Computer Networks23-1 PART 5 Transport Layer. Computer Networks23-2 Position of Transport Layer Responsible for the delivery of a message from one process.

Slides:



Advertisements
Similar presentations
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Advertisements

Transmission Control Protocol (TCP)
Intermediate TCP/IP TCP Operation.
Guide to TCP/IP, Third Edition
Chapter 7 – Transport Layer Protocols
TCP/IP Protocol Suite 1 Chapter 13 Upon completion you will be able to: Stream Control Transmission Protocol Be able to name and understand the services.
TCP/IP Protocol Suite 1 Chapter 13 Upon completion you will be able to: Stream Control Transmission Protocol Be able to name and understand the services.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 13 Introduction to the Transport.
UNIT 07 Process – to – Process Delivery: UDP,TCP and SCTP
The Transport Layer How do we ensure that packets get delivered to the process that needs them?
Process-to-Process Delivery:
Ch 23 1 Based on Data Communications and Networking, 4th Edition. by Behrouz A. Forouzan, McGraw-Hill Companies, Inc., 2007 Ameera Almasoud.
Ch 23 Ameera Almasoud Based on Data Communications and Networking, 4th Edition. by Behrouz A. Forouzan, McGraw-Hill Companies, Inc., 2007.
Chapter 23 Process-to-Process Delivery UDP, TCP, and SCTP
Process-to-Process Delivery:
Gursharan Singh Tatla Transport Layer 16-May
Process-to-Process Delivery:
Chapter 16 Stream Control Transmission Protocol (SCTP)
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
1 Chapter Internetworking Part 4 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
1 Transport Layer Computer Networks. 2 Where are we?
23.1 Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Kyung Hee University Chapter 13 Introduction to the Transport Layer.
Transport Layer 3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All.
SMUCSE 4344 transport layer. SMUCSE 4344 transport layer end-to-end protocols –transport code runs only on endpoint hosts encapsulates network communications.
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 2.5 Internetworking Chapter 25 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
1 IS370 Data Communications and Computer Networks Chapter 5 : Transport Layer Instructor : Mr Mourad Benchikh.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 12 Transmission Control Protocol (TCP)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Transmission Control Protocol (TCP)
23.1 Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Process-to-Process Delivery:
NET 221D:COMPUTER NETWORKS FUNDAMENTALS Lecture : Transport Layer: Behrouz A. Forouzan” Data communications and Networking 1.
ECE 4110 – Internetwork Programming
Chapter 13 Introduction to the Transport Layer
Stream Control Transmission Protocol
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 12 Transmission Control Protocol (TCP)
TCP Transmission Control Protocol Part 2 CH 23 Aseel Alturki.
1 Kyung Hee University PART 5 Transport Layer. 2 Kyung Hee University Role of position of Transport Layer  Overseeing the delivery of data from a process,
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 16 Stream Control Transmission.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
1 Kyung Hee University Chapter 11 User Datagram Protocol.
1 Computer Communication & Networks Lecture 23 & 24 Transport Layer: UDP and TCP Waleed Ejaz
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
2: Transport Layer 11 Transport Layer 1. 2: Transport Layer 12 Part 2: Transport Layer Chapter goals: r understand principles behind transport layer services:
Process-to-Process Delivery:
PROCESS-TO-PROCESS DELIVERY UDP, TCP, AND SCTP Lecture 6 : Transport layer.
3. END-TO-END PROTOCOLS (PART 1) Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University 22 March
Chapter 23 Introduction To Transport Layer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Chapter 24 Internetworking Part 4 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
Ch23 Ameera Almasoud 1 Based on Data Communications and Networking, 4th Edition. by Behrouz A. Forouzan, McGraw-Hill Companies, Inc., 2007.
Chapter 11 User Datagram Protocol
Chapter 9: Transport Layer
Instructor Materials Chapter 9: Transport Layer
Chapter 16 Stream Control Transmission Protocol (SCTP)
Transport Layer.
Process-to-Process Delivery, TCP and UDP protocols
PART 5 Transport Layer Computer Networks.
TCP Transport layer Er. Vikram Dhiman LPU.
Transport Layer Unit 5.
Process-to-Process Delivery:
CPEG514 Advanced Computer Networkst
PART V Transport Layer.
PART 5 Transport Layer.
Process-to-process delivery UDP TCP SCTP
Process-to-Process Delivery: UDP, TCP
Computer Networks Protocols
Transport Layer 9/22/2019.
Presentation transcript:

Computer Networks23-1 PART 5 Transport Layer

Computer Networks23-2 Position of Transport Layer Responsible for the delivery of a message from one process to another

Computer Networks23-3 Chapter 23. Process-to-Process Delivery UDP, TCP, and SCTP 23.1 Process-to-Process Delivery 23.2 UDP 23.3 TCP 23.4 SCTP

Computer Networks23-4 Types of data deliveries The transport layer is responsible for process-to-process delivery. Process (application program ??)

