Friday, March 29, 2019

Internet Protocol Version 4 Analysis

net talks protocol pas seul 4 AnalysisChapter 2 Literature Review2.1 launchMul metredia float in all everywhere net is getting its revolutionary in the communication, merriment and synergetic game industries. The web now becomes a usual medium for telecasting cyclosis since the substance ab giver does non go through to abide to reassign a large point to begin with seeing the motion-picture show or auditory sense the sound. Instead, the media is move in a straight menses and is compete as it arrives. It tidy sum integ opine all early(a) media puts such as text, photograph, speech sound, images and blush brook radio and TV broadcasts fanny all be incorpo prised and delivered through a single medium. These finishings whitethorn request in ground of bandwidth, latency and reliability than traditional entropy finishs to avow the issue of mul datedia frame body arranging system technology in the future 1.The ecstasyation of mul eradi a occupation over net incomes become much(prenominal) complicated be perplex multimedia is turn cheaper and cheaper and at that placefore apply more and more. Problems with bearing multimedia f humbleds on ne both(prenominal)rks atomic subject 18 in the first place connect to the bandwidth they collect and to the strict maximum grip take onments that must(prenominal) be met 2. This is great when multimedia practises switch to furnish exploiters with real time interaction.Because of the quick growth of net income usage and the conveyment of contrastive drills, the IPv4 is no more relevant to confine the future nedeucerks. M any(prenominal) hot devices, such as mobile ph angiotensin-converting enzymes, require an IP cont set aside to connect to the internet. Thus, thither is a indispens sufficientness for a juvenile protocol that would provide new run. To cudgel to these problems, a new version of profits communications protocol has been introduce d. This is called Internet communications protocol b ruleing contemporaries (IPng or IPv6), which is designed by the IETF 3 to replace the latest version Internet protocol, IP interlingual rendition 4 (IPv4). IPv6 is designed to bring the problems of IPv4. It does so by creating a new version of the protocol which serves the function of IPv4, that without the very(prenominal) leapations of IPv4. IPv6 is not totally different from IPv4. The differences in the midst of IPv6 and IPv4 be including in volt major(ip) atomic account 18as which is take aiming, routing, security, configuration and support for mobile devices 4. worry all the outgrowth and new inventions, the problems of orderrn Internet communications protocol do researcher to split up more or slight new techniques to solve these problems. Even they fork up tried to devil some(a)(prenominal) changes on the current protocol, these changes still didnt economic aid a much. So, at the end the way came to development of a new protocol which is know as IPv6 or IPng.2.2 OSI 7 stratum calculating machine ne iirks atomic number 18 multiplex dynamic systems and difficult assess to understand, design, and implement a reckoner interlocking. Networking protocols need to be established for low direct computer communication up to how occupation programs communicate. apiece quantity in this protocol is called a story and divided into several grades simplifies the solution. The main idea do-nothing full stoping is that each stratum is obligated for different tasks. The Open System interconnectedness (OSI) Reference sit down defines seven layers 5.Physical mold. This layer deals, for instance, with conversion of mins to electrical signals, touch level synchronization.Data Link Layer. It is responsible for transmitting reading across a link, detecting education corruption, and manoeuvering.Network Layer. The layer enables any party in the net to communicate with each new(prenominal).Transport Layer. It establishes honest communication amongst a pair in the system, deals with lost and duplicated tracts. session Layer. This layer is responsible for dialogue supremacy and changing.Presentation Layer. The main task of this layer is to meet info in a way at ease for the user.Application Layer. Applications in this case include Web browsing, file transferring, and so forth The Network Layer is the layer that is the most interesting in the scope of this project. The following class gives a better view of this layer.2.3 Network LayerAs was menti unrivalledd before, this layer is responsible for enabling the communication between any party. The most utilize method for transporting information within and between communications meshs is the Internet protocol (IP).2.3.1 Internet ProtocolIP is a protocol that provides a connectionless, punic, and best- cases pile delivery system. More lucubrate on these cyberspace service types atomic n umber 18 accustomed below 5.In a connectionless sit around the data piece of grounds be transferred independently from all new(prenominal)s and checking full get-go and the conclusion address. It is worth mentioning that another(prenominal) type is the connection oriented model. However, the connection-oriented model and its details be beyond the scope of this project and thus go forth not be move in this report. The reader brush aside consult 5 for tho in progress toation on this type of service.Un steady-going delivery means that pile boats whitethorn be lost, counteracted, duplicated, delivered non-consecutively (in an baseball club other than that in which they were sent), or damaged in transmitting.2.4 Internet Protocol Version 4As we know, IPv4 is the current protocol for communication on the Internet. It is the protocol that underlies most communication on net full treatment today, such as transmission prevail protocol/IP and UDP/IP. The largest weakness of IPv4 is its address position 7. Each IPv4 address besides guard 32 bits and consists of two parts, defined as net identifier and legion identifier 5. A standard method of dis short-changeing an IPv4 address is as decimal valuate of four-spot octets, each separated a period, for representative 192.168.2.5. Traditionally 6, IP addresses ar presented by classfull addressing.5 classes of address were created, which is A to E. Class A consists of 16,777,214 hosts magic spell class B consists of 65,534 hosts and class C consists of 254 hosts. Class D is reserved for use with multicasting and class E is a block of IP addresses reserved for future use 7. The class D and E addresses be not utilize to address public host, so this leaves the rest of the blameless turn tail of IP addresses carved up into classes A C. As in brief as a site is connected to the Internet, it postulate to be given an built-in class C. Assuming that umpteen sites tho need one or two addresses then this waste over 200 addresses. one time a site reaches over 254 full available machines it would need an entire class B, which would waste over 65,000 addresses and so on. This apportioning system is evidently insufficient and wastes much of a hold in re obtain.2.4.1 