3: Transport Layer 3b-1 TCP: Overview RFCs: 793, 1122, 1323, 2018, 2581 full duplex data: bi-directional data flow in same connection MSS: maximum segment size(512 to 1500 app data) connection-oriented: handshaking (exchange of control msgs) init’s sender, receiver state before data exchange flow controlled: sender will not overwhelm receiver point-to-point: one sender, one receiver reliable, in-order byte steam: no “message boundaries” pipelined: TCP congestion and flow control set window size send & receive buffers socket door TCP send bu ffer TCP re ce ive buffer socket door segm ent ap plica tio n w rite s d ata ap plica tion rea d s d ata
full duplex data: bi-directional data flow in same connection MSS: maximum segment size(512 to 1500 app data) connection-oriented: handshaking (exchange of control msgs) init’s sender, receiver state before data exchange flow controlled: sender will not overwhelm receiver. point-to-point: - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
3: Transport Layer 3b-1
TCP: Overview RFCs: 793, 1122, 1323, 2018, 2581
full duplex data: bi-directional data flow
in same connection MSS: maximum segment
size(512 to 1500 app data)
connection-oriented: handshaking (exchange
of control msgs) init’s sender, receiver state before data exchange
flow controlled: sender will not
overwhelm receiver
point-to-point: one sender, one
receiver
reliable, in-order byte steam: no “message
boundaries”
pipelined: TCP congestion and flow
control set window size
send & receive bufferssocketdoor
T C Psend buffer
T C Preceive buffer
socketdoor
segm ent
applicationwrites data
applicationreads data
3: Transport Layer 3b-2
TCP segment structure
source port # dest port #
32 bits
applicationdata
(variable length)
sequence number
acknowledgement numberrcvr window size
ptr urgent datachecksum
FSRPAUheadlen
notused
Options (variable length)
URG: urgent data (generally not used)
ACK: ACK #valid
PSH: push data now(generally not used)
RST, SYN, FIN:connection estab(setup, teardown
commands)
# bytes rcvr willingto accept
countingby bytes of data(not segments!)
Internetchecksum
(as in UDP)
3: Transport Layer 3b-3
TCP Header Fields
Options generally not there so 20-byte header is common
rcvr window size is used for FLOW CONTROL by the receiver
RST, SYN and FIN: connection mgmt PSH: Data is to be pushed to upper
layer immediately (NOT USED) URG and ptr to urgent data fields are
also not used commonly
3: Transport Layer 3b-4
TCP seq. #’s and ACKsSeq. #’s:
byte stream “number” of first byte in segment’s data
ACKs: seq # of next byte
expected from other side
cumulative ACKQ: how receiver handles
out-of-order segments A: TCP spec doesn’t
say, - up to implementor
Host A Host B
Seq=42, ACK=79, data = ‘C’
Seq=79, ACK=43, data = ‘C’
Seq=43, ACK=80
Usertypes
‘C’
host ACKsreceipt
of echoed‘C’
host ACKsreceipt of
‘C’, echoesback ‘C’
timesimple telnet scenario
3: Transport Layer 3b-5
TCP: reliable data transfer
simplified sender, assuming
waitfor
event
waitfor
event
event: data received from application above
event: timer timeout for segment with seq # y
event: ACK received,with ACK # y
create, send segment
retransmit segment
ACK processing
•one way data transfer•no flow, congestion control
3: Transport Layer 3b-6
TCP: reliable data transfer
00 sendbase = initial_sequence number 01 nextseqnum = initial_sequence number 0203 loop (forever) { 04 switch(event) 05 event: data received from application above 06 create TCP segment with sequence number nextseqnum 07 start timer for segment nextseqnum 08 pass segment to IP 09 nextseqnum = nextseqnum + length(data) 10 event: timer timeout for segment with sequence number y 11 retransmit segment with sequence number y 12 compue new timeout interval for segment y 13 restart timer for sequence number y 14 event: ACK received, with ACK field value of y 15 if (y > sendbase) { /* cumulative ACK of all data up to y */ 16 cancel all timers for segments with sequence numbers < y 17 sendbase = y 18 } 19 else { /* a duplicate ACK for already ACKed segment */ 20 increment number of duplicate ACKs received for y 21 if (number of duplicate ACKS received for y == 3) { 22 /* TCP fast retransmit */ 23 resend segment with sequence number y 24 restart timer for segment y 25 } 26 } /* end of loop forever */
