TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).

Slides:



Advertisements
Similar presentations
Introduction 1 Lecture 13 Transport Layer (Transmission Control Protocol) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer.
Advertisements

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
CCNA – Network Fundamentals
CSCI 4550/8556 Computer Networks
Transmission Control Protocol (TCP)
Intermediate TCP/IP TCP Operation.
Guide to TCP/IP, Third Edition
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
IS333, Ch. 26: TCP Victor Norman Calvin College 1.
Lecture 7 Transport Layer
1 TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
BZUPAGES.COM 1 User Datagram Protocol - UDP RFC 768, Protocol 17 Provides unreliable, connectionless on top of IP Minimal overhead, high performance –No.
Chapter 7 – Transport Layer Protocols
TELE202 Lecture 14 TCP/UDP (2) 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »TCP/UDP (1) »Source: chapter 17 ¥This Lecture »TCP/UDP (2) »Source: chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Transport Protocols Slide 1 Transport Protocols.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
TCP. Learning objectives Reliable Transport in TCP TCP flow and Congestion Control.
Ch 23 Ameera Almasoud Based on Data Communications and Networking, 4th Edition. by Behrouz A. Forouzan, McGraw-Hill Companies, Inc., 2007.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
3-1 Transport services and protocols r provide logical communication between app processes running on different hosts r transport protocols run in end.
Chapter 4 OSI Transport Layer
Gursharan Singh Tatla Transport Layer 16-May
What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host IP treats a computer as an endpoint of communication Best.
Process-to-Process Delivery:
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
1 Chapter Internetworking Part 4 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
1 Transport Layer Computer Networks. 2 Where are we?
Transportation Protocols: UDP, TCP & RTP
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
IP and Errors IP Best Effort Datagrams can be: –Lost –Delayed –Duplicated –Delivered out of order –Corrupted.
IP and Errors IP Best Effort Datagrams can be: –Lost –Delayed –Duplicated –Delivered out of order –Corrupted.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 04_b Transport Protocols - TCP Instructor: Dr. Li-Chuan Chen Date: 09/22/2003 Based in part upon slides.
TCP : Transmission Control Protocol Computer Network System Sirak Kaewjamnong.
TCP Lecture 13 November 13, TCP Background Transmission Control Protocol (TCP) TCP provides much of the functionality that IP lacks: reliable service.
University of the Western Cape Chapter 12: The Transport Layer.
SMUCSE 4344 transport layer. SMUCSE 4344 transport layer end-to-end protocols –transport code runs only on endpoint hosts encapsulates network communications.
Transport Layer Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
Section 5: The Transport Layer. 5.2 CS Computer Networks John Mc Donald, Dept. of Computer Science, NUI Maynooth. Introduction In the previous section.
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 2.5 Internetworking Chapter 25 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
Routers and Routing Basics CCNA 2 Chapter 10.
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, , WWW) Reliable Stream Transport (TCP) Connectionless Packet Delivery.
Transport Layer Moving Segments. Transport Layer Protocols Provide a logical communication link between processes running on different hosts as if directly.
Transport Control Protocol (TCP) Features of TCP, packet loss and retransmission, adaptive retransmission, flow control, three way handshake, congestion.
1 TCP: Reliable Transport Service. 2 Transmission Control Protocol (TCP) Major transport protocol used in Internet Heavily used Completely reliable transfer.
Networking Basics CCNA 1 Chapter 11.
Chapter 24 Transport Control Protocol (TCP) Layer 4 protocol Responsible for reliable end-to-end transmission Provides illusion of reliable network to.
Computer Networks23-1 PART 5 Transport Layer. Computer Networks23-2 Position of Transport Layer Responsible for the delivery of a message from one process.
Transmission Control Protocol (TCP) BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Transport Protocols.
1 End-to-End Protocols User Datagram Protocol (UDP) Transmission Control Protocol(TCP)
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
1 Computer Communication & Networks Lecture 23 & 24 Transport Layer: UDP and TCP Waleed Ejaz
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
3. END-TO-END PROTOCOLS (PART 1) Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University 22 March
1 Chapter 24 Internetworking Part 4 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
5. End-to-end protocols (part 1)
Module 1 UDP & TCP.
Process-to-Process Delivery, TCP and UDP protocols
PART 5 Transport Layer Computer Networks.
Transport Layer Unit 5.
Process-to-Process Delivery:
Process-to-Process Delivery: UDP, TCP
Computer Networks Protocols
Transport Layer 9/22/2019.
Presentation transcript:

TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC). ARP does this job. It takes IP address and gives corresponding physical address.

TCP/IP: Basics2 How ARP Works? There are three methods 1) Table look up 2) Closed form computation 3) Message Exchange In table look up the mapping information is stored in a table in the computer’s memory. In closed form method an algorithm is used to map IP address to a physical address.

TCP/IP: Basics3 How ARP Works? In message exchange, a message is broadcast to all the computer on the network with the IP address. The computer with that IP address sends its physical address which is maintained in a cache. ARP is local, that is, it is done on local network.

TCP/IP: Basics4 Transmission Control Protocol Transmission Control Protocol or TCP provides: –Reliability Error Control Loss Control Sequence Control Duplication Control –Point to Point or Port to Port Communication –Full duplex –Connection Oriented

TCP/IP: Basics5 ??? TCP uses IP for data delivery (like UDP) Endpoints are identified by ports (like UDP) –Allows multiple connections on each host –Ports may be associated with an application or a process IP treats TCP messages like data and does not interpret any contents of the TCP message.