straits straits is a part of the IP piece of land5. at that place is a number of theatres in an IPv4 psyche. Below argon the some explanations for each battle theatre of operations.2.4.2.1 VersionThis issue (4-bit bulky) is apply to tally the version of IP datagram that is considered. For IPv4 it is determine to 4.2.4.2.12 Internet Header distance (IHL)The Internet Header length is the space of the bearing.2.4.2.3 symbol of ServiceTheoretically, this champaign (1 octet long) should indicate something special about the protocol. However, it has neer really been utilise.2.4.2.4 steel out LengthTotal is the length of data in the fragment nonnegative the header.2.4.2.5 IdentificationThis bailiwic k is useful for fragmentation only. Its nominate is to enable the finis node to perform reassembly. This implies that the reference node must know which fragments drop dead to each other, i.e. the source, destination, and protocol palm should match.2.4.2.6 blow upOff cause indicates the point at which this fragment belongs in the reassembly software program. The field is link up to fragmentation instrument and has confusable vulnerabilities as the identification field.2.4.2.7 conviction to stretch forthTTL measures the time continuance of the datagram presence in a web. This guarantys that no datagram exists constantly in the network.2.4.2.8 ProtocolThis field identifies the transport protocols, for example UDP or TCP. Since the field contains an arbitrary quantify that indicates some protocol, encapsulation of one datagram into another (IP tunneling) is possible.2.4.2.9 Header ChecksumThe checksum is used to detect transmission errors. However, this field was remo ved in IPv6.2.4.2.10 cum Address.This field specifies the source address.2.4.2.11 finish AddressThe destination address (4 octets long) is specified in this field. No attacks relate to this field are known.2.4.2.12 OptionsThe field (variable sizing) was designed to reform the IP communication. There are several pickaxs defined for this field. Among them are security, source routing, and route recording.2.4.2.13 dramatizeThe field (variable size) is used to fill the IP header with zeros if the header length is less than 32 bits.2.5 Internet Protocol Version 6IPv6 is a new version that is specified in RFC2460 5 to bastinado the weakness of the current protocol in legitimate aspect. It uses a 128 bit long address field which is 4 times longer than Ipv4 addresses. This size of address space removes one of the worst issues with IPv4 and IPv6 doesnt set about classes of addresses. In general, IPv4 and IPv6 induct a similar in their elemental framework and as well many differen ces. At a first view, there are obviously differences in the addresses between IPv4 and IPv6. IPv6 addresses range from 00000000000000000000000000000000 to ffffffffffffffffffffffffffffffff.In addition to this preferred format, IPv6 addresses whitethorn be specified in two other shortened formatsOmit leadership zeros Specify IPv6 addresses by omitting leading zeros. For example, IPv6 address 105000000000000000050600300c326b whitethorn be create verbally as 10500005600300c326b.Double colon Specify IPv6 addresses by victimization double colons () in place of a series of zeros. For example, IPv6 address ff06000000c3 may be written as ff06c3. Double colons may be used only once in an IP address.The IPv6 addresses are similar to IPv4 remove that they are 16 octets long. A critical item to be find is that the present 32-bit IP addresses may be accommodated in IPv6 as a special case of IPv6 addressing. The standard representation of IPv6 addresses is a hexadecimal apprise of 16-bit each separated by a colon. not only does IPv6 have different address representation, plainly it also discards the forward concept of network classes. The 6-byte addresses are very popular in the 802 LANs. The undermentioned generation of LANs result use 8-byte address space specified by the Institute of galvanic and Electronics Engineers (IEEE) 9. Thus, the IPv6 addresses should be 8 bytes long.2.5.1 IPv6HeaderSome ofIPv4 header field excluded in IPv6, and some ofthem has been made optional. As a result of this the packet movementing time and packet header size is reduced. The header consists of two parts, which are the basic IPng header and IPng extension headers.2.5.2.1 VersionThis field (4-bit long), said(prenominal) as in IPv4 case, is used to determine the version of IP datagram and is set to 6 in the present case. This field is the same in both versions. The reasoning for this is that these two protocols should coexist during the transition period.2.5.2.2 Flow LabelThi s field is 20 bits long and, as yet, there is no specific functionality appoint to it.2.5.2.3 Payload LengthOnly IPv6 has this field. Since the header length is constant in IPv6, just one field is needed. This field replaces IHL and Total Length fields in IPv4. It carries information about the length of data (the headers are not included).2.5.2.4 Next HeaderNext Header field replaces the Protocol field in the IPv4 header.2.5.2.5 hop restrainThis field is a hop count that decrements. This field redefines the Time to Life field present in IPv4.2.5.2.6 Source AddressThe source address is indicated by this field (16 octets long). No attacks colligate to this field have been experienced.2.5.2.7 Destination AddressThis field (16 octets long) specifies the destination address. No attacks related to this field are known.IPv6 brings major changes to the IP header. IPv6s header is cold more compromising and contains fewer fields, with the number of fields dropping from 13 to 8. Fewer hea der fields result in a unsullied header format and Quality of Service (QoS) that was not present in IPv4. IP option fields in headers have been replaced by a set of optional extensions. The efficiency of IPv6s header shtup be seen by comparing the address to header size. Even though the IPv6 address is four times as large as the IPv4 address, the header is only doubly as large. priority traffic, such as real time audio or characterisation, can be distinguished from lower priority traffic through a priority field 8.Based on the 27 experiment, it clearly show the brake-down of the conglomerate headers in both IPv4 and IPv6, it is evident that the overhead incurred is stripped-down between IPv4 and IPv6. In theory, the performance overhead between these two protocols is so minimal that the benefits of IPv6 should pronto overshadow the negatives.mesa 1 Packet segmentation and overhead incurred by header information2.6 drift OverviewIn young years, there has been major increas e in multimedia be adrift application such as audio and goggle box broadcast over lucre. The increasing number of internet subscribers with broadband access from both work and station enables multimedia applications with highschool tonus can be delivered to the user. However, since the best effort internet is unreliable with a high packet lost and disagreement in packet arrival, it does not provide any QoS make. This is a crucial part when relations with real-time