Download presentation
Presentation is loading. Please wait.
Published byRylee Bastow Modified over 9 years ago
1
Guide to TCP/IP, Second Edition1 Guide To TCP/IP, Second Edition Chapter 5 Transport Layer TCP/IP Protocols
2
Guide to TCP/IP, Second Edition2 Objectives Understand the key features and functions of the User Datagram Protocol (UDP) Explain the mechanisms that drive segmentation, reassembly, and retransmission for the Transmission Control Protocol (TCP) Choose between using UDP and TCP
3
Guide to TCP/IP, Second Edition3 Overview of UDP List of limitations of UDP –No reliability mechanism –No delivery guarantees –No connection handling –Identifies Application layer protocol conveyed –Checksum for entire message carried in UDP header –No buffering services –No segmentation
4
Guide to TCP/IP, Second Edition4 UDP—A Connectionless Transport Layer Protocol Connectionless protocols provide best-effort Connectionless protocols handle the following kinds of tasks: –Message Checksum –Higher-layer protocol identification
5
Guide to TCP/IP, Second Edition5 UDP Header Fields and Functions UDP header fields –Source Port Number Field –Well-Known Port Numbers (0 through 1023) –Registered Port Numbers (1024 through 49151) –Dynamic Port Numbers (49152 through 65535) –Destination Port Number Field Temporary ports referred as ephemeral ports
6
Guide to TCP/IP, Second Edition6 UDP Header Fields and Functions (cont.)
7
Guide to TCP/IP, Second Edition7 UDP Header Fields and Functions (cont.) Length Field –IP Header Length –IP Total Length –UDP Length Checksum Field –Pseudo-header
8
Guide to TCP/IP, Second Edition8 UDP Header Fields and Functions (cont.)
9
Guide to TCP/IP, Second Edition9 UDP Header Fields and Functions (cont.)
10
Guide to TCP/IP, Second Edition10 UDP Port Numbers and Processes
11
Guide to TCP/IP, Second Edition11 Overview of TCP Connection-oriented services Error recovery Sliding window mechanism End-to-end reliability Virtual connection –Handshake process
12
Guide to TCP/IP, Second Edition12 Overview of TCP (cont.)
13
Guide to TCP/IP, Second Edition13 TCP—A Connection-Oriented Protocol Connection-oriented protocols do the following: –Logical connection –Acknowledgements –Sequence number tracking –Timeout mechanism –Retry mechanism
14
Guide to TCP/IP, Second Edition14 TCP Startup Connection Process (TCP Handshake) One host initiates the handshake to another host to –Ensure the destination host is available –Ensure the destination host is listening on the destination port number –Inform the destination host of the initiator’s sequence number so that the two sides can track data as it is transferred
15
Guide to TCP/IP, Second Edition15 TCP Handshake
16
Guide to TCP/IP, Second Edition16 Handshake Packet #1
17
Guide to TCP/IP, Second Edition17 Handshake Packet #2
18
Guide to TCP/IP, Second Edition18 Handshake Packet #3
19
Guide to TCP/IP, Second Edition19 TCP Half-Open Connections Half-Open connections –SYN>>>>> –<<<<<ACK SYN Denial of Service (DoS) attack –Two-way handshake
20
Guide to TCP/IP, Second Edition20 TCP Keep-Alive Process Maintain the connection when there is no data traffic Disabled by default on Windows 2000 and Windows XP
21
Guide to TCP/IP, Second Edition21 TCP Connection Termination FIN and ACK flags TCP connection states
22
Guide to TCP/IP, Second Edition22 TCP Connection States
23
Guide to TCP/IP, Second Edition23 TCP Connection States (cont.)
