WXES2106 Network Technology Semester 1 2004/2005 Chapter 8 Intermediate TCP CCNA2: Module 10.

Slides:



Advertisements
Similar presentations
PJC CCNA Semester 2 Ver. 3.0 by William Kelly
Advertisements

Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Cisco 2 - Routers Perrine. J Page 14/30/2015 Chapter 10 TCP/IP Protocol Suite The function of the TCP/IP protocol stack is to transfer information from.
CISCO NETWORKING ACADEMY Chabot College ELEC Transport Layer (4)
CCNA – Network Fundamentals
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Transport Layer Network Fundamentals – Chapter 4.
Transmission Control Protocol (TCP)
Intermediate TCP/IP TCP Operation.
Guide to TCP/IP, Third Edition
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
Chapter 7: Transport Layer
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking Assist. Prof.
Lecture 7 Transport Layer
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
Chapter 7 – Transport Layer Protocols
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Transport Layer.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
TCP. Learning objectives Reliable Transport in TCP TCP flow and Congestion Control.
Chapter 4 OSI Transport Layer
Gursharan Singh Tatla Transport Layer 16-May
Process-to-Process Delivery:
TCP/IP Application and Transport
Networking Basics TCP/IP TRANSPORT and APPLICATION LAYER Version 3.0 Cisco Regional Networking Academy.
The Saigon CTT Semester 1 CHAPTER 12 – 13 – 14 Le Chi Trung.
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Copyright 2003 CCNA 1 Chapter 9 TCP/IP Transport and Application Layers By Your Name.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
1 7-Oct-15 OSI transport layer CCNA Exploration Semester 1 Chapter 4.
1 Version 3.0 Module 11 TCP Application and Transport.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
University of the Western Cape Chapter 12: The Transport Layer.
Transmission Control Protocol TCP. Transport layer function.
Routers and Routing Basics CCNA 2 Chapter 10.
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
Transport Layer Moving Segments. Transport Layer Protocols Provide a logical communication link between processes running on different hosts as if directly.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
Networking Basics CCNA 1 Chapter 11.
Institute of Technology Sligo - Dept of Computing Chapter 12 The Transport Layer.
Chapter 24 Transport Control Protocol (TCP) Layer 4 protocol Responsible for reliable end-to-end transmission Provides illusion of reliable network to.
Chapter 9: Transport Layer
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 10 Intermediate TCP/IP.
Page 12/9/2016 Chapter 10 Intermediate TCP : TCP and UDP segments, Transport Layer Ports CCNA2 Chapter 10.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
1 Version 3.1 Module 10 Intermediate TCP/IP (Layer 4)
01_NF_Ch04 – OSI Transport Layer ( 傳輸層 ) Source: CCNA Exploration.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
© 2002, Cisco Systems, Inc. All rights reserved..
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Cisco I Introduction to Networks Semester 1 Chapter 7 JEOPADY.
1 14-Jun-16 S Ward Abingdon and Witney College CCNA Exploration Semester 1 OSI transport layer CCNA Exploration Semester 1 Chapter 4.
1 Transmission Control Protocol (TCP) RFC: Introduction The TCP is intended to provide a reliable process-to-process communication service in a.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI transport layer CCNA Exploration Semester 1 – Chapter 4.
Chapter 7: Transport Layer
Chapter 9: Transport Layer
Fast Retransmit For sliding windows flow control we waited for a timer to expire before beginning retransmission of a packet TCP uses an additional mechanism.
Instructor Materials Chapter 9: Transport Layer
CCNA 2 v3.1 Module 10 Intermediate TCP/IP
Process-to-Process Delivery:
Process-to-Process Delivery: UDP, TCP
The TCP/IP Model.
Transport Layer 9/22/2019.
Presentation transcript:

WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10

Contents Introduction TCP Operation Transport Layer Port

Introduction The transport layer is responsible for the reliable transport of and regulation of data flow from source to destination. This is accomplished through the use of sliding windows and sequencing numbers along with a synchronization process. The transport layer provides transport services from the source host to the destination host. It establishes a logical connection between the endpoints of the network. Transport services segment and reassemble several upper-layer applications onto the same transport layer data stream.

