What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host IP treats a computer as an endpoint of communication Best.

Slides:



Advertisements
Similar presentations
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Advertisements

CCNA – Network Fundamentals
CSCI 4550/8556 Computer Networks
Transmission Control Protocol (TCP)
Intermediate TCP/IP TCP Operation.
Chapter 7: Transport Layer
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
Lecture 7 Transport Layer
Transport Layer – TCP (Part1) Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Chapter 7 – Transport Layer Protocols
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
Copyright 1999, S.D. Personick. All Rights Reserved. Telecommunications Networking II Lecture 32 Transmission Control Protocol (TCP) Ref: Tanenbaum pp:
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
Chapter 3: Transport Layer
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Transport Protocols Slide 1 Transport Protocols.
Transport Layer TCP and UDP IS250 Spring 2010
IP-UDP-RTP Computer Networking (In Chap 3, 4, 7) 건국대학교 인터넷미디어공학부 임 창 훈.
Gursharan Singh Tatla Transport Layer 16-May
Process-to-Process Delivery:
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
1 Chapter Internetworking Part 4 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
1 Transport Layer Computer Networks. 2 Where are we?
Review: –What is AS? –What is the routing algorithm in BGP? –How does it work? –Where is “policy” reflected in BGP (policy based routing)? –Give examples.
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
IP and Errors IP Best Effort Datagrams can be: –Lost –Delayed –Duplicated –Delivered out of order –Corrupted.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 2.6 UDP Principles (Chapter 24) (User Datagram Protocol)
TCOM 509 – Internet Protocols (TCP/IP) Lecture 04_a Transport Protocols - UDP Instructor: Dr. Li-Chuan Chen Date: 09/22/2003 Based in part upon slides.
TCP Lecture 13 November 13, TCP Background Transmission Control Protocol (TCP) TCP provides much of the functionality that IP lacks: reliable service.
26-TCP Dr. John P. Abraham Professor UTPA. TCP  Transmission control protocol, another transport layer protocol.  Reliable delivery  Tcp must compensate.
University of the Western Cape Chapter 12: The Transport Layer.
SMUCSE 4344 transport layer. SMUCSE 4344 transport layer end-to-end protocols –transport code runs only on endpoint hosts encapsulates network communications.
David Wetherall Professor of Computer Science & Engineering Introduction to Computer Networks Transport Layer Overview (§ )
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 2.5 Internetworking Chapter 25 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
ECE 526 – Network Processing Systems Design Networking: protocols and packet format Chapter 3: D. E. Comer Fall 2008.
The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, , WWW) Reliable Stream Transport (TCP) Connectionless Packet Delivery.
1 Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
1 TCP: Reliable Transport Service. 2 Transmission Control Protocol (TCP) Major transport protocol used in Internet Heavily used Completely reliable transfer.
Chapter 3: Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable data transfer.
Institute of Technology Sligo - Dept of Computing Chapter 12 The Transport Layer.
Chapter 24 Transport Control Protocol (TCP) Layer 4 protocol Responsible for reliable end-to-end transmission Provides illusion of reliable network to.
Transmission Control Protocol (TCP) BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
COP 4930 Computer Network Projects Summer C 2004 Prof. Roy B. Levow Lecture 9.
1 End-to-End Protocols User Datagram Protocol (UDP) Transmission Control Protocol(TCP)
UDP & TCP BS IT 4 th Semester By: Muhammad Hanif User Datagram Protocol & Transmission Control Protocol.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
1 User Datagram Protocol. 2 Transport Protocols Provide logical communication between application processes running on different hosts Run on end hosts.
UDP: User Datagram Protocol Chapter 12. Introduction Multiple application programs can execute simultaneously on a given computer and can send and receive.
1 Computer Communication & Networks Lecture 23 & 24 Transport Layer: UDP and TCP Waleed Ejaz
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Cisco I Introduction to Networks Semester 1 Chapter 7 JEOPADY.
Computer Networks 1000-Transport layer, TCP Gergely Windisch v spring.
2: Transport Layer 11 Transport Layer 1. 2: Transport Layer 12 Part 2: Transport Layer Chapter goals: r understand principles behind transport layer services:
3. END-TO-END PROTOCOLS (PART 1) Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University 22 March
UDP: User Datagram Protocol. What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host – treats a computer as an.
1 Chapter 24 Internetworking Part 4 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
Transport Layer.
Process-to-Process Delivery, TCP and UDP protocols
Process-to-Process Delivery:
Process-to-Process Delivery: UDP, TCP
Computer Networks Protocols
UDP Principles (Chapter 24) (User Datagram Protocol)
Transport Layer 9/22/2019.
Presentation transcript:

What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host IP treats a computer as an endpoint of communication Best effort delivery -- no guarantees