24
Guide to TCP/IP, Second Edition24 TCP Sequence and Acknowledgment Process Each side of the connection selects its own starting sequence number Each side increments its sequence number value by the amount of data included in the outbound packet
25
Guide to TCP/IP, Second Edition25 TCP Error-Detection and Error-Recovery Process Retransmission timer Retransmission timeout (RTO) Round-trip time (RTT)
26
Guide to TCP/IP, Second Edition26 Retransmit Timer And Process
27
Guide to TCP/IP, Second Edition27 TCP Congestion Control Windowing Advertised window Current Window TCP buffer Four TCP congestion control mechanisms –Slow Start – Congestion Avoidance – Fast Retransmit – Fast Recovery
28
Guide to TCP/IP, Second Edition28 TCP Sliding Window (cont.)
29
Guide to TCP/IP, Second Edition29 TCP Header Fields and Functions TCP header fields –Source/Destination Port Number Field –Sequence Number Field –Acknowledgment Number Field –Data Offset (Field) –Flags Field –Window Size Field –TCP Checksum Field –Urgent Pointer Field –TCP Options Field(s)
30
Guide to TCP/IP, Second Edition30 TCP Header
31
Guide to TCP/IP, Second Edition31 Decoded TCP Header
32
Guide to TCP/IP, Second Edition32 TCP Flag Settings
33
Guide to TCP/IP, Second Edition33 TCP Flag Settings (cont.)
34
Guide to TCP/IP, Second Edition34 Choosing Between TCP and UDP TCP is robust and reliable UDP is not robust and reliable Use UDP when avoiding unneeded complexity, or improving overall performance
35
Guide to TCP/IP, Second Edition35 Chapter Summary Transport layer protocols come in two types: connectionless, which are lightweight, unreliable, and provide only best-effort delivery services; and connection-oriented, which provide robust, reliable end-to-end delivery services, including explicit acknowledgment, segmentation and reassembly of arbitrary-sized messages, connection negotiation and management mechanisms, and retransmission of missing or erroneous segments
36
Guide to TCP/IP, Second Edition36 Chapter Summary (cont.) Because connectionless protocols are lightweight, they outperform connection- oriented protocols due to lower internal message overhead, and having no need for control and management of message traffic (acknowledgments, retransmissions, congestion control, and so on)
37
Guide to TCP/IP, Second Edition37 Chapter Summary (cont.) The User Datagram Protocol, UDP, is the connectionless protocol associated with the TCP/IP protocol suite It is commonly associated with Application layer protocols and services, such as BOOTP, DHCP, SNMP, NFS, and RIP, that either provide their own reliability mechanisms, or do without such mechanisms
38
Guide to TCP/IP, Second Edition38 Chapter Summary (cont.) In keeping with its simple capabilities, the UDP header is short and simple, consisting primarily of a protocol identifier in the IP header, an optional checksum value, and source and destination port addresses for the Application layer protocols or processes on the sending and receiving ends of a transmission
39
Guide to TCP/IP, Second Edition39 Chapter Summary (cont.) The Transmission Control Protocol,TCP, is the heavyweight, connection-oriented protocol that helps name the TCP/IP protocol suite It remains associated with the majority of TCP/IP Application layer protocols, especially those, such as Telnet, FTP, and SMTP, where reliable data delivery is desirable
40
Guide to TCP/IP, Second Edition40 Chapter Summary (cont.) In keeping with its more diverse, more robust capabilities, the TCP header is longer and more complex, including a variety of flags, values, and message types used to deliver acknowledgments, manage traffic flow, request retransmissions, and negotiate connections between hosts
41
Guide to TCP/IP, Second Edition41 Chapter Summary (cont.) Appropriate (and historical) uses for UDP concentrate on Application layer services that manage their own reliability and connections, such as NFS, and on chatty protocols and services, such as DHCP, SNMP, or RIP The chatty protocols and services rely on simple controls and fail-safes, and broadcast of periodic transmissions to handle potential reliability, deliverability, or reachability problems
42
Guide to TCP/IP, Second Edition42 Chapter Summary (cont.) Appropriate (and historical) uses for TCP concentrate on providing reliable delivery of user services, such as terminal emulation (Telnet and remote utilities), file transfer (FTP), e-mail (SMTP), and news (NNTP), where potentially important data must be delivered whole and intact, or not at all (and flagged with an error message)
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.