multimedia traffic.The multimedia float is a real-time application includes audio and contemptible picture which is stored in stream horde and streamed its contentedness to node upon request. The example includes continuous media server, digital library, and shopping and entertainment services. Prior to stream, depiction was usually transfered. Since, it took a long time to download video files, cyclosis was invented with the intention of avoiding download slow downs and enhancing user experience. In stream, video content is vie as it arrives over the network, in the sense that there is no require period for a complete download. real-time cyclosis has a quantify constraint such that the data are played continuously. If the packet data are not arrive in time, the play nates is paused and result cause the in smoothness in multimedia presentation and its in spades annoying to the user. Because of this factor, multimedia be adrift require isochronous processing and QoS 10 from end to end view. The overleap of QoS has not prevented the rapid growth of real-time float application and this growth is expected to continue and multimedia traffic will form a higher portion of of the internet load. Thus, the overall deportment of these applications will have a significant impact on the other internet traffic.2.7 Downloading Versus blow ApplicationBasically downloading applications such as file transfer protocol have-to doe with downloading a file before it is viewed by a user. Th e examples of multimedia downloading applications are downloading an MP3 air to an IPod or any portable device, downloading a video file to a computer via P2P application such as BitTorrent. Downloading is usually a naive and easiest way to deliver media to a user. However, downloading has two potentially important disadvantages for multimedia applications. First, a large buffer is inevitable whenever a large media file such as MPEG-4 movie is downloaded. Second, the amount of time required for the download can be comparatively large, (depends on the network traffic), thereby requiring the user to wait minutes or even hours before being able to view the content. Thus, while downloading is simple and robust, it provides only limited flexibility both to users and to application designers.In contrast, in the streaming mode actually is by split the media bit stream into separate packet which can be transmitted independently. This enables the receiver to decode and play anchor the pa rts of the bit stream that are already genuine. The transmitter continues to blame multimedia data packet while the receiver decodes and simultaneously plays back other, already received parts of the bit stream. This enables low cargo deck between the current data is sent by the transmitter to the moment it is viewed by the user. Low bar is of paramount grandeur for synergistic applications such as video conferencing, but it is also important both for video on demand, where the user may desire to change channels or programs quickly, and for live broadcast, but the go over must be finite. Another advantage of streaming is its relatively low storage requirements and increased flexibility for the user, compared to downloading. However, streaming applications, inappropriate downloading applications, have deadlines and other timing requirements to ensure continuous real-time media play out. This leads to new challenges for blueprint communication systems to best support multimed ia streaming applications. 122.8 Standard/Protocols for driftA good streaming protocol is required to achieve a forest of continuous playback in multimedia streaming over the internet with the short withstand when a user downloading a multimedia content over the internet. The streaming protocol provides a service such as transport, and QoS control mechanism including musical note fitation, congestion control and error control. The streaming protocol is built on the top of network level protocol and the transport level protocol.The multimedia streaming protocol is found on IP network and user Datagram Protocol (UDP) is mainly used, despite of some streaming application using TCP. Like TCP, UDP is a transport layer protocol, but UDP is a connectionless transport protocol. UDP does not warrantee a reliable transmission and in order arrival packet. nether UDP also, there is no guarantee that is packet will arrive to its destination 16. The UDP packet may get lost in the network when there is a plow of network traffic. Therefore, UDP is not suitable for data packet transfer where a guarantee delivery is important.UDP is never used to appoint important data such as webpage, database information, etc UDP is commonly used for streaming audio and video. Streaming media such as Windows Media audio files (.WMA), Real worker (.RM), and others format use UDP because it offers speed. The reason UDP is faster than TCP is because there is no form of liquefy control or error correction. The data sent over the Internet is affected by collisions, and errors will be present. memorialise that UDP is only concern with speed. This is the main reason why streaming media is not high quality. However, UDP is the saint transport layer protocol for streaming application which the priority is to transfer the packet from the sender to its destination and does not add up any appease which is the result of the transmission of lost packets.Since UDP does not guarantee in pack et delivery, the client needs to rely Real time Transport Protocol (RTP) 10. The RTP provides the low-level transport functions suitable for applications transmitting real-time data, such as video or audio, over multicast or unicast services The RTP standard consists of two elementary services, transmitted over two different channels. One of them is the real-time transport protocol which carries the data and the other works as control and monitor channel named RTP control protocol (RTCP) 13. RTP packets are encapsulated within UDP datagrams. This step incorporates a high throughput and efficient bandwidth usage. The RTP data packets contain a 12 byte header followed by the onus, which can be a video frame, set of audio samples etc. The header includes a payload type indicating the conformation of data contained in the packet (e.g. JPEG video, MP3 audio, etc), a timestamp (32 bits), and a sequence number to allow ordering and loss detection of RTP packets 11. harmonize to the stand ard 14, the transport of RTP streams can use both UDP and TCP transport protocols, with a arduous preference for the datagram oriented support offered by UDP. The sea captain function of RTCP is to provide feedback on the quality of the data distribution. The feedback may be directly useful for control of adaptive encodings along with fault nosology in the transmission. In summary, RTP is a data transfer protocol while RTCP is control protocol.The Real-time Streaming Protocol (RTSP) 25 is a client-server signaling system based on messaging in ASCII format. It establishes procedures and controls, either one or more time-synchronized streams