What Do Your Applications Need? Individual packets go to their own applications – Your machine may run multiple applications simultaneously Outlook, Firefox, Windows Media Player. Different levels of services – Every bit of information should be received correctly. – Can tolerate some information loss Streamed media

Transport Layer Services Transport layer provides end-to-end connectivity across the network – Virtual communications via TCP software

Endpoint Identification with Protocol Port Numbers Port numbers – Independent of the OS All computers running TCP and UDP recognize the standard protocol port numbers TCP and UDP must provide a mapping between protocol port numbers and the program identifiers that the OS uses

Well-Known Port Numbers 22: SSH 25: SMTP 80: HTTP _UDP_port_numbers _UDP_port_numbers

Layer 4 Packet: Segment Segments carry application data across the network Segments are carried within IP datagrams within frames App, e.g., HTTPIPTCP Frame Segment Datagram

Transport Layer Services TCP/IP suite contains two transport protocols. – User Datagram Protocol (UDP) – Transmission Control Protocol (TCP) UnreliableReliable MessagesUDP? Stream?TCP

Comparison of Transport Protocols TCP is full-featured, UDP is a glorified packet TCP (Stream)UDP (Message) ConnectionsConnectionless Point-to-point communicationArbitrary Interaction Bytes are delivered once, reliably, and in order Message may be lost, reordered, duplicated Arbitrary length contentLimited message size Flow control matches sender to receiver Can send regardless of receiver state Congestion control matches sender to network Can send regardless of network state

UDP: User Datagram Protocol

User Datagram Protocol Used by apps that don’t want reliability or stream service – Voice-over-IP (unreliable) – DNS, RPC (message-oriented) – DHCP (bootstrapping, multicast) Arbitrary Interaction – 1  1; 1  N; N  1; or N  M Best-effort delivery via IP – Lost, duplicated, delayed, delivered out-of order, corrupted

User Datagram Protocol Places the data in a single message for transmission – In practice, choose message size that fits in a standard MTU (e.g., 1500 bytes) 1400 or 1450 to leave space for IP and UDP headers Pros: – Applications preserve data boundaries Cons: – Each UDP message must fit into a single IP datagram – UDP message size can lead to inefficient use of the network

UDP Datagram Format Each UDP message is called a user datagram and consists of two parts: – a short header that specifies the sending and receiving application – a payload that carries the data being sent

UDP Checksum and Pseudo Header Checksum: An optional, 16-bit field may be used by the destination host to verify whether the message reaches the correct destination. – All bits set to 0 if unused When computing the checksum, UDP software includes a pseudo header:

Using the Pseudo Header The destination host must obtain the UDP length, and the source, destination, and type field from the IP datagram to verify the checksum value. The pseudo header is NOT part of the UDP datagram and NOT transmitted with the datagram.

TCP: Reliable Transport Service

Challenges To achieve efficient, reliable data transmission, a transport protocol must face several major problems: – Unreliable underlying IP service – End system reboot – Heterogeneous end systems – Congestion

Sequencing Handle Duplicates and Out-of- Order Delivery Each packet has a sequence number. The receiver stores both the sequence number of the last packet received in order and packets arriving out of order The receiver examines the sequence number – Expected packet – Packet out of order – Duplicated

TCP Last packet # in order: Packets out of order: 7 23 Application

Retransmissions Handle Lost Packets Whenever a frame arrives intact, the receiver sends a small ACK message that reports successful reception The sender ensures that each packet is transferred successfully – Whenever it sends a packet, the sender starts a timer ACK

Connection Establishment Both sender and receiver must be ready before we start the data transfer Three-Way Handshake: To establish connections reliably, TCP exchanges three messages to ensure unambiguous agreement. – SYNs are retransmitted if lost

Connection Establishment Sequencing: To establish connection, TCP requires each side to probe the other with a fresh Initial Sequence Number – A randomly generated 32-bit number

Connection Establishment Three steps: – Host 1 sends SYN(x) – Host 2 replies with ACK(x+1) + SYN(y) – Host 1 replies with ACK(y+1)

Connection Establishment Q: Why choose a random number as the Initial Sequence Number for each connection, instead of using “1”? 1.Two computers agree to communicate at 1 PM 2.One computer sends a sequence of 10 packets to the other 3.A hardware problem causes packet 3 to be delayed 4.Routes change to avoid the hardware problem 5.Protocol software on the sending computer retransmits packet 3 and sends the remaining packets without error 6.At 1:05 PM the two computers agree to communicate again 7.After the second packet arrives, the delayed copy of packet 3 arrives from the earlier conversation 8.Packet 3 arrives from the second conversation Extraordinarily long delay  Replay Error!

Connection Termination The three-way handshake used to close a connection uses FIN segments.