TCP Operation Flow Control As the transport layer sends data segments, it tries to ensure that data is not lost. A receiving host that is unable to process data as quickly as it arrives could be a cause of data loss. The receiving host is then forced to discard it. Flow control avoids the problem of a transmitting host overflowing the buffers in the receiving host.

TCP Operation

Session establishment, maintenance, and termination Transport functionality is accomplished on a segment- by-segment basis. For data transfer to begin, both the sending and receiving applications inform the respective operating systems that a connection will be initiated. The connection is established and the transfer of data begins after all synchronization has occurred. At the end of data transfer, the sending host sends a signal that indicates the end of the transmission.

TCP Operation Three-way handshake Prior to data transmission, the two communicating hosts go through a synchronization process to establish a virtual connection. It ensures that both sides are ready for data transmission and allows the devices to determine the initial sequence numbers. One host sends a synchronization (SYN) packet to initiate a connection. This packet has an initial sequence number of x with a bit in the header that indicates a connection request. This bit is set in the acknowledgment number field of the TCP header, which is also referred to as the code field.

TCP Operation The other host receives the packet, records the sequence number of x, replies with an acknowledgment (ACK) of x + 1, and includes its own initial sequence number of y. The acknowledgment number of x + 1 means the host has received all octets up to and including x, and expects x + 1 next. The initiating host responds with a simple ACK of y + 1, which is the sequence number of Host B + 1. This indicates that it received the previous ACK and finalizes the connection process.

TCP Operation

Windowing TCP is responsible for breaking data into segments. Once the data is segmented, it must be transmitted to the destination device. Window size determines the amount of data that can be transmitted at one time before the destination responds with an ACK. After a host transmits the window-sized number of bytes, the host must receive an acknowledgment that the data has been received before it can send any more data.

TCP Operation

TCP utilizes a sliding window when determining transmission size. A sliding window allows for devices to negotiate a window size to allow for more than one byte to be sent during a single transmission. For example, the sender sends three packets before expecting an ACK. If the receiver can handle a window size of only two packets, the window drops packet three, specifies three as the next packet, and specifies a new window size of two.

TCP Operation

Sequence Number TCP applies sequence numbers to the data segments that are transmitted so that the receiver can reassemble the bytes in their original order. These sequencing numbers also act as reference numbers so that the receiver will know if it has received all of the data. They also identify the missing data pieces to the sender so it can retransmit the missing data.

TCP Operation Acknowledgement Positive acknowledgment with retransmission (PAR) is one technique that guarantees reliable delivery of data. It requires a recipient to communicate with the source and send back an acknowledgment message when the data is received. The sender also starts a timer when it sends a segment and will retransmit a segment if the timer expires before an acknowledgment arrives. If a packet does not arrive at the destination, the receiver acknowledges with a request to resend the packet. The sender will resends the packet

TCP Operation

Denial of service attacks Deny services to legitimate hosts that try to establish connections. Used by hackers to halt system responses. One type of DoS is known as SYN flooding. The hacker initiates a SYN but spoofs the source IP address. Spoofing is a term used when the receiving device replies to a non-existent, unreachable IP address and then is placed in a wait state until it receives the final ACK from the initiator. This wait state requires the attacked device to use system resources, such as memory, until the connection timer times out

TCP Operation To defend against these attacks, system administrators may decrease the connection timeout period and increase the connection queue size.

Transport Layer Port A port number must be associated with the conversation between hosts to ensure that the packet reaches the appropriate service on the server. Hosts running TCP/IP associate ports at the transport layer with certain applications. Port numbers are needed for a host to communicate with a server that uses multiple services. Both TCP and UDP use port or socket numbers to pass information to the upper layers.

Transport Layer Port

Port numbers have the following assigned ranges: The Well Known Ports are those from 0 through 1023 The Registered Ports are those from 1024 through The Dynamic and/or Private Ports are those from through Source port numbers for these requests are dynamically assigned by the originating host, and are usually a number larger than Clients and servers use ports to distinguish which process each segment is associated with.

Transport Layer Port Port numbers are represented by 2 bytes in the header of a TCP or UDP segment. This 16-bit value can result in port numbers ranging from 0 to The source and destination port numbers combine with the network address to form a socket. A pair of sockets, one on each host, forms a unique connection.