continuous media such as audio and video. The protocol is purposely similar in syntax and operation to HTTP and therefore hires the option of using proxies, tunnels and caches. RTSP and works substantially both for large audiences, and single-viewer media-on-demand. RTSP provides control functionality such as pause, fast forward, contain and absolute positioning and works much resembling a videocassette recorder remote control. The necessary additional information in the negotiation is conducted in the Session interpretation Protocol (SDP), sent as an attachment of RTSP fascinate response 13.The Requirement for Multimedia Application several(a) multimedia applications have different requirements for QoS nominates in the following QoS parameters such as throughput, thwart, hold back disagreement (jitter) and packet loss. In most cases, the application of QoS requirements can be determine by the user which are the factors that affect the quality of applications 17. For example, from experimenting concluded that gratifying quality, one-way delay requirements for synergistic vox should be less than 250 ms. This delay includes the value of the delays imposed on all components of the communication channels, as a source of delay, transmission delays, delays in the network and the aim of the delay. There are some fa ctors which affect QoS application requirements such as interactional and noninteractive applications, User/Application characteristics (delay tolerance and intolerance, adaptive and nonadaptive characteristics) and application criticality (Mission-critical and non-mission-critical applications) 15. The trey types for this application requirement will be talk of in next section.2.10.1 Interactive and Noninteractive ApplicationsAn interactive application involves some form of between two parties such as people-to-people, people-to-machine or machine-to-machine. An example of interactive applications isPeople-to-people application such as IP telephony, interactive voice/video, videoconferencingPeople-to-machine application such as word-painting-on-demand (VOD), streaming audio/videoMachine-to-machine application semiautomatic machine controlThe time elapsed between interactions is essential to the achiever of an interactive application. The degree of interactivity determines the level of severity or delay the requirement. For example, interactive voice applications, which involve human interaction (conversation) in real time, are stringent requirements of delay (in order of milliseconds). Streaming (play), video applications involve less interaction and do not require real-time response. Applications streaming, therefore, are more relaxed requirements of delay (in order of seconds). Often applications tolerance delay is determined by users tolerance delay (ie, higher delay tolerance leads to more relaxed delay requirements). Jitter delay is also related to QoS support for interactive tasks. The delay jitter can be right by de-jittering techniques buffer. However, the buffer introduces delay in the original signal, which also affects the interactivity of the task. In general, an application with strict requirements delay also has a strict delay jitter requirements 15.2.10.2 Tolerance and IntoleranceTolerance and intolerance also one of the give away that affect in QoS parameter values require by the user. response time tolerance and intolerance determines the strictness of the delay requirement. As we already mentioned, streaming multimedia applications are more latency resistant than interactive multimedia applications. The level of latency tolerance extremely depends based on users satisfaction, expectation, and the sine qua non of the application such as mission critical. torment tolerance to the shipment of the application quality depends on users satisfaction, users expectation, and the application media types. For example, users are more free to video distortion than to audio distortion. In this case, during congestion, the network has to maintain the quality of the audio output over the quality of the video output 15.2.10.3 accommodative and Nonadaptive CharacteristicsAdaptive and nonadaptive aspects mostly describe the mechanisms invoked by the applications to adapt to QoS degradation and the common adaptive technique s are rate adaptation and delay adaptation. Rate adaptive application can prepare the data rate injected into the network. During network congestion, the applications reduce the data rate by dropping some packets, increasing the codec data compression, or changing the multimedia properties. This technique may cause degradation of the perceived quality but will harbour it within acceptable levels. mark off-tolerant adaptive applications are have to a received level of delay jitter by deploying the de-jittered buffer or adaptive playback technique. reading is trigged by some form of implicit or explicit feedback from the network or end user 15.2.10.4 Application crucialityMission-critical aspects reflect the importance of application usage, which determines the strictness of the QoS requirements and Failing the mission may result in disastrous consequences. For exampleAir Traffic retard Towers (ATCTs) The Traffic controller is responsible to guide the pilot for direction, take off and landing place process. Life and stopping point of the pilot and passenger may depend on the promptness and true statement of the Air Traffic Control (ATC) system.E Banking system The failure of this system may lead to the losses to the bank and user is unable to make an online transaction (view account summary, account history, transaction status, oversee cheques and transfer pecuniary resource online) and to make a online payment ( loans, bills, and credit card) and other transaction.2.10.6 Examples of Application Requirements tv applications can be classified into two groups interactive video (i.e., video conferencing, long-distance learning, remote surgery) and streaming video (i.e., RealVideo, Microsoft ASF, QuickTime, Video on Demand, high-definition television). As shown in table 2, video applications bandwidth requirements are relatively high depending on the video codec.Video codecBandwidth RequirementUncompressed high-definition television1.5 GbpsHDTV360 MbpsSta ndard interpretation TV (SDTV)270MbpsCompressed MPEG225-60 MbpsBroadcast quality HDTV19.4 MbpsMPEG 2 SDTV6 MbpsMPEG 11.5 MbpsMPEG 45 kbps 4 MbpsH.323 (h.263)28 kbps 1 MbpsTable 2 Video Codec Bandwidth Requirement 152.11 Packet DelayDelay has a direct impact on users satisfaction. Real-time media applications require the delivery of information from the source to the destination within a certain period of time. bulky delays may cause incidents such as data missing the playback point, which can degrade the quality of service of the application. Moreover, it can cause user frustration during interactive tasks. For example, the International Telecommunication Union (ITU) considers network delay for voice applications in Recommendation G.114 and defines three bands of one-way delay as shown in table 2.Range in Millisecond (ms)Description0 one hundred fiftyAcceptable for most user application.150 cdAcceptable provided that administrators are aware of the transmission time and the impact it has on the transmission quality of user applications. 