Computer Networks23-5 Client-Server Paradigm Address required for delivery Transport layer address: port number Addressing Most common process-to-process communication is the client-server paradigm Operating systems support multiuser and multiprogramming environments. Local host, local process, remote host, remote process must be defined

Computer Networks23-6 Port Numbers 16 bits between 0 and 65553: ephemeral port number IANA (Internet Assigned Number Authority) range: well-known ports, registered ports, dynamic ports

Computer Networks23-7 IP Addresses vs. Port Numbers

Computer Networks23-8 Socket address Process-to-process delivery needs two identifiers, IP address and the port number Socket address is the combination of an IP address and a port number A transport-layer protocol needs a pair of socket addresses; the client and server socket address

Computer Networks23-9 Multiplexing and demultiplexing Addressing mechanism allows multiplexing and demultiplexing by the transport layer

Computer Networks23-10 Connectionless vs. Connection-oriented Connection-oriented: connection established, data transferred, connection released –TCP and SCTP Connectionless: UDP Reliable vs. Unreliable

Computer Networks23-11 Position of UDP, TCP, and SCTP

Computer Networks23-12 UDP The User Datagram Protocol (UDP) is called a connectionless, unreliable transport protocol. It does not add anything to the services of IP except to provide process-to- process communication instead of host-to-host communication UDP is a convenient transport-layer protocol for applications that provide flow and error control. It is also used by multimedia applications. The calculation of checksum and its inclusion in the user datagram are optional

Computer Networks23-13 Well-known Ports for UDP

Computer Networks23-14 UDP: Checksum Checksum includes three section: a pseudoheader, the UDP header, and the data from the application layer

Computer Networks23-15 UDP: Checksum Example for checksum calculation of a simple UDP user datagram

Computer Networks23-16 UDP Operation Connectionless services Flow and error control: no control without checksum Encapsulation and decapsulation Queuing

Computer Networks23-17 Use of UDP Suitable for a process that requires simple request-response communication with little concern for flow and error control Suitable for a process with internal flow and error control mechanisms such as TFTP Suitable for multicasting Used for management processes such as SNMP Used for some route updating protocols such as RIP

Computer Networks23-18 TCP Transmission Control Protocol Connection-oriented, reliable transport protocol It adds connection-oriented and reliability features to the services of IP Like UDP, TCP uses port numbers as transport-layer addresses Unlike UDP, TCP is a stream-oriented protocol

Computer Networks23-19 Well-known Ports for TCP

Computer Networks23-20 Sending and Receiving Buffers Buffering handles the disparity between the speed of the producing and consuming processes One example: to use a circular array of 1-byte locations

Computer Networks23-21 TCP Segments IP layer needs to send data in packets not as a stream of byte

Computer Networks23-22 TCP Features Numbering system: sequence number and acknowledgment number Byte number: The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a randomly generated number The value in the sequence number field of a segment defines the number of the first data byte contained in that segment The value of the acknowledgment field in a segment defines the number of the next byte a party expects to receive. The acknowledgment number is cumulative

Computer Networks23-23 TCP Segment Format

Computer Networks23-24 TCP Control Field

Computer Networks23-25 A TCP Connection: Establishment Connection establishment: Three-way handshaking A SYN segment cannot carry data, but it consumes one sequence number A SYN + ACK segment cannot carry data, but does consume one sequence number An ACK segment, if carrying no data, consumes no sequence number Simultaneous open and SYN flooding attack (denial-of service attack, cookie)

Computer Networks23-26 A TCP Connection: Data Transfer After connection is established, bidirectional data transfer can take place Pushing data and urgent data

Computer Networks23-27 A TCP Connection: Connection Termination Three-way handshaking The FIN segment consumes one sequence number if it does not carry data The FIN + ACK segment consumes one sequence number if it does not carry data

Computer Networks23-28 Connection Termination: Half-Close

Computer Networks23-29 Flow Control A sliding window is used to make transmission more efficient as well as to control the flow of data so that the destination does not become overwhelmed with data. TCP sliding windows are byte-oriented.

Computer Networks23-30 TCP Sliding Window ❏ The size of the window is the lesser of rwnd and cwnd. ❏ The source does not have to send a full window’s worth of data. ❏ The window can be opened or closed by the receiver, but should not be shrunk. ❏ The destination can send an acknowledgment at any time as long as it does not result in a shrinking window. ❏ The receiver can temporarily shut down the window; the sender, however, can always send a segment of 1 byte after the window is shut down.

