IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.

Slides:



Advertisements
Similar presentations
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
Advertisements

Prentice HallHigh Performance TCP/IP Networking, Hassan-Jain Chapter 2 TCP/IP Fundamentals.
CCNA – Network Fundamentals
CSCI 4550/8556 Computer Networks
Transmission Control Protocol (TCP)
Intermediate TCP/IP TCP Operation.
Guide to TCP/IP, Third Edition
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
Chapter 7: Transport Layer
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
IS333, Ch. 26: TCP Victor Norman Calvin College 1.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
BZUPAGES.COM 1 User Datagram Protocol - UDP RFC 768, Protocol 17 Provides unreliable, connectionless on top of IP Minimal overhead, high performance –No.
Chapter 7 – Transport Layer Protocols
Computer Networks 2 Lecture 2 TCP – I - Transport Protocols: TCP Segments, Flow control and Connection Setup.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
UNIT 07 Process – to – Process Delivery: UDP,TCP and SCTP
Autumn 2000John Kristoff1 Transport Layer Computer Networks.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Spring 2003 Week 8 Introduction to Networks and the Internet.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Transport Protocols Slide 1 Transport Protocols.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
Gursharan Singh Tatla Transport Layer 16-May
What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host IP treats a computer as an endpoint of communication Best.
Process-to-Process Delivery:
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
1 Chapter Internetworking Part 4 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
Transportation Protocols: UDP, TCP & RTP
1 Transport Layer Computer Networks. 2 Where are we?
Transportation Protocols: UDP, TCP & RTP
TCP/IP: Basics1 User Datagram Protocol (UDP) Another protocol at transport layer is UDP. It is Connectionless protocol i.e. no need to establish & terminate.
IP and Errors IP Best Effort Datagrams can be: –Lost –Delayed –Duplicated –Delivered out of order –Corrupted.
IP and Errors IP Best Effort Datagrams can be: –Lost –Delayed –Duplicated –Delivered out of order –Corrupted.
TCP Lecture 13 November 13, TCP Background Transmission Control Protocol (TCP) TCP provides much of the functionality that IP lacks: reliable service.
26-TCP Dr. John P. Abraham Professor UTPA. TCP  Transmission control protocol, another transport layer protocol.  Reliable delivery  Tcp must compensate.
University of the Western Cape Chapter 12: The Transport Layer.
SMUCSE 4344 transport layer. SMUCSE 4344 transport layer end-to-end protocols –transport code runs only on endpoint hosts encapsulates network communications.
Transport Layer Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
Section 5: The Transport Layer. 5.2 CS Computer Networks John Mc Donald, Dept. of Computer Science, NUI Maynooth. Introduction In the previous section.
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 2.5 Internetworking Chapter 25 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, , WWW) Reliable Stream Transport (TCP) Connectionless Packet Delivery.
Transport Layer Moving Segments. Transport Layer Protocols Provide a logical communication link between processes running on different hosts as if directly.
Transport Control Protocol (TCP) Features of TCP, packet loss and retransmission, adaptive retransmission, flow control, three way handshake, congestion.
1 TCP: Reliable Transport Service. 2 Transmission Control Protocol (TCP) Major transport protocol used in Internet Heavily used Completely reliable transfer.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Institute of Technology Sligo - Dept of Computing Chapter 12 The Transport Layer.
Chapter 24 Transport Control Protocol (TCP) Layer 4 protocol Responsible for reliable end-to-end transmission Provides illusion of reliable network to.
Computer Networks23-1 PART 5 Transport Layer. Computer Networks23-2 Position of Transport Layer Responsible for the delivery of a message from one process.
Transmission Control Protocol (TCP) BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Guide to TCP/IP Fourth Edition
1 End-to-End Protocols User Datagram Protocol (UDP) Transmission Control Protocol(TCP)
1 Version 3.1 Module 10 Intermediate TCP/IP (Layer 4)
1 Computer Communication & Networks Lecture 23 & 24 Transport Layer: UDP and TCP Waleed Ejaz
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Process-to-Process Delivery:
3. END-TO-END PROTOCOLS (PART 1) Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University 22 March
1 Chapter 24 Internetworking Part 4 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
Module 1 UDP & TCP.
Process-to-Process Delivery, TCP and UDP protocols
PART 5 Transport Layer Computer Networks.
Internet and Intranet Protocols and Applications
Process-to-Process Delivery:
Process-to-Process Delivery: UDP, TCP
Computer Networks Protocols
Transport Layer 9/22/2019.
Presentation transcript:

IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching √ –Routers/ Packet Switches √ –TCP/IP  –Clients + Servers = Distributed Computing –Computer Naming.

IP2 TCP/IP IP –IP Addressing. √ –Mapping IP addresses. √ –IP Datagrams format. √ –Encapsulation, fragmentation & reassembly. √ TCP  –Reliable transport service.

IP3 Introduction Internet Protocol (IP) provides ``unreliable datagram service'' between hosts. Transport protocols provide end-to-end delivery between endpoints of a connection; e.g., processes or programs. User Datagram Protocol (UDP) provides datagram service. Transmission Control Protocol (TCP) provides reliable data delivery.

IP4 User Datagram Protocol UDP delivers independent messages, called datagrams between applications or processes on host computers  end-to-end protocol. For generality, endpoints of UDP are called protocol ports or ports. ``Best effort'' delivery - datagrams may be lost, delivered out of order, etc.

IP5 User Datagram Protocol Connectionless protocol: no need to establish & terminate connection. Message-oriented: an application using UDP sends & receives individual messages…does not divide a message into packets…message must fit datagram. Each UDP message has the IP address and port number of the destination and the source of the message. IP addresses may be omitted.

IP6 UDP & TCP: Layering Transport protocols use IP to provide data delivery for application protocols Application Transport: UDP, TCP Internet (IP) Network Interface Hardware

IP7 UDP Headers UDP datagrams have a header that follows the hardware and IP headers: UDP header is very simple: Has Port numbers, Message length, Checksum HardwareIPUDPApplicationData

IP8 UDP Headers UDP Source portUDP Destination port UDP Message LengthUDP Checksum Data

IP9 Selecting UDP port numbers Communicating computers must agree on a port number – fixed beforehand. –``Server'' opens selected port and waits for incoming messages –``Client'' selects local port and sends message to selected port Services provided by many computers use reserved, well-known port numbers: e.g. ECHO. Other services use dynamically assigned port numbers.

IP10 PortNameDescription 7echoEcho input back to sender 9discardDiscard input 11systatSystem statistics 13daytimeTime of day (ASCII) 17quoteQuote of the day 19chargenCharacter generator 37timeSystem time (seconds since 1970) 53domainDNS 69tftpTrivial File Transfer Protocol (TFTP) 123ntpNetwork Time Protocol (NTP) 161snmpSimple Network Management Protocol (SNMP) Well-Known Port Numbers

IP11 TCP Transmission Control Protocol (TCP) is most widely used transport protocol Provides reliable data delivery by using IP unreliable datagram delivery Compensates for loss, delay, duplication and similar problems in Internet components Reliable delivery: applications do not worry about errors – rely on the layer below.

IP12 Features of TCP Connection oriented: Application requests connection to destination and then uses connection to deliver data to transfer data Point-to-point: A TCP connection has two endpoints Reliability: TCP guarantees data will be delivered without loss, duplication or transmission errors Full duplex: The endpoints of a TCP connection can exchange data in both directions simultaneously

IP13 Features of TCP Stream interface: Application delivers data to TCP as a continuous stream, with no record boundaries; TCP makes no guarantees that data will be received in same sized blocks. Reliable connection startup: Three-way handshake guarantees reliable, synchronized startup between endpoints. Graceful connection shutdown: TCP guarantees delivery of all data after endpoint shutdown by application.