400Unacceptable for general. However in certain cases this limit exceeds.Table 3 Standard for delay limit for voiceIn the data transmission process, each packet is moving from its source to its destination. The process of data transmission usually starts with a packet from a hoInternet Protocol Version 4 AnalysisInternet Protocol Version 4 AnalysisChapter 2 Literature Review2.1 IntroductionMultimedia streaming over internet is getting its revolutionary in the communication, entertainment and interactive game industries. The web now becomes a popular medium for video streaming since the user does not have to wait to download a large file before seeing the video or hearing the sound. Instead, the media is sent in a continuous stream and is played as it arrives. It can integrate all other media formats such as text, video, audio, images and even live radio and TV broadcasts can all be integrated and delivered through a si ngle medium. These applications may require in terms of bandwidth, latency and reliability than traditional data applications to support the growth of multimedia technology in the future 1.The transportation of multimedia traffic over networks become more complicated because multimedia is becoming cheaper and cheaper and therefore used more and more. Problems with bearing multimedia flows on networks are mainly related to the bandwidth they require and to the strict maximum delay requirements that must be met 2. This is important when multimedia applications have to provide users with real-time interaction.Because of the rapid growth of Internet usage and the requirement of different applications, the IPv4 is no more relevant to support the future networks. Many new devices, such as mobile phones, require an IP address to connect to the Internet. Thus, there is a need for a new protocol that would provide new services. To overcome to these problems, a new version of Internet Protoco l has been introduced. This is called Internet Protocol next generation (IPng or IPv6), which is designed by the IETF 3 to replace the current version Internet Protocol, IP Version 4 (IPv4). IPv6 is designed to solve the problems of IPv4. It does so by creating a new version of the protocol which serves the function of IPv4, but without the same limitations of IPv4. IPv6 is not totally different from IPv4. The differences between IPv6 and IPv4 are including in five major areas which is addressing, routing, security, configuration and support for mobile devices 4. Like all the development and new inventions, the problems of current Internet Protocol made researcher to develop some new techniques to solve these problems. Even they have tried to make some changes on the current protocol, these changes still didnt help a much. So, at the end the way came to development of a new protocol which is known as IPv6 or IPng.2.2 OSI 7 LayerComputer networks are complex dynamic systems and diffi cult task to understand, design, and implement a computer network. Networking protocols need to be established for low level computer communication up to how application programs communicate. Each step in this protocol is called a layer and divided into several layers simplifies the solution. The main idea behind layering is that each layer is responsible for different tasks. The Open System Interconnection (OSI) Reference Model defines seven layers 5.Physical Layer. This layer deals, for instance, with conversion of bits to electrical signals, bit level synchronization.Data Link Layer. It is responsible for transmitting information across a link, detecting data corruption, and addressing.Network Layer. The layer enables any party in the network to communicate with each other.Transport Layer. It establishes reliable communication between a pair in the system, deals with lost and duplicated packets.Session Layer. This layer is responsible for dialogue control and changing.Presentatio n Layer. The main task of this layer is to represent data in a way convenient for the user.Application Layer. Applications in this case include Web browsing, file transferring, etc. The Network Layer is the layer that is the most interesting in the context of this project. The following section gives a better view of this layer.2.3 Network LayerAs was mentioned before, this layer is responsible for enabling the communication between any party. The most used method for transporting data within and between communications networks is the Internet Protocol (IP).2.3.1 Internet ProtocolIP is a protocol that provides a connectionless, unreliable, and best-efforts packet delivery system. More details on these network service types are given below 5.In a connectionless model the data packets are transferred independently from all others and containing full source and the destination address. It is worth mentioning that another type is the connection oriented model. However, the connection-or iented model and its details are beyond the scope of this project and thus will not be pursued in this report. The reader can consult 5 for further information on this type of service.Unreliable delivery means that packets may be lost, delayed, duplicated, delivered non-consecutively (in an order other than that in which they were sent), or damaged in transmission.2.4 Internet Protocol Version 4As we know, IPv4 is the current protocol for communication on the Internet. It is the protocol that underlies most communication on networks today, such as TCP/IP and UDP/IP. The largest weakness of IPv4 is its address space 7. Each IPv4 address only have 32 bits and consists of two parts, defined as network identifier and host identifier 5. A standard method of displaying an IPv4 address is as decimal value of four octets, each separated a period, for example 192.168.2.5. Traditionally 6, IP addresses are presented by classfull addressing.5 classes of address were created, which is A to E. C lass A consists of 16,777,214 hosts while class B consists of 65,534 hosts and class C consists of 254 hosts. Class D is reserved for use with multicasting and class E is a block of IP addresses reserved for future use 7. The class D and E addresses are not used to address public host, so this leaves the rest of the entire range of IP addresses carved up into classes A C. As soon as a site is connected to the Internet, it needs to be given an entire class C. Assuming that many sites only need one or two addresses then this waste over 200 addresses. Once a site reaches over 254 full addressable machines it would need an entire class B, which would waste over 65,000 addresses and so on. This allocation system is obviously insufficient and wastes much of a limited resource.2.4.1 HeaderHeader is a part of the IP packet5. There is a number of fields in an IPv4 header. Below are the some explanations for each field.2.4.2.1 