Computer Networks23-31 Error Control Error detection and correction in TCP is achieved through the use of three simple tools: checksum, acknowledgment, and time-out Checksum: If corrupted, it is discarded and considered as lost Acknowledgment: –ACK segments do not consume sequence numbers and are not acknowledged Retransmission: –In modern implementations, a retransmission occurs if the retransmission timer expires or three duplicate ACK segments have arrived –No retransmission timer is set for an ACK segment –Retransmission after RTO (Retransmission Time-Out): RTO is updated based on the RTT (Round Trip Time) –Retransmission after three duplicate ACK segments Out-of-order segments –Data may arrive out of order and be temporarily stored by the receiving TCP, but TCP guarantees that no out-of-order segment is delivered to the process

Computer Networks23-32 TCP Scenarios Normal Operation

Computer Networks23-33 TCP Scenarios Lost Segment The receiver TCP delivers only ordered data to the process

Computer Networks23-34 TCP Scenarios Fast retransmission

Computer Networks23-35 SCTP Stream Control Transmission Protocol (SCTP) is a new reliable, message-oriented transport layer protocol that combines the best features of UDP and TCP SCTP Services: –Process-to-process communication: use all well-known ports in TCP –Multiple streams –Multihoming –Full-duplex communication –Connection-oriented service –Reliable service

Computer Networks23-36 SCTP Services Multiple streams: An association in SCTP can involve multiple streams Multihoming: SCTP association allows multiple IP addresses for each end

Computer Networks23-37 SCTP Features Transmission sequence number is used to number a data chunk Stream identifier (SI) to distinguish between different streams Stream sequence number to distinguish between different data chunks belong to the same stream Packets: TCP has segments; SCTP has packets –In SCTP, control information and data information are carried in separate chunks

Computer Networks23-38 Differences between SCTP and TCP 1.The control information in TCP is part of the header; the control information in SCTP is included in the control chunks 2.The data in a TCP segment treated as one entity; an SCTP packet can carry several data chunks 3.The option section, which can be part of a TCP segment, does not exist in an SCTP packet 4.The mandatory part of the TCP header is 20 bytes, while the general header in SCTP is only 12 bytes 5.The checksum in TCP is 16 bits; in SCTP, it is 32 bits 6.The verification tag in SCTP is an association identifier, which does not exist in TCP 7.TCP includes one sequence number in the header, which defines the number of the first byte in the data section. AN SCTP packet can include several different data chunks 8.Some segments in TCP that carry control information (such as SYN and FIN) need to consume one sequence number; control chunks in SCTP never use a TSN, SI, or SSN

Computer Networks23-39 Packet, Data Chunks, and Stream Data chunks are identified by three items: TSN, SI, and SSN. TSN is a cumulative number identifying the association; SI defines the stream; SSN defines the chunk in a stream Acknowledgment Number In SCTP, acknowledgment numbers are used to acknowledge only data chunks; control chunks are acknowledged by other control chunks if necessary

Computer Networks23-40 SCTP Packet Format In an SCTP packet, control chunks come before data chunks General Header

Computer Networks23-41 SCTP Chunks

Computer Networks23-42 SCTP Association SCTP, like TCP, is a connection-oriented protocol A connection in SCTP is called an association to emphasize multihoming Association establishment requires a four-way handshake No other chunk is allowed in a packet carrying an INIT or INIT ACK chunk. A COOKIE ECHO or a COOKIE ACK chunk can carry data chunks

Computer Networks23-43 SCTP Association: Data Transfer Bidirectional data transfer Like TCP, SCTP supports piggybacking In SCTP, only DATA chunks consume TSNs; DATA chunks are the only chunks that are acknowledged The acknowledgment in SCTP defines the cumulative TSN, the TSN of the last data chunk received in order

Computer Networks23-44 Association Termination

Computer Networks23-45 SCTP Flow Control Flow control in SCTP is similar to that in TCP. But, SCTP use two units of data, the byte and the chunk. The value of rwnd and cwnd are expressed in byte; the value of TSN and acknowledgment are in chunks

Computer Networks23-46 Flow Control Scenario

Computer Networks23-47 SCTP Error Control SCTP, like TCP, is a reliable transport layer. It uses a SACK chunk to report the state of the receiver buffer to the sender

Computer Networks23-48 Error Control Sending Data Chunks: Whenever there are data chunks in the sending queue with a TSN greater than or equal curTSN or if there are data chunks in the retransmission queue (the total size of the data chunks included in the packet must not exceed rwnd - inTransit Retransmission: Using retransmission timers and receiving four SACKs with the same missing chunks Generating SACK Chunks: Similar rule used for ACK with the TCP ACK flag Congestion Control : The same strategies in TCP (Chapter 24). SCTP has slow start (exponential increase), congestion avoidance (additive increase), and congestion detection (multiplicative decrease). SCTP also use fast retransmission and fast recovery