1 Introduction to Computer Networks University of ilam Dr. Mozafar Bag-Mohammadi Transport Layer.

Slides:



Advertisements
Similar presentations
1 Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie Chapter 5 End-to-End Protocols Copyright © 2010, Elsevier Inc. All rights.
Advertisements

TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
Slide Set 13: TCP. In this set.... TCP Connection Termination TCP State Transition Diagram Flow Control How does TCP control its sliding window ?
CS 6401 Transport Control Protocol Outline TCP objectives revisited TCP basics New algorithms for RTO calculation.
Computer Networks Chapter 5: End-to-End Protocols
Fundamentals of Computer Networks ECE 478/578 Lecture #20: Transmission Control Protocol Instructor: Loukas Lazos Dept of Electrical and Computer Engineering.
1 Chapter 5 End-to-End Protocols Outline 5.1 UDP 5.2 TCP 5.3 Remote Procedure Call.
1 Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie Chapter 5 End-to-End Protocols Copyright © 2010, Elsevier Inc. All rights.
8. Transport Protocol and UDP 8.1 Transport protocol : End-to-end protocol –IP: Host to host packet delivery –Transport: Process to process communication.
CSS432: End-to-End Protocols 1 CSS432 End-to-End Protocols Textbook Ch5.1 – 5.2 Professor: Munehiro Fukuda.
Reliable Byte-Stream (TCP)
Transport Layer – TCP (Part1) Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
1 Reliable Byte-Stream (TCP) Outline Connection Establishment/Termination Sliding Window Revisited Flow Control Adaptive Timeout.
6-May-154/598N: Computer Networks End-to-End Protocols Underlying best-effort network –drop messages –re-orders messages –delivers duplicate copies of.
CSE Computer Networks Prof. Aaron Striegel Department of Computer Science & Engineering University of Notre Dame Lecture 14 – February 23, 2010.
ECE 4450:427/527 - Computer Networks Spring 2015 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 7.1: End-to-end Protocols Dr. Nghi.
Fundamentals of Computer Networks ECE 478/578 Lecture #21: TCP Window Mechanism Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
CSE 124 Networked Services Fall 2009 B. S. Manoj, Ph.D 10/20/20091CSE 124 Networked Services Fall 2009 Some.
CSE 461: Sliding Windows & ARQ. Next Topic  We begin on the Transport layer  Focus  How do we send information reliably?  Topics  The Transport layer.
TDC561 Network Programming Camelia Zlatea, PhD Week 10: Performance Aspects of End-to-End (Transport)
Spring 2003CS 4611 Reliable Byte-Stream (TCP) Outline Connection Establishment/Termination Sliding Window Revisited Flow Control Adaptive Timeout.
TCP. Learning objectives Reliable Transport in TCP TCP flow and Congestion Control.
Spring 2002CS 4611 Reliable Byte-Stream (TCP) Outline Connection Establishment/Termination Sliding Window Revisited Flow Control Adaptive Timeout.
Gursharan Singh Tatla Transport Layer 16-May
Process-to-Process Delivery:
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
1 Transport Layer Computer Networks. 2 Where are we?
1 Chapter 1 OSI Architecture The OSI 7-layer Model OSI – Open Systems Interconnection.
TCP : Transmission Control Protocol Computer Network System Sirak Kaewjamnong.
1 Internet Engineering University of ilam Dr. Mozafar Bag-Mohammadi Transport Layer.
SMUCSE 4344 transport layer. SMUCSE 4344 transport layer end-to-end protocols –transport code runs only on endpoint hosts encapsulates network communications.
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
Transport Layer3-1 Chapter 3: Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable.
CSE Computer Networks Prof. Aaron Striegel Department of Computer Science & Engineering University of Notre Dame Lecture 14 – February 23, 2010.
1 Reliable Byte-Stream (TCP) Outline Connection Establishment/Termination Sliding Window Revisited Flow Control Adaptive Timeout.
1 Transport Layer: Basics Outline Intro to transport UDP Congestion control basics.
Spring 2008CPE Computer Networks1 Reliable Byte-Stream (TCP) Outline Connection Establishment/Termination Sliding Window Revisited Flow Control.
1 End-to-End Protocols User Datagram Protocol (UDP) Transmission Control Protocol(TCP)
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
1 Reliable Byte-Stream (TCP) Outline Connection Establishment/Termination Sliding Window Revisited Flow Control Adaptive Timeout.
Ilam University Dr. Mozafar Bag-Mohammadi 1 Transport Layer.
CSE/EE 461 Sliding Windows and ARQ. 2 Last Time We finished up the Network layer –Internetworks (IP) –Routing (DV/RIP, LS/OSPF) It was all about routing:
EE 122: Transport Protocols Kevin Lai October 16, 2002.
1 End-to-End Protocols UDP TCP –Connection Establishment/Termination –Sliding Window Revisited –Flow Control –Congestion Control –Adaptive Timeout.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
3. END-TO-END PROTOCOLS (PART 1) Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University 22 March
Univ. of TehranIntroduction to Computer Network1 An Introduction Computer Networks An Introduction to Computer Networks University of Tehran Dept. of EE.
Advanced Computer Networks
3. END-TO-END PROTOCOLS (PART 2) Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University 22 March
Transport Control Protocol
5. End-to-end protocols (part 1)
ECE 4450:427/527 - Computer Networks Spring 2017
Internet routing Problem: Route from any node to any other node
The University of Adelaide, School of Computer Science
The University of Adelaide, School of Computer Science
TCP Overview Connection-oriented Byte-stream Full duplex
Transport Control Protocol
Advanced Computer Networks
Reliable Byte-Stream (TCP)
Ilam University Dr. Mozafar Bag-Mohammadi
Transmission Control Protocol (TCP) Part II Neil Tang 11/21/2008
State Transition Diagram
Advanced Computer Networks
The University of Adelaide, School of Computer Science
Introduction to Computer Networks
Introduction to Computer Networks
Introduction to Computer Networks
Lecture 21 and 22 5/29/2019.
Transport Layer 9/22/2019.
Presentation transcript:

1 Introduction to Computer Networks University of ilam Dr. Mozafar Bag-Mohammadi Transport Layer

2 Outline Connection Establishment/Termination Sliding Window Revisited Flow Control Adaptive Timeout

3 End-to-End Protocols Underlying best-effort network  drop messages  re-orders messages  delivers duplicate copies of a given message  limits messages to some finite size  delivers messages after an arbitrarily long delay Common end-to-end services  guarantee message delivery  deliver messages in the same order they are sent  deliver at most one copy of each message  support arbitrarily large messages  support synchronization  allow the receiver to flow control the sender  support multiple application processes on each host

4 Transport Layer Function(s) Multiplexing/demultiplexing between network application processes. Others?  Error Detection within a segment  Reliability  Flow Control.  Congestion control.  Connection Management. Difference between Error detection and reliability? Difference between flow control and congestion control?

5 Data Link Versus Transport Potentially connects many different hosts (logical connection)  need explicit connection establishment and termination Potentially different RTT  need adaptive timeout mechanism Potentially reordering packets. (How far?), Maximum segment life time. Currently 120 sec. Potentially long delay in network  need to be prepared for arrival of very old packets  Delay X bandwidth?  Buffer size

6 Data Link Versus Transport (cont) Potentially different capacity at destination  need to accommodate different node capacity Potentially different network capacity  need to be prepared for network congestion

7 Simple Demultiplexor (UDP) Unreliable and unordered datagram service Adds multiplexing No flow control Endpoints identified by ports  servers have well-known ports  see /etc/services on Unix Header format Optional checksum  pseudo header + UDP header + data SrcPortDstPort ChecksumLength Data 01631

8 Using UDP Non-standard protocols can be implemented on top of UDP. » Non-standard = non-TCP in practice » use the port addressing provided by UDP » implement their own reliability, flow control, ordering, congestion control  Examples: » remote procedure calls » multimedia » distributed computing communication libraries

