Bundle Protocol (1),The Bundle protocol uses TCP or other transports and provides a DTN service to applications,6.7.2 Bundle Protocol (2),Features of the bundle message format,Dest./source add high-level addresses (not port/IP),Custody transfer shifts delivery responsibility,Dictionary provides compression for efficiency,End,Chapter 6,

展開閱讀全文
溫馨提示:
1: 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
2: 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
3.本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
5. 裝配圖網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

相關(guān)資源

更多
正為您匹配相似的精品文檔
關(guān)于我們 - 網(wǎng)站聲明 - 網(wǎng)站地圖 - 資源地圖 - 友情鏈接 - 網(wǎng)站客服 - 聯(lián)系我們

copyright@ 2023-2025  zhuangpeitu.com 裝配圖網(wǎng)版權(quán)所有   聯(lián)系電話:18123376007

備案號(hào):ICP2024067431號(hào)-1 川公網(wǎng)安備51140202000466號(hào)


本站為文檔C2C交易模式,即用戶上傳的文檔直接被用戶下載,本站只是中間服務(wù)平臺(tái),本站所有文檔下載所得的收益歸上傳人(含作者)所有。裝配圖網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)上載內(nèi)容本身不做任何修改或編輯。若文檔所含內(nèi)容侵犯了您的版權(quán)或隱私,請(qǐng)立即通知裝配圖網(wǎng),我們立即給予刪除!