SimplifiedTCPsender
3: Transport Layer 3b-7
TCP ACK generation [RFC 1122, RFC 2581]
Event
in-order segment arrival, no gaps,everything else already ACKed
in-order segment arrival, no gaps,one delayed ACK pending
Recall: TCP sender, receiver establish “connection” before exchanging data segments
initialize TCP variables: seq. #s buffers, flow control info
(e.g. RcvWindow) client: connection initiator Socket clientSocket = new
Socket("hostname","port
number"); server: contacted by client Socket connectionSocket =
welcomeSocket.accept();
Three way handshake:
Step 1: client end system sends TCP SYN control segment to server specifies initial seq #
Step 2: server end system receives SYN, replies with SYNACK control segment
ACKs received SYN allocates buffers specifies server-> receiver
initial seq. # Step3: client sends SYN=0
and ACK=server# plus 1
3: Transport Layer 3b-14
DDOS Attacks onTCP servers
Distributed denial of service attacks take advantage of the fact that the server allocates resources in step 2.
The DDOS attack uses some third party machines that are vulnerable to distribute clients
These clients perform IP spoofing and launch several TCP connection requests that remain incomplete and do not perform step 3.
Since the server allocates resources for each one, it runs out of memory and denies service to genuine clients
3: Transport Layer 3b-15
TCP Connection Management (cont.)
Closing a connection:
client closes socket: clientSocket.close();
Step 1: client end system sends TCP FIN control segment to server
Step 2: server receives FIN, replies with ACK. Closes connection, sends FIN.
client
FIN
server
ACK
ACK
FIN
close
close
closed
tim
ed w
ait
3: Transport Layer 3b-16
TCP Connection Management (cont.)
Step 3: client receives FIN, replies with ACK.
Enters “timed wait” - will respond with ACK to received FINs
Step 4: server, receives ACK. Connection closed.
Note: with small modification, can handle simultaneous FINs.
client
FIN
server
ACK
ACK
FIN
closing
closing
closed
tim
ed w
ait
closed
3: Transport Layer 3b-17
TCP Connection Management (cont)
TCP clientlifecycle
TCP serverlifecycle
3: Transport Layer 3b-18
Principles of Congestion Control
Congestion: informally: “traffic in the network has
exceeded the capacity” Think about reducing the lanes from 3 to 2 (or
2 to 1) due to construction in one lane of a highway
different from flow control! manifestations:
lost packets (buffer overflow at routers) long delays (queuing in router buffers)
a top-10 problem!
3: Transport Layer 3b-19
Causes/costs of congestion: scenario 1
two senders, two receivers
one router, infinite buffers
no retransmission
large delays when congested
maximum achievable throughput
3: Transport Layer 3b-20
Causes/costs of congestion: scenario 2
one router, finite buffers sender retransmission of lost packet
3: Transport Layer 3b-21
Causes/costs of congestion: scenario 2 always: (goodput)
“perfect” retransmission only when loss:
retransmission of delayed (not lost) packet makes
larger (than perfect case) for same
in
out
=
in
out
>
in
out
“costs” of congestion: more work (retrans) for given “goodput” unneeded retransmissions: link carries multiple copies of pkt
3: Transport Layer 3b-22
Causes/costs of congestion: scenario 3 four senders multihop paths timeout/retransmit
in
Q: what happens as and increase ?
in
3: Transport Layer 3b-23
Causes/costs of congestion: scenario 3
Another “cost” of congestion: when packet dropped, any “upstream transmission capacity
used for that packet was wasted!
