Networks, Part 2 March 7, 2001. 2 Networks End to End Layer  Build upon unreliable Network Layer  As needed, compensate for latency, ordering, data.

Slides:



Advertisements
Similar presentations
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Advertisements

CISCO NETWORKING ACADEMY Chabot College ELEC Transport Layer (4)
Intermediate TCP/IP TCP Operation.
Guide to TCP/IP, Third Edition
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
IS333, Ch. 26: TCP Victor Norman Calvin College 1.
1 Chapter 3 TCP and IP. Chapter 3 TCP and IP 2 Introduction Transmission Control Protocol (TCP) Transmission Control Protocol (TCP) User Datagram Protocol.
BZUPAGES.COM 1 User Datagram Protocol - UDP RFC 768, Protocol 17 Provides unreliable, connectionless on top of IP Minimal overhead, high performance –No.
Transport Layer – TCP (Part1) Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Transport Layer 3-1 Transport services and protocols  provide logical communication between app processes running on different hosts  transport protocols.
Copyright 1999, S.D. Personick. All Rights Reserved. Telecommunications Networking II Lecture 32 Transmission Control Protocol (TCP) Ref: Tanenbaum pp:
Transport Layer 3-1 Transport Layer r To learn about transport layer protocols in the Internet: m TCP: connection-oriented protocol m Reliability protocol.
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Transport Layer.
Computer Networks Transport Layer. Topics F Introduction  F Connection Issues F TCP.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Transport Protocols Slide 1 Transport Protocols.
3-1 Transport services and protocols r provide logical communication between app processes running on different hosts r transport protocols run in end.
Transport Layer TCP and UDP IS250 Spring 2010
IP-UDP-RTP Computer Networking (In Chap 3, 4, 7) 건국대학교 인터넷미디어공학부 임 창 훈.
Gursharan Singh Tatla Transport Layer 16-May
NETWORKING CONCEPTS. TCP/IP The TCPIIP protocol suite was developed prior to the OSI model TCP/IP protocol suite was defined as having four layers: Host-to-network,
What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host IP treats a computer as an endpoint of communication Best.
Process-to-Process Delivery:
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
Lect3..ppt - 09/12/04 CIS 4100 Systems Performance and Evaluation Lecture 3 by Zornitza Genova Prodanoff.
1 Chapter Internetworking Part 4 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
1 Transport Layer Computer Networks. 2 Where are we?
Review: –What is AS? –What is the routing algorithm in BGP? –How does it work? –Where is “policy” reflected in BGP (policy based routing)? –Give examples.
IP and Errors IP Best Effort Datagrams can be: –Lost –Delayed –Duplicated –Delivered out of order –Corrupted.
6.1. Transport Control Protocol (TCP) It is the most widely used transport protocol in the world. Provides reliable end to end connection between two hosts.
1 7-Oct-15 OSI transport layer CCNA Exploration Semester 1 Chapter 4.
TCP/IP Suite Transmission Control Protocol/ Internet Protocol Presentation by Chandra Porchia.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 04_b Transport Protocols - TCP Instructor: Dr. Li-Chuan Chen Date: 09/22/2003 Based in part upon slides.
University of the Western Cape Chapter 12: The Transport Layer.
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 2.5 Internetworking Chapter 25 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Copyright 2002, S.D. Personick. All Rights Reserved.1 Telecommunications Networking II Topic 20 Transmission Control Protocol (TCP) Ref: Tanenbaum pp:
The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, , WWW) Reliable Stream Transport (TCP) Connectionless Packet Delivery.
Transport Layer Moving Segments. Transport Layer Protocols Provide a logical communication link between processes running on different hosts as if directly.
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
Chapter 24 Transport Control Protocol (TCP) Layer 4 protocol Responsible for reliable end-to-end transmission Provides illusion of reliable network to.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
4343 X2 – The Transport Layer Tanenbaum Ch.6.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
1 Computer Communication & Networks Lecture 23 & 24 Transport Layer: UDP and TCP Waleed Ejaz
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 3: Transport.
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Computer Networks 1000-Transport layer, TCP Gergely Windisch v spring.
1 TCP ProtocolsLayer name DNSApplication TCP, UDPTransport IPInternet (Network ) WiFi, Ethernet Link (Physical)
Process-to-Process Delivery:
Ch 3. Transport Layer Myungchul Kim
Chapter 9 The Transport Layer The Internet Protocol has three main protocols that run on top of IP: two are for data, one for control.
3. END-TO-END PROTOCOLS (PART 1) Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University 22 March
1 Chapter 24 Internetworking Part 4 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
Introduction to TCP/IP networking
Introduction to Networks
5. End-to-end protocols (part 1)
Chapter 6: Transport Layer (Part I)
Internet Protocol: Connectionless Datagram Delivery
Introduction of Transport Protocols
Transport Layer Unit 5.
Transport Layer Our goals:
Sarah Diesburg Operating Systems COP 4610
Process-to-Process Delivery:
Andy Wang Operating Systems COP 4610 / CGS 5765
CPEG514 Advanced Computer Networkst
Process-to-Process Delivery: UDP, TCP
Computer Networks Protocols
Transport Layer 9/22/2019.
Presentation transcript:

Networks, Part 2 March 7, 2001

2 Networks End to End Layer  Build upon unreliable Network Layer  As needed, compensate for latency, ordering, data integrity, routing accuracy, security,...  Create Transport Protocols  Send messages or streams across a network  Sources/Destinations are applications on hosts attached to the network  Apps listen for messages on Ports  Apps specify a message handler that listens to a port and delivers messages

3 Networks, cont. Generic Message Protocol  General Send Message interface contains:  send (destination address, destination port, reply port, outgoing message)  General Receive Message Interface (e.g., a call back registered by the application):  accept (source address, source reply port, incoming message)

4 Generic Streaming Protocol  Connection interface:  open (dest_address, dest_port, reply_port)  this returns some kind of stream id  close (stream_id)  Write interface:  write (stream_id, data)  Notice that writes don’t require dest. address Networks, cont.

5 Streaming Protocol, example  Read interface:  getting a stream_id can take many forms  e.g., request_stream (service_name, stream_name)  get_more_stream_data (stream_id)  end_of_stream? (stream_id) Networks, cont.

6 Real examples - */IP  IP is the Network Layer Internet Protocol  UDP/IP - User Datagram Protocol over IP  TCP/IP - Transmission Control Protocol over IP  RTP/IP - Real-Time Protocol over IP Networks, cont.

7 UDP/IP  Adds the notion of ports  Can be used to direct traffic to particular applications  Adds a level of data integrity (a checksum)  This, on top of what the link layer already does  Not completely redundant  No additional notion of reliability Networks, cont.

8 TCP/IP  Messages arrive in same order as they are sent  No missing packets  No duplicate packets  Some error checking  Some flow control (to manage congestion) Networks, cont. What many Internet services are based upon

9 RTP/IP  Built on top of UDP  Packets are time-stamped  No other integrity guarantees Networks, cont. Low overhead, good for streaming

10 At Least Once Delivery  At least one copy of a message must be delivered to the receiver  Message consists of one or more datagrams  Datagram Header contains a Datagram ID  Sender gives Datagram to network layer, waits for ACK, retries after timeout  What timeout period should be used?  Fixed timeout is simple but not optimal  Exponential back off is better Networks, cont.

11 At Least Once Delivery, cont.  Receiver can also use NAKs  Assumes datagrams have some kind of sequence number  Receiver sends a NAK requesting a resend of missing datagrams (needed to complete a message)  Still need a timer (at receiver), but now, delay is per message and not per datagram Networks, cont.

12 Two Generals Problem  No 100% guarantee that a message was delivered  Jim N. Gray portrayed problem using a war- like scenario  How can two generals coordinate an attack if their messaging framework is unreliable?  There are ways to make the probability of failure vanishingly small Networks, cont.

13 End to End Performance  Control congestion via flow control  Lock-step is simple solution, but too expensive  Too many round trips; one for each datagram in a message; Time: Avg. round trip time * number of datagrams  Better to stage/pipeline sending the datagrams and receiving the ACKs  Great if network is fairly reliable  What happens if receiver cannot accept as quickly as sender can send? Networks, cont.

14 Flow Control  Sender asks how many datagrams can be sent at a time (window size)  Sender then asks for permission to send  Receiver sends ACKs when window is received  Sender sends another window when given permission to send again  Time: Time reqd. to send 1 datagram * (number of datagrams -1) + 1 round trip Networks, cont. What window size is optimal?

15 Flow Control, cont.  window size = datagram round trip time * bottleneck data rate  smaller window size is less efficient  larger window size cannot be handled by bottleneck  In practice, use adaptive flow control  Change window size via simple timings  Losing packets requires resending a window (expensive) Networks, cont.