TCP/IP: Basics6 ??? TCP message travels in IP datagrams. Internet routers only look at IP header to forward datagrams. TCP at destination interprets TCP messages.

TCP/IP: Basics7 TCP Segment Format Same header format used in both directions Segment can carry both data and acknowledgment. Flag field has 6 1-bit flags. SYN = 1 means request to establish connection. FIN = 1 means end of connection.

TCP/IP: Basics8 Ports and Socket A single computer can be running several applications ( , FTP, HTTP and others). TCP is application to application (port to port) protocol, IP is computer to computer protocol. TCP uses port numbers to identify different application running on a single computer. A port is a 16-bit number allocated to a particular application.

TCP/IP: Basics9 Ports and Socket A port identifies a single application on a computer. A socket or socket address is IP address and port number concatenated together. Example: :80 This enables multiple application on one machine to communicate simultaneously. Normally server port numbers are fixed and known as well known ports so that client can send a request to a known application.

TCP/IP: Basics10 Ports and Socket A Typical Scenario When a client application sends a TCP request to a server application, it provides server application port number. The TCP software on client allocates an unused port number to that client application. The server receives the request and TCP software passes it to the intended server application. The server replies with its own port number and the client port number.

TCP/IP: Basics11 Client Source port number = 80 Destination port number = 23 Source port number = 23 Destination port number = 80 Source Ports and Socket A Typical Scenario

TCP/IP: Basics12 Delivery in TCP

TCP/IP: Basics13 Three-way Handshake TCP uses three-way handshake for reliable connection establishment and termination –Host 1 sends segment with SYN bit set and random sequence number. –Host 2 responds with segment with SYN bit set, acknowledgment to Host 1 and random sequence number. –Host 1 responds with acknowledgment.

TCP/IP: Basics14 Closing a Connection

TCP/IP: Basics15 TCP Connection Types TCP has two types of connections: –Non Persistent connection –Persistent connection In non persistent connection TCP connection is closed by the server once the client request is served. In persistent connection the connection is not closed and client can use it as many time as needed.

TCP/IP: Basics16 TCP Connection Types There are two types of persistent connections. –Without pipelining –With pipelining Without pipelining the new request could be sent to the sever only once the previous request is served With pipelining several requests can be made simeltaneously.

TCP/IP: Basics17 Reliable Delivery TCP uses many techniques described earlier to provide reliable delivery Recovers from –Lost packets –Duplicate packets –Delayed packets –Corrupted data –Transmission speed mismatches –Congestion –System reboots

TCP/IP: Basics18 Lost Packets TCP uses positive acknowledgment with retransmission to achieve reliable data delivery Recipient sends acknowledgment control messages (ACK) to sender to verify successful receipt of data Sender sets timer when data transmitted; if timer expires before acknowledgment arrives, sender retransmits (with new timer)

TCP/IP: Basics19 Lost Packets

TCP/IP: Basics20 TCP Segments Application delivers arbitrarily large chunks of data (blocks) to TCP as a “stream”. TCP breaks this data into segments, each of which fits into an IP datagram. Original stream is numbered by bytes. Segment contains sequence number of data bytes.

TCP/IP: Basics21 Acknowledgements Receiver sends segment with sequence number of acknowledged data (not segments). One ACK can acknowledge many segments.

TCP/IP: Basics22 Timeout Inappropriate timeout can cause poor performance: –Too long - sender waits longer than necessary before re-transmitting –Too short - sender generates unnecessary traffic Timeout must be different for each connection and set dynamically –Host on same LAN should have shorter timeout than host 20 hops away –Delivery time across internet may change over time; timeout must accommodate changes

TCP/IP: Basics23 RTOs for Different Network Delays

TCP/IP: Basics24 Choosing RTO Timeout should be based on round trip time or delay (RTT) Sender estimates RTT for each active connection by measuring the time needed to receive a response. Updated dynamically. Sender picks retransmission timeout (RTO) based on previous RTTs Specific method is call adaptive retransmission algorithm

TCP/IP: Basics25 TCP Sliding Window TCP uses sliding window for flow control. Receiver specifies window: –Called window advertisement –Specifies which bytes in the data stream can be sent –Carried in segment along with ACK Sender can transmit any bytes, in any size segment, between last acknowledged byte and within window size.

TCP/IP: Basics26 TCP Sliding Window

TCP/IP: Basics27 TCP Sliding Window with Acknowledgements

TCP/IP: Basics28 Congestion Control Excessive traffic can cause packet loss. –Transport protocols respond with retransmission. –Excessive retransmission can cause congestion collapse. TCP interprets packet (segment) loss as an indicator of congestion. Sender uses TCP congestion control and slows transmission of packets when a packet is lost. –Sends single packet.

TCP/IP: Basics29 Congestion Control –If ACK returns without loss, sends two packets, and if two ACKs return, sends four packets, and so on, doubling each time until….one half window size. –When TCP sends one-half window size, rate of increase slows.

TCP/IP: Basics30 Summary UDP provides end-to-end best-effort message delivery –IP used for delivery to destination host –Protocol ports demultiplex to destination application TCP provides end-to-end reliable byte stream delivery –IP used for delivery to destination host –Protocol ports demultiplex to destination application –Additional techniques develop reliable delivery from IP messages.

TCP/IP: Basics31 Summary Positive acknowledgment with retransmission Sequence numbers detect missing, duplicate and out-of-order data Sliding window flow control Three-way handshake Congestion control