IP14 Uses IP for Data Delivery TCP uses IP for data delivery (like UDP) Endpoints are identified by ports (like UDP) –Allows multiple connections on each host –Ports may be associated with an application or a process IP treats TCP messages like data and does not interpret any contents of the TCP message.

IP15 Delivery in TCP TCP message travels in IP datagrams. Internet routers only look at IP header to forward datagrams. TCP at destination interprets TCP messages.

IP16 Delivery in TCP

IP17 Reliable Delivery TCP uses many techniques described earlier to provide reliable delivery Recovers from –Lost packets –Duplicate packets –Delayed packets –Corrupted data –Transmission speed mismatches –Congestion –System reboots

IP18 Lost Packets TCP uses positive acknowledgment with retransmission to achieve reliable data delivery Recipient sends acknowledgment control messages (ACK) to sender to verify successful receipt of data Sender sets timer when data transmitted; if timer expires before acknowledgment arrives, sender retransmits (with new timer)

IP19 Lost Packets

IP20 TCP Segments Application delivers arbitrarily large chunks of data (blocks) to TCP as a``stream'‘. TCP breaks this data into segments, each of which fits into an IP datagram. Original stream is numbered by bytes. Segment contains sequence number of data bytes.

IP21 Acknowledgements Receiver sends segment with sequence number of acknowledged data (not segments). One ACK can acknowledge many segments.

IP22 TCP Segment Format Same header format used in both directions Segment can carry both data and acknowledgment.

IP23 Timeout Inappropriate timeout can cause poor performance: –Too long - sender waits longer than necessary before retransmitting –Too short - sender generates unnecessary traffic Timeout must be different for each connection and set dynamically –Host on same LAN should have shorter timeout than host 20 hops away –Delivery time across internet may change over time; timeout must accommodate changes

IP24 RTOs for Different Network Delays

IP25 Choosing RTO Timeout should be based on round trip time or delay (RTT) Sender estimates RTT for each active connection by measuring the time needed to receive a response. Updated dynamically. Sender picks retransmission timeout (RTO) based on previous RTTs Specific method is call adaptive retransmission algorithm

IP26 TCP Sliding Window TCP uses sliding window for flow control. Receiver specifies window: –Called window advertisement –Specifies which bytes in the data stream can be sent –Carried in segment along with ACK Sender can transmit any bytes, in any size segment, between last acknowledged byte and within window size.

IP27 TCP Sliding Window

IP28 TCP Sliding Window with Acknowledgements

IP29 Three-way Handshake TCP uses three-way handshake for reliable connection establishment and termination –Host 1 sends segment with SYN bit set and random sequence number. –Host 2 responds with segment with SYN bit set, acknowledgment to Host 1 and random sequence number. –Host 1 responds with acknowledgment. SYN & FIN segments. TCP retransmit lost SYN or FIN segments.

IP30 Closing a Connection

IP31 Congestion Control Excessive traffic can cause packet loss. –Transport protocols respond with retransmission. –Excessive retransmission can cause congestion collapse. TCP interprets packet (segment) loss as an indicator of congestion. Sender uses TCP congestion control and slows transmission of packets when a packet is lost. –Sends single packet.

IP32 Congestion Control –If ACK returns without loss, sends two packets, and if two ACKs return, sends four packets, and so on, doubling each time until….one half window size. –When TCP sends one-half window size, rate of increase slows.

IP33 Summary UDP provides end-to-end best-effort message delivery –IP used for delivery to destination host –Protocol ports demultiplex to destination application TCP provides end-to-end reliable bytestream delivery –IP used for delivery to destination host –Protocol ports demultiplex to destination application –Additional techniques develop reliable delivery from IP messages.

IP34 Summary Positive acknowledgment with retransmission Sequence numbers detect missing, duplicate and out-of-order data Sliding window flow control Three-way handshake Congestion control