6 Transport Layer Computer Networks Tutun Juhana

Slides:



Advertisements
Similar presentations
Network Operations & administration CS 4592 Lecture 15 Instructor: Ibrahim Tariq.
Advertisements

Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Assume that a file is transferred from a node A to a node B. The file has been fragmented in 5 frames. Frame 0 is corrupted, the ACK of frame 1 is corrupted,
Transmission Control Protocol (TCP)
Flow and Error Control. Flow Control Flow control coordinates the amount of data that can be sent before receiving acknowledgement It is one of the most.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 11 Data Link Control and Protocols.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 13 Introduction to the Transport.
EEC-484/584 Computer Networks Lecture 12 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
3-1 Transport services and protocols r provide logical communication between app processes running on different hosts r transport protocols run in end.
Process-to-Process Delivery:
1 Transport Layer Computer Networks. 2 Where are we?
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
1 Kyung Hee University Chapter 13 Introduction to the Transport Layer.
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 2.5 Internetworking Chapter 25 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
Transport Layer Moving Segments. Transport Layer Protocols Provide a logical communication link between processes running on different hosts as if directly.
Computer Networks23-1 PART 5 Transport Layer. Computer Networks23-2 Position of Transport Layer Responsible for the delivery of a message from one process.
NET 221D:COMPUTER NETWORKS FUNDAMENTALS Lecture : Transport Layer: Behrouz A. Forouzan” Data communications and Networking 1.
Chapter 13 Introduction to the Transport Layer
Transport Layer: Sliding Window Reliability
Lecture Focus: Data Communications and Networking  Data Link Layer  Data Link Control Lecture 22 CSCS 311.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
1 Kyung Hee University Chapter 11 User Datagram Protocol.
1 Computer Communication & Networks Lecture 23 & 24 Transport Layer: UDP and TCP Waleed Ejaz
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
DATA LINK CONTROL. DATA LINK LAYER RESPONSIBILTIES  FRAMING  ERROR CONTROL  FLOW CONTROL.
Process-to-Process Delivery:
Chapter 3: The Data Link Layer –to achieve reliable, efficient communication between two physically connected machines. –Design issues: services interface.
Chapter 23 Introduction To Transport Layer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Chapter 24 Internetworking Part 4 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
Chapter 11 User Datagram Protocol
The Transport Layer Implementation Services Functions Protocols
Process-to-Process Delivery UDP, TCP, and SCTP
Computer Communication & Networks
2.10 Flow and Error Control Before that ...
Data Link Layer Flow Control.
Part III Datalink Layer 10.
Chapter 11 Data Link Control
Ch 16 Protocols and Layering
Topics discussed in this section:
Chapter 23 Introduction To Transport Layer
Transport Layer (Part 2)
Process-to-Process Delivery, TCP and UDP protocols
PART 5 Transport Layer Computer Networks.
Instructor Mazhar Hussain
Magda El Zarki Professor, ICS UC, Irvine
Introduction of Transport Protocols
CIS 321 Data Communications & Networking
Flow Control.
Transport Layer Unit 5.
Transport Layer Our goals:
Data Link Layer: Data Link Control
Introduction to the Transport Layer
Chapter 23 Introduction To Transport Layer
Flow and Error Control.
Process-to-Process Delivery:
Chapter 5 Peer-to-Peer Protocols and Data Link Layer
Transport Layer Our goals:
Selective repeat Protocol
CPEG514 Advanced Computer Networkst
Chapter 15 Transmission Control Protocol (TCP)
Chapter 12 Transmission Control Protocol
The Transport Layer Reliability
Chapter 5 Peer-to-Peer Protocols and Data Link Layer
Lecture 4 Peer-to-Peer Protocols and Data Link Layer
Process-to-Process Delivery: UDP, TCP
Computer Networks Protocols
Error Checking continued
Transport Layer 9/22/2019.
Presentation transcript:

6 Transport Layer Computer Networks Tutun Juhana Telecommunication Engineering School of Electrical Engineering & Informatics Institut Teknologi Bandung Computer Networks

Transport Layer Services

Process-to-Process Communication

Addressing: Port Numbers To define the processes, we need identifiers called port numbers In the TCP/IP protocol suite, the port numbers are integers between 0 and 65,535

In client-server paradigm: Client program defines itself ephemeral port number  Short lived  recommended to be greater than 1,023 Server process must use well-known port numbers

ICANN Ranges

Socket Addresses Socket address is the combination of an IP address and a port number

Encapsulation and Decapsulation

Multiplexing and Demultiplexing

Flow Control

Although flow control can be implemented in several ways, one of the solutions is normally to use two buffers. One at the sending transport layer and the other at the receiving transport layer

Error Control Detect and discard corrupted packets. Keep track of lost and discarded packets and resend them. Recognize duplicate packets and discard them. Buffer out-of-order packets until the missing packets arrive.

Sequence Numbers

We can use both positive and negative signals as error control Acknowledgment We can use both positive and negative signals as error control The receiver side can send an acknowledgement (ACK) for each or a collection of packets that have arrived safe and sound can simply discard the corrupted packets The sender can detect lost packets if it uses a timer When a packet is sent, the sender starts a timer; when the timer expires, if an ACK does not arrive before the timer expires, the sender resends the packet. Duplicate packets can be silently discarded by the receiver. Out-of order packets can be either discarded (to be treated as lost packets by the sender), or stored until the missing ones arrives.

Combination of Flow and Error Control

Congestion Control Congestion control refers to the mechanisms and techniques to control the congestion and keep the load below the capacity

Open-Loop Congestion Control Retransmission Policy Window Policy Acknowledgment Policy

Closed-Loop Congestion Control Closed-loop congestion control mechanisms try to alleviate congestion after it happens

Connectionless and Connection-Oriented Services

TRANSPORT-LAYER PROTOCOLS

Simple Protocol

Stop-and-Wait Protocol

Efficiency The Stop-and-Wait protocol is very inefficient if our channel is thick and long By thick, we mean that our channel has a large bandwidth (high data rate) by long, we mean the round-trip delay is long The product of the above two is called the bandwidth-delay product We can think of the channel as a pipe. The bandwidth-delay product then is the volume of the pipe in bits The pipe is always there. If we do not use it, we are inefficient. The bandwidth-delay product is a measure of the number of bits a sender can transmit through the system while waiting for an acknowledgment from the receiver.

Pipelining In networking and in other areas, a task is often begun before the previous task has ended  This is known as pipelining There is no pipelining in the Stop-and-Wait protocol because a sender must wait for a packet to reach the destination and be acknowledged before the next packet can be sent

Go-Back-N Protocol

Timers Resending packets Although there can be a timer for each packet that is sent, in our protocol we use only one. The reason is that the timer for the first outstanding packet always expires first. We resend all outstanding packets when this timer expires. Resending packets When the timer expires, the sender resends all outstanding packets

Selective-Repeat Protocol

Bidirectional Protocols: Piggybacking