9 TCP Overview Connection-oriented Byte-stream  app writes bytes  TCP sends segments  app reads bytes Application process Write bytes TCP Send buffer Segment Transmit segments Application process Read bytes TCP Receive buffer … …… Full duplex Flow control: keep sender from overrunning receiver Congestion control: keep sender from overrunning network

10 High level TCP Characteristics Connection-oriented reliable byte-stream protocol. » Used for file transfers, telnet, web access, …. Two way connections. » control information for one direction piggy-backed on data flow in other direction » header fields fall in three classes: general, forward flow, opposite flow

11 Data delivery in TCP TCP is byte oriented, however transmit data in segments (messages). How TCP knows the time for delivery?  Maximum Segment Size (MSS)  Pushed by the application. Like telnet.  Timer

12 Segment Format

13 Segment Format (cont) Each connection identified with 4-tuple:  ( SrcPort, SrcIPAddr, DsrPort, DstIPAddr) Sliding window + flow control  acknowledgment, SequenceNum, AdvertisedWinow Checksum  pseudo header + TCP header + data Sender Data(SequenceNum) Acknowledgment + AdvertisedWindow Receiver

14 Segment Format (cont) Flags  SYN, FIN, RESET, PUSH, URG, ACK  SYN and FIN for establish and tear down connection.  ACK indicates the Ack field is valid.  URG shows some part of data is urgent.(Up to UrgPtr).  PUSH shows the sender had push operation.  RESET shows confusion in receiver.

15 Connection Establishment and Termination Active participant (client) Passive participant (server) SYN, SequenceNum = x SYN + ACK, SequenceNum = y, ACK, Acknowledgment = y + 1 Acknowledgment = x + 1 Client does active connection. Server must do passive connection first. Closing is symmetric, both side must tear down the connection. Three way handshaking. Connection parameter are exchanged first. Acknowledgment shows the next expected sequence number.

16 Sliding Window Revisited Sending side  LastByteAcked < = LastByteSent  LastByteSent < = LastByteWritten  buffer bytes between LastByteAcked and LastByteWritten Sending application LastByteWritten TCP LastByteSentLastByteAcked Receiving application LastByteRead TCP LastByteRcvdNextByteExpected Receiving side  LastByteRead < NextByteExpected  NextByteExpected < = LastByteRcvd +1  buffer bytes between LastByteRead and LastByteRcvd

17 Flow Control Send buffer size: MaxSendBuffer Receive buffer size: MaxRcvBuffer Receiving side  LastByteRcvd - LastByteRead < = MaxRcvBuffer  AdvertisedWindow = MaxRcvBuffer - ( NextByteExpected - LastByteRead ) Sending side  LastByteSent - LastByteAcked < = AdvertisedWindow  EffectiveWindow = AdvertisedWindow - ( LastByteSent - LastByteAcked )  LastByteWritten - LastByteAcked < = MaxSendBuffer  block sender if ( LastByteWritten - LastByteAcked ) + y > MaxSenderBuffer Always send ACK in response to arriving data segment Persist when AdvertisedWindow = 0

18 Adaptive Retransmission (Original Algorithm) Measure SampleRTT for each segment/ ACK pair Compute weighted average of RTT  EstRTT =  x EstRTT +  x SampleRTT  where  +  = 1   between 0.8 and 0.9   between 0.1 and 0.2 Set timeout based on EstRTT  TimeOut = 2 x EstRTT

19 Karn/Partridge Algorithm Do not sample RTT when retransmitting Double timeout after each retransmission SenderReceiver Original transmission ACK SampleR TT Retransmission SenderReceiver Original transmission ACK SampleR TT Retransmission

20 Jacobson/ Karels Algorithm New Calculations for average RTT Diff = SampleRTT - EstRTT EstRTT = EstRTT + (  x Diff) Dev = Dev +  ( |Diff| - Dev)  where  is a factor between 0 and 1 Consider variance when setting timeout value TimeOut =  x EstRTT +  x Dev  where  = 1 and  = 4 Notes  algorithm only as good as granularity of clock (500ms on Unix)  accurate timeout mechanism important to congestion control (later)