VersionThis field (4-bit long) is used to determine the version o f IP datagram that is considered. For IPv4 it is set to 4.2.4.2.12 Internet Header Length (IHL)The Internet Header Length is the length of the header.2.4.2.3 Type of ServiceTheoretically, this field (1 octet long) should indicate something special about the protocol. However, it has never really been used.2.4.2.4 Total LengthTotal is the length of data in the fragment plus the header.2.4.2.5 IdentificationThis field is useful for fragmentation only. Its purpose is to enable the destination node to perform reassembly. This implies that the destination node must know which fragments belong to each other, i.e. the source, destination, and protocol fields should match.2.4.2.6 OffsetOffset indicates the point at which this fragment belongs in the reassembly packet. The field is related to fragmentation mechanism and has similar vulnerabilities as the identification field.2.4.2.7 Time to LiveTTL measures the time duration of the datagram presence in a network. This guarantees that no data gram exists forever in the network.2.4.2.8 ProtocolThis field identifies the transport protocols, for example UDP or TCP. Since the field contains an arbitrary value that indicates some protocol, encapsulation of one datagram into another (IP tunneling) is possible.2.4.2.9 Header ChecksumThe checksum is used to detect transmission errors. However, this field was removed in IPv6.2.4.2.10 Source Address.This field specifies the source address.2.4.2.11 Destination AddressThe destination address (4 octets long) is specified in this field. No attacks related to this field are known.2.4.2.12 OptionsThe field (variable size) was designed to improve the IP communication. There are several options defined for this field. Among them are security, source routing, and route recording.2.4.2.13 PaddingThe field (variable size) is used to fill the IP header with zeros if the header length is less than 32 bits.2.5 Internet Protocol Version 6IPv6 is a new version that is specified in RFC2460 5 to ov ercome the weakness of the current protocol in certain aspect. It uses a 128 bit long address field which is 4 times longer than Ipv4 addresses. This size of address space removes one of the worst issues with IPv4 and IPv6 doesnt have classes of addresses. In general, IPv4 and IPv6 have a similar in their basic framework and also many differences. At a first view, there are obviously differences in the addresses between IPv4 and IPv6. IPv6 addresses range from 00000000000000000000000000000000 to ffffffffffffffffffffffffffffffff.In addition to this preferred format, IPv6 addresses may be specified in two other shortened formatsOmit leading zeros Specify IPv6 addresses by omitting leading zeros. For example, IPv6 address 105000000000000000050600300c326b may be written as 10500005600300c326b.Double colon Specify IPv6 addresses by using double colons () in place of a series of zeros. For example, IPv6 address ff06000000c3 may be written as ff06c3. Double colons may be used only once in an IP address.The IPv6 addresses are similar to IPv4 except that they are 16 octets long. A critical fact to be observed is that the present 32-bit IP addresses may be accommodated in IPv6 as a special case of IPv6 addressing. The standard representation of IPv6 addresses is a hexadecimal value of 16-bit each separated by a colon. Not only does IPv6 have different address representation, but it also discards the previous concept of network classes. The 6-byte addresses are very popular in the 802 LANs. The next generation of LANs will use 8-byte address space specified by the Institute of Electrical and Electronics Engineers (IEEE) 9. Thus, the IPv6 addresses should be 8 bytes long.2.5.1 IPv6HeaderSome ofIPv4 header fields excluded in IPv6, and some ofthem has been made optional. As a result of this the packet processing time and packet header size is reduced. The header consists of two parts, which are the basic IPng header and IPng extension headers.2.5.2.1 VersionThis field (4-bi t long), same as in IPv4 case, is used to determine the version of IP datagram and is set to 6 in the present case. This field is the same in both versions. The reasoning for this is that these two protocols should coexist during the transition period.2.5.2.2 Flow LabelThis field is 20 bits long and, as yet, there is no specific functionality assigned to it.2.5.2.3 Payload LengthOnly IPv6 has this field. Since the header length is constant in IPv6, just one field is needed. This field replaces IHL and Total Length fields in IPv4. It carries information about the length of data (the headers are not included).2.5.2.4 Next HeaderNext Header field replaces the Protocol field in the IPv4 header.2.5.2.5 Hops limitThis field is a hop count that decrements. This field redefines the Time to Life field present in IPv4.2.5.2.6 Source AddressThe source address is indicated by this field (16 octets long). No attacks related to this field have been experienced.2.5.2.7 Destination AddressThis fiel d (16 octets long) specifies the destination address. No attacks related to this field are known.IPv6 brings major changes to the IP header. IPv6s header is far more flexible and contains fewer fields, with the number of fields dropping from 13 to 8. Fewer header fields result in a cleaner header format and Quality of Service (QoS) that was not present in IPv4. IP option fields in headers have been replaced by a set of optional extensions. The efficiency of IPv6s header can be seen by comparing the address to header size. Even though the IPv6 address is four times as large as the IPv4 address, the header is only twice as large. Priority traffic, such as real time audio or video, can be distinguished from lower priority traffic through a priority field 8.Based on the 27 experiment, it clearly show the brake-down of the various headers in both IPv4 and IPv6, it is evident that the overhead incurred is minimal between IPv4 and IPv6. In theory, the performance overhead between these two protocols is so minimal that the benefits of IPv6 should quickly overshadow the negatives.Table 1 Packet breakdown and overhead incurred by header information2.6 Streaming OverviewIn recent years, there has been major increasing in multimedia streaming application such as audio and video broadcast over internet. The increasing number of internet subscribers with broadband access from both work and home enables multimedia applications with high quality can be delivered to the user. However, since the best effort internet is unreliable with a high packet lost and inconsistency in packet arrival, it does not provide any QoS control. This is a crucial part when dealing with real-time multimedia traffic.The multimedia streaming is a real-time application includes audio and video which is stored in stream server and streamed its content to client upon request. The example includes continuous media server, digital library, and shopping and entertainment services. Prior to streaming, video was usually downloaded. Since, it took a long