3: Transport Layer 3b-24
Revision
If the window size at the sender end is 16, how long should be the sequence number (in bits) to avoid duplicate packet processing?
How is timeout calculated? Does it change or stay the same?
DDOS attacks stop on step 1 of handshake (T/F)
What does the sender do when it receives rcvrwindow=0?
(Use Java applet in the online book)
What is
How does goodput relate to original data?
Why does the delay increase when operating near capacity?
in
3: Transport Layer 3b-25
Congestion Scenarios
Previous lecture discussed three cases CASE 1: The router in the middle has infinite
buffer capacity. The goodput (or throughput) never exceeds C/2 where router output link can handle C bytes/sec. Delay becomes infinite as offered load exceeds C/2
CASE II: Transport layer is allowed retransmissions. The router is assumed to have finite buffer. This will cause dropped packets and delayed packets with unneeded retransmissions
3: Transport Layer 3b-26
Revision
Case III: In a multi-hop path, traffic generated by two different hosts COMPETES to get service from a router. If the traffic from a host has passed through some routers before reaching here, its rate is already limited to the shared capacity of the link(s) used. So the traffic from a directly connected host will get most of the service resulting in wasted effort
3: Transport Layer 3b-27
Approaches towards congestion control
End-end congestion control:
no explicit feedback from network
congestion inferred from end-system observed loss, delay
approach taken by TCP
Network-assisted congestion control:
routers provide feedback to end systems single bit indicating
congestion (SNA, DECbit, TCP/IP ECN, ATM)
explicit rate sender should send at
Two broad approaches towards congestion control:
3: Transport Layer 3b-28
ATM (Asynch Transfer Mode)
ATM is a cell-switching technology (as opposed to packet switching in the Internet)
ATM divides the data into FIXED SIZE (53 bytes) cells
ATM establishes a VIRTUAL CIRCUIT before transmitting the cells
ATM switches handle the cells and virtual circuits in a network
No routing decisions are needed in the network layer as the circuit is already laid out
Being complex and expensive, ATM is not popular anymore
3: Transport Layer 3b-29
Case study: ATM ABR congestion control
ABR: available bit rate:
“elastic service” if sender’s path
“underloaded”: sender should use
available bandwidth if sender’s path
congested: sender throttled to
minimum guaranteed rate
RM (resource management) cells:
sent by sender, interspersed with data cells
bits in RM cell set by switches (“network-assisted”) NI bit: no increase in rate
(mild congestion) CI bit: congestion
indication RM cells returned to sender
by receiver, with NI and CI bits intact
3: Transport Layer 3b-30
Case study: ATM ABR congestion control
EFCI bit in data cells: set to 1 in congested switch if data cell preceding RM cell has EFCI set, destination sets
CI bit in returned RM cell to inform sender of congestion. (Who sets the EFCI bit?)
two-byte ER (explicit rate) field in RM cell congested switch may lower ER value in cell sender’ send rate thus minimum supportable rate on path
3: Transport Layer 3b-31
TCP Congestion Control end-end control (no network assistance) transmission rate limited by congestion window size, Congwin,
over segments: (in addition to rcvwindow)
w segments, each with MSS bytes sent in one RTT:
throughput = w * MSS
RTT Bytes/sec
Congwin
3: Transport Layer 3b-32
TCP congestion control:
two “phases” slow start congestion avoidance
important variables: Congwin threshold: defines
threshold between the two phases: slow start phase and congestion control phase
Unacked data is kept at min (Congwin and Rcvwinow)
“probing” for usable bandwidth: ideally: transmit as
fast as possible (Congwin as large as possible) without loss
increase Congwin until loss (congestion)
loss: decrease Congwin, then begin probing (increasing) again
3: Transport Layer 3b-33
TCP Slowstart
exponential increase (per RTT) in window size (not so slow!)
loss event: timeout (Tahoe TCP) and/or or three duplicate ACKs (Reno TCP)