TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.

Slides:



Advertisements
Similar presentations
NETWORK LAYER (1) T.Najah AlSubaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
Advertisements

CCNA – Network Fundamentals
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Transport Layer Network Fundamentals – Chapter 4.
Transmission Control Protocol (TCP)
Intermediate TCP/IP TCP Operation.
Guide to TCP/IP, Third Edition
Chapter 7: Transport Layer
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
Lecture 7 Transport Layer
Chapter 7 – Transport Layer Protocols
TRANSPORT LAYER  Session multiplexing  Segmentation  Flow control (TCP)  Connection-oriented (TCP)  Reliability (TCP)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
UNIT 07 Process – to – Process Delivery: UDP,TCP and SCTP
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Transport Protocols Slide 1 Transport Protocols.
Process-to-Process Delivery:
Ch 23 1 Based on Data Communications and Networking, 4th Edition. by Behrouz A. Forouzan, McGraw-Hill Companies, Inc., 2007 Ameera Almasoud.
Ch 23 Ameera Almasoud Based on Data Communications and Networking, 4th Edition. by Behrouz A. Forouzan, McGraw-Hill Companies, Inc., 2007.
Chapter 23 Process-to-Process Delivery UDP, TCP, and SCTP
Process-to-Process Delivery:
Gursharan Singh Tatla Transport Layer 16-May
Process-to-Process Delivery:
1 Transport Layer Computer Networks. 2 Where are we?
Copyright 2003 CCNA 1 Chapter 9 TCP/IP Transport and Application Layers By Your Name.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
TCP/IP: Basics1 User Datagram Protocol (UDP) Another protocol at transport layer is UDP. It is Connectionless protocol i.e. no need to establish & terminate.
6.1. Transport Control Protocol (TCP) It is the most widely used transport protocol in the world. Provides reliable end to end connection between two hosts.
University of the Western Cape Chapter 12: The Transport Layer.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 3 Transport Layer.
TCP/IP Transport and Application (Topic 6)
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
11 TRANSPORT LAYER PROTOCOLS Chapter 6 TCP and UDP SPX and NCP.
1 IS370 Data Communications and Computer Networks Chapter 5 : Transport Layer Instructor : Mr Mourad Benchikh.
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Transmission Control Protocol (TCP)
23.1 Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Process-to-Process Delivery:
Institute of Technology Sligo - Dept of Computing Chapter 12 The Transport Layer.
Computer Networks23-1 PART 5 Transport Layer. Computer Networks23-2 Position of Transport Layer Responsible for the delivery of a message from one process.
NET 221D:COMPUTER NETWORKS FUNDAMENTALS Lecture : Transport Layer: Behrouz A. Forouzan” Data communications and Networking 1.
UDP & TCP BS IT 4 th Semester By: Muhammad Hanif User Datagram Protocol & Transmission Control Protocol.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
1 Kyung Hee University Chapter 11 User Datagram Protocol.
1 Computer Communication & Networks Lecture 23 & 24 Transport Layer: UDP and TCP Waleed Ejaz
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Chapter 14 User Datagram Protocol (UDP) Introduction  Responsibilities of Transport Layer to create a process-to-process communication l using.
Process-to-Process Delivery:
Ch 3. Transport Layer Myungchul Kim
PROCESS-TO-PROCESS DELIVERY UDP, TCP, AND SCTP Lecture 6 : Transport layer.
3. END-TO-END PROTOCOLS (PART 1) Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University 22 March
Ch23 Ameera Almasoud 1 Based on Data Communications and Networking, 4th Edition. by Behrouz A. Forouzan, McGraw-Hill Companies, Inc., 2007.
Chapter 11 User Datagram Protocol
Transport Layer.
Process-to-Process Delivery, TCP and UDP protocols
Transport Layer Transport Services Addressing
Process-to-Process Delivery
PART 5 Transport Layer Computer Networks.
Net 221D : Computer Networks Fundamentals
TCP Transport layer Er. Vikram Dhiman LPU.
Process-to-Process Delivery:
Subject Name: Computer Communication Networks Subject Code: 10EC71
Process-to-Process Delivery:
CPEG514 Advanced Computer Networkst
PART 5 Transport Layer.
Process-to-Process Delivery: UDP, TCP
Computer Networks Protocols
Transport Layer 9/22/2019.
Presentation transcript:

TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331

Introduction  The Internet model has three protocols at the transport layer: UDP, TCP, and SCTP.  UDP: Is the simplest of the three.  TCP: A complex transport layer protocol.  SCTP: The new transport layer protocol that is designed for specific applications such as multimedia.

Process-to-process Delivery  Real communication takes place between two processes (application programs). We need process-to-process delivery.  We need a mechanism to deliver data from one of these processes running on the source host to the corresponding process running on the destination host.  The transport layer is responsible for process-to- process delivery.

Types of Data Delivery

Connectionless Versus Connection- Oriented Service  A transport layer protocol can either be connectionless or connection-oriented.  Connectionless Service  In a connectionless service, the packets are sent from one party to another with no need for connection establishment or connection release.  The packets are not numbered; they may be delayed or lost or may arrive out of sequence.  There is no acknowledgment.  UDP is a connectionless transport layer protocols.