time to download video files, streaming was invented with the intention of avoiding download delays and enhancing user experience. In streaming, video content is played as it arrives over the network, in the sense that there is no wait period for a complete download.Real-time streaming has a timing constraint such that the data are played continuously. If the packet data are not arrive in time, the playback is paused and will cause the in smoothness in multimedia presentation and its definitely annoying to the user. Because of this factor, multimedia streaming require isochronous processing and QoS 10 from end to end view. The lack of QoS has not prevented the rapid growth of real-time streaming application and this growth is expected to continue and multimedia traffic will form a higher portion of of the internet load. Thus, the overall behavior of these applications will have a significant impact on the other internet traffic.2.7 Down loading Versus Streaming ApplicationBasically downloading applications such as FTP involve downloading a file before it is viewed by a user. The examples of multimedia downloading applications are downloading an MP3 song to an IPod or any portable device, downloading a video file to a computer via P2P application such as BitTorrent. Downloading is usually a simple and easiest way to deliver media to a user. However, downloading has two potentially important disadvantages for multimedia applications. First, a large buffer is required whenever a large media file such as MPEG-4 movie is downloaded. Second, the amount of time required for the download can be relatively large, (depends on the network traffic), thereby requiring the user to wait minutes or even hours before being able to view the content. Thus, while downloading is simple and robust, it provides only limited flexibility both to users and to application designers.In contrast, in the streaming mode actually is by split the media bit stream into separate packet which can be transmitted independently. This enables the receiver to decode and play back the parts of the bit stream that are already received. The transmitter continues to send multimedia data packet while the receiver decodes and simultaneously plays back other, already received parts of the bit stream. This enables low delay between the current data is sent by the transmitter to the moment it is viewed by the user. Low delay is of paramount importance for interactive applications such as video conferencing, but it is also important both for video on demand, where the user may desire to change channels or programs quickly, and for live broadcast, but the delay must be finite. Another advantage of streaming is its relatively low storage requirements and increased flexibility for the user, compared to downloading. However, streaming applications, unlike downloading applications, have deadlines and other timing requirements to ensure continuous real-time media play out. This leads to new challenges for designing communication systems to best support multimedia streaming applications. 122.8 Standard/Protocols for StreamingA good streaming protocol is required to achieve a quality of continuous playback in multimedia streaming over the internet with the short delay when a user downloading a multimedia content over the internet. The streaming protocol provides a service such as transport, and QoS control mechanism including quality adaptation, congestion control and error control. The streaming protocol is built on the top of network level protocol and the transport level protocol.The multimedia streaming protocol is based on IP network and User Datagram Protocol (UDP) is mainly used, despite of some streaming application using TCP. Like TCP, UDP is a transport layer protocol, but UDP is a connectionless transport protocol. UDP does not guarantee a reliable transmission and in order arrival packet. Under UDP also, there is no guarantee that is packet will arrive to its destination 16. The UDP packet may get lost in the network when there is a lot of network traffic. Therefore, UDP is not suitable for data packet transfer where a guarantee delivery is important.UDP is never used to send important data such as webpage, database information, etc UDP is commonly used for streaming audio and video. Streaming media such as Windows Media audio files (.WMA), Real Player (.RM), and others format use UDP because it offers speed. The reason UDP is faster than TCP is because there is no form of flow control or error correction. The data sent over the Internet is affected by collisions, and errors will be present. Remember that UDP is only concerned with speed. This is the main reason why streaming media is not high quality. However, UDP is the ideal transport layer protocol for streaming application which the priority is to transfer the packet from the sender to its destination and does not contribute any delay whi ch is the result of the transmission of lost packets.Since UDP does not guarantee in packet delivery, the client needs to rely Real time Transport Protocol (RTP) 10. The RTP provides the low-level transport functions suitable for applications transmitting real-time data, such as video or audio, over multicast or unicast services The RTP standard consists of two elementary services, transmitted over two different channels. One of them is the real-time transport protocol which carries the data and the other works as control and monitor channel named RTP control protocol (RTCP) 13. RTP packets are encapsulated within UDP datagrams. This step incorporates a high throughput and efficient bandwidth usage. The RTP data packets contain a 12 byte header followed by the payload, which can be a video frame, set of audio samples etc. The header includes a payload type indicating the kind of data contained in the packet (e.g. JPEG video, MP3 audio, etc), a timestamp (32 bits), and a sequence num ber to allow ordering and loss detection of RTP packets 11. According to the standard 14, the transport of RTP streams can use both UDP and TCP transport protocols, with a strong preference for the datagram oriented support offered by UDP. The primary function of RTCP is to provide feedback on the quality of the data distribution. The feedback may be directly useful for control of adaptive encodings along with fault diagnostics in the transmission. In summary, RTP is a data transfer protocol while RTCP is control protocol.The Real-time Streaming Protocol (RTSP) 25 is a client-server signaling system based on messaging in ASCII format. It establishes procedures and controls, either one or more time-synchronized streams continuous media such as audio and video. The protocol is intentionally similar in syntax and operation to HTTP and therefore hires the option of using proxies, tunnels and caches. RTSP and works well both for large audiences, and single-viewer media-on-demand. RTSP pr ovides control functionality such as pause, fast forward, reverse and absolute positioning and works much like a VCR remote control. The necessary additional