congestion control

7

Click here to load reader

Upload: sudeepjoseph

Post on 09-May-2017

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Congestion Control
Page 2: Congestion Control
Page 3: Congestion Control
Page 4: Congestion Control

2.5 ADDRESSING Four levels of addresses are used in an internet employing the TCP/IP protocols:

physical (link) addresses, logical (IP) addresses, port addresses, and specific

addresses (see Figure 2.17).

Physical Addresses The physical address, also known as the link address, is the address of a node as defined

by its LAN or WAN. It is included in the frame used by the data link layer. It is the

lowest-level address.

The physical addresses have authority over the network (LAN or WAN). The size

and format of these addresses vary depending on the network. For example, Ethernet

uses a 6-byte (48-bit) physical address that is imprinted on the network interface card

Page 5: Congestion Control

(NIC). LocalTalk (Apple), however, has a I-byte dynamic address that changes each time the station comes up.

Logical Addresses Logical addresses are necessary for universal communications that are independent of

underlying physical networks. Physical addresses are not adequate in an internetwork

environment where different networks can have different address formats. A universal

addressing system is needed in which each host can be identified uniquely, regardless

of the underlying physical network.

The logical addresses are designed for this purpose. A logical address in the Internet

is currently a 32-bit address that can uniquely define a host connected to the Internet. No two publicly addressed and visible hosts on the Internet can have the same IP address

Port Addresses The IP address and the physical address are necessary for a quantity of data to travel

from a source to the destination host. However, arrival at the destination host is not the

final objective of data communications on the Internet. A system that sends nothing but

data from one computer to another is not complete. Today, computers are devices that

can run multiple processes at the same time. The end objective of Internet communication

is a process communicating with another process. For example, computer A can

communicate with computer C by using TELNET. At the same time, computer A communicates

with computer B by using the File Transfer Protocol (FTP). For these processes

to receive data simultaneously, we need a method to label the different processes.

In other words, they need addresses. In the TCPIIP architecture, the label assigned to a process is called a port address. A port address in TCPIIP is 16 bits in length.

Specific Addresses Some applications have user-friendly addresses that are designed for that specific address.

Examples include the e-mail address (for example, [email protected]) and the Universal

Resource Locator (URL) (for example, www.mhhe.com). The first defines the recipient of

an e-mail (see Chapter 26); the second is used to find a document on the World Wide Web

(see Chapter 27). These addresses, however, get changed to the corresponding port and

logical addresses by the sending computer, as we will see in Chapter 25.

Page 6: Congestion Control

6.2.5 Multiplexing Multiplexing, or sharing several conversations over connections, virtual circuits, and physical links plays a role in several layers of the network architecture. In the transport layer, the need for multiplexing can arise in a number of ways. For example, if only one network address is available on a host, all transport connections on that machine have to use it. When a segment comes in, some way is needed to tell which process to give it to. This situation, called multiplexing, is

shown in Fig. 6-17(a). In this figure, four distinct transport connections all use the same network connection (e.g., IP address) to the remote host. Multiplexing can also be useful in the transport layer for another reason. Suppose, for example, that a host has multiple network paths that it can use. If a user needs more bandwidth or more reliability than one of the network paths can provide, a way out is to have a connection that distributes the traffic among multiple network paths on a round-robin basis, as indicated in Fig. 6-17(b). This modus operandi is called inverse multiplexing. With k network connections open, the effective bandwidth might be increased by a factor of k. An example of inverse multiplexing is SCTP (Stream Control Transmission Protocol), which can run

a connection using multiple network interfaces. In contrast, TCP uses a single network endpoint. Inverse multiplexing is also found at the link layer, when several low-rate links are used in parallel as one high-rate link

Page 7: Congestion Control