Connectionless Versus Connection- Oriented Service  Connection Oriented Service  In a connection-oriented service, a connection is first established between the sender and the receiver.  Data are transferred.  At the end, the connection is released. TCP and SCTP are connection-oriented protocols.

Reliable Versus Unreliable  The transport layer service can be reliable or unreliable.  If the application layer program needs reliability, we use a reliable transport layer protocol by implementing flow and error control at the transport layer. This means a slower and more complex service.  On the other hand, if the application program does not need reliability then an unreliable protocol can be used.

Transport Layer Protocols  UDP is connectionless and unreliable; TCP and SCTP are connection oriented and reliable.  These three protocols can respond to the demands of the application layer programs.

Error Control

User Datagram Protocol (UDP)  UDP is a connectionless, unreliable transport protocol.  It does not add anything to the services of IP except to provide process-to process communication instead of host-to-host communication.  UDP is a very simple protocol using a minimum of overhead.  If a process wants to send a small message and does not care much about reliability, it can use UDP.  Sending a small message by using UDP takes much less interaction between the sender and receiver than using TCP or SCTP.

User Datagram  UDP packets, called user datagrams, have a fixed size header of 8 bytes.

User Datagram  Source port number: This is the port number used by the process running on the source host.  Destination port number: This is the port number used by the process running on the destination host.  Length: This is a 16-bit field that defines the total length of the user datagram.  Checksum: This field is used to detect errors over the entire user datagram (header plus data).

Connectionless Services  UDP provides a connectionless service:  no relationship between the different user datagram even if they are coming from the same source process and going to the same destination program.  The user datagrams are not numbered.  Also, there is no connection establishment and no connection termination.  Each user datagram can travel on a different path.

Connectionless Services  There is no flow control: The receiver may overflow with incoming messages.  There is no error control mechanism in UDP except for the checksum.  The sender does not know if a message has been lost or duplicated.  When the receiver detects an error through the checksum, the user datagram is discarded.

Use of UDP  UDP is suitable for a process that requires simple request-response communication with little concern for flow and error control.  UDP is suitable for a process with internal flow and error control mechanisms. For example, the Trivial File Transfer Protocol (TFTP) process includes flow and error control.  UDP is used for management processes such as SNMP.

Transmission Control Protocol(TCP)  TCP is called a connection-oriented, reliable transport protocol. It adds connection-oriented and reliability features to the services of IP.  TCP uses flow and error control mechanisms at the transport level.

Connection-oriented Services  TCP creates an environment in which the two processes seem to be connected by an imaginary "tube“ that carries their data across the Internet.

Connection-oriented Services  When a process at site A wants to send and receive data from another process at site B, the following occurs: 1. The two processes establish a connection between them. 2. Data are exchanged in both directions. 3. The connection is terminated.

Reliable Transport Protocol  TCP is a reliable transport protocol. It uses an acknowledgment mechanism to check the safe arrival of data.  Flow Control:  The receiver of the data controls the amount of data that are to be sent by the sender.  Error Control.  Congestion Control:  The amount of data sent by a sender is controlled by the level of congestion in the network.

TCP Segment Format

 The segment consists of a byte header.  Source port address:  This is a 16-bit field, it defines the port number of the application program in the host that is sending the segment.  Destination port address:  This is a 16-bit field, it defines the port number of the application program in the host that is receiving the segment.

TCP Segment Format  Sequence number:  This 32-bit field defines the number assigned to the first byte of data contained in this segment.  Acknowledgment number:  This 32 bit field defines the number of the next byte a party expects to receive.  Header length:  A 4-bit field that indicates the number of 4-byte words in the TCP header.

TCP Segment Format  Control. This field defines 6 different control bits or flags. One or more of these bits can be set at a time.

TCP Segment Format

TCP Connection  A Connection-oriented transport protocol establishes a virtual path between the source and destination.  In TCP, connection-oriented transmission requires three phases: connection establishment, data transfer, and connection termination.

Connection Establishment  TCP transmits data in full-duplex mode  Example: Client-server communication using TCP as the transport layer protocol. 1. The server issues a request for a passive open:  The server program tells its TCP that it is ready to accept a connection. 2. The client program issues a request for an active open:  A client that wishes to connect to an open server tells its TCP that it needs to be connected to that particular server.

Three-step Connection Establishment 1. The client sends the first segment, a SYN segment:  A SYN segment does not carry data, but it consumes one sequence number. 2. The server sends the second segment, a SYN +ACK segment.  It is a SYN segment for communication in the other direction and an acknowledgment for the SYN segment.  A SYN +ACK segment cannot carry data, but does consume one sequence number. 3. The client sends the third segment. This is just an ACK segment. It acknowledges the receipt of the second segment.  An ACK segment, if carrying no data, consumes no sequence number.

Three-step Connection Establishment Using Three-way Handshaking

Data Transfer

Connection Termination Using Three- way Handshaking

Lost Segment

Notes  The FIN segment consumes one sequence number if it does not carry data.  The FIN + ACK segment consumes one sequence number if it does not carry data.  No retransmission timer is set for an ACK segment.  Data may arrive out of order and be temporarily stored by the receiving TCP, but TCP guarantees that no out-of-order segment is delivered to the process.