information in the negotiation is conducted in the Session Description Protocol (SDP), sent as an attachment of RTSP appropriate response 13.The Requirement for Multimedia ApplicationVarious multimedia applications have different requirements for QoS describes in the following QoS parameters such as throughput, delay, delay variation (jitter) and packet loss. In most cases, the application of QoS requirements can be determine by the user which are the factors that affect the quality of applications 17. For example, from experimenting concluded that acceptable quality, one-way delay requirements for interactive voice should be less than 250 ms. This delay includes the value of the delays imposed on all components of the communication channels, as a source of delay, transmission delays, delays in the network and the determination of the delay. There are some factors which affect QoS application requirements such as interactive and noninteractive applications, User/Application characteristics (delay tolerance and intolerance, adaptive and nonadaptive characteristics) and application criticality (Mission-critical and non-mission-critical applications) 15. The three types for this application requirement will be discuss in next section.2.10.1 Interactive and Noninteractive ApplicationsAn interactive application involves some form of between two parties such as people-to-people, people-to-machine or machine-to-machine. An example of interactive applications isPeople-to-people application such as IP telephony, interactive voice/video, videoconferencingPeople-to-machine application such as Video-on-demand (VOD), streaming audio/videoMachine-to-machine application Automatic machine controlThe time elapsed between interactions is essential to the success of an interactive application. The degree of interactivity de termines the level of severity or delay the requirement. For example, interactive voice applications, which involve human interaction (conversation) in real time, are stringent requirements of delay (in order of milliseconds). Streaming (play), video applications involve less interaction and do not require real-time response. Applications streaming, therefore, are more relaxed requirements of delay (in order of seconds). Often applications tolerance delay is determined by users tolerance delay (ie, higher delay tolerance leads to more relaxed delay requirements). Jitter delay is also related to QoS support for interactive tasks. The delay jitter can be corrected by de-jittering techniques buffer. However, the buffer introduces delay in the original signal, which also affects the interactivity of the task. In general, an application with strict requirements delay also has a strict delay jitter requirements 15.2.10.2 Tolerance and IntoleranceTolerance and intolerance also one of the k ey that affect in QoS parameter values require by the user. Latency tolerance and intolerance determines the strictness of the delay requirement. As we already mentioned, streaming multimedia applications are more latency tolerant than interactive multimedia applications. The level of latency tolerance extremely depends based on users satisfaction, expectation, and the urgency of the application such as mission critical. Distortion tolerance to the commitment of the application quality depends on users satisfaction, users expectation, and the application media types. For example, users are more tolerant to video distortion than to audio distortion. In this case, during congestion, the network has to maintain the quality of the audio output over the quality of the video output 15.2.10.3 Adaptive and Nonadaptive CharacteristicsAdaptive and nonadaptive aspects mostly describe the mechanisms invoked by the applications to adapt to QoS degradation and the common adaptive techniques are r ate adaptation and delay adaptation. Rate adaptive application can adjust the data rate injected into the network. During network congestion, the applications reduce the data rate by dropping some packets, increasing the codec data compression, or changing the multimedia properties. This technique may cause degradation of the perceived quality but will keep it within acceptable levels. Delay-tolerant adaptive applications are tolerate to a certain level of delay jitter by deploying the de-jittered buffer or adaptive playback technique. Adaptation is trigged by some form of implicit or explicit feedback from the network or end user 15.2.10.4 Application CriticalityMission-critical aspects reflect the importance of application usage, which determines the strictness of the QoS requirements and Failing the mission may result in disastrous consequences. For exampleAir Traffic Control Towers (ATCTs) The Traffic controller is responsible to guide the pilot for direction, takeoff and landin g process. Life and death of the pilot and passenger may depend on the promptness and accuracy of the Air Traffic Control (ATC) system.E Banking system The failure of this system may lead to the losses to the bank and user is unable to make an online transaction (view account summary, account history, transaction status, manage cheques and transfer funds online) and to make a online payment ( loans, bills, and credit card) and other transaction.2.10.6 Examples of Application RequirementsVideo applications can be classified into two groups interactive video (i.e., video conferencing, long-distance learning, remote surgery) and streaming video (i.e., RealVideo, Microsoft ASF, QuickTime, Video on Demand, HDTV). As shown in table 2, video applications bandwidth requirements are relatively high depending on the video codec.Video codecBandwidth RequirementUncompressed HDTV1.5 GbpsHDTV360 MbpsStandard definition TV (SDTV)270MbpsCompressed MPEG225-60 MbpsBroadcast quality HDTV19.4 MbpsMPEG 2 SDTV6 MbpsMPEG 11.5 MbpsMPEG 45 kbps 4 MbpsH.323 (h.263)28 kbps 1 MbpsTable 2 Video Codec Bandwidth Requirement 152.11 Packet DelayDelay has a direct impact on users satisfaction. Real-time media applications require the delivery of information from the source to the destination within a certain period of time. Long delays may cause incidents such as data missing the playback point, which can degrade the quality of service of the application. Moreover, it can cause user frustration during interactive tasks. For example, the International Telecommunication Union (ITU) considers network delay for voice applications in Recommendation G.114 and defines three bands of one-way delay as shown in table 2.Range in Millisecond (ms)Description0 150Acceptable for most user application.150 400Acceptable provided that administrators are aware of the transmission time and the impact it has on the transmission quality of user applications. 400Unacceptable for general. However in certain case s this limit exceeds.Table 3 Standard for delay limit for voiceIn the data transmission process, each packet is moving from its source to its destination. The process of data transmission usually starts with a packet from a ho

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.