SlideShare a Scribd company logo
1 of 58
Download to read offline
Transport Layer
Unit 4
Introduction
• The transport layer is a 4th layer from the top.
• The main role of the transport layer is to provides a logical
communication between application processes running on different
hosts.
• Although the application processes on different hosts are not
physically connected, application processes use the logical
communication provided by the transport layer to send the
messages to each other.
• The transport layer protocols are implemented in the end systems
but not in the network routers.
Cont..
• A computer network provides more than one protocol to the
network applications. For example, TCP and UDP are two transport
layer protocols that provide a different set of services to the
network layer.
• All transport layer protocols provide multiplexing/demultiplexing
service. It also provides other services such as reliable data transfer,
bandwidth guarantees, and delay guarantees.
• Each of the applications in the application layer has the ability to
send a message by using TCP or UDP. Both TCP and UDP will then
communicate with the internet protocol in the internet layer. The
applications can read and write to the transport layer.
 The transport layer is an end-to-end layer – this means that
nodes within the subnet do not participate in transport layer
protocols – only the end hosts.
 As with other layers, transport layer protocols send data as a
sequence of packets (segments).
Cont..
OSI Transport Layer
Connection control
User application 1 ...
Encryption/
decryption
compression/
expansion
Choice of
syntax
Session
control
Session to transport
mapping
Session
management
Session
synch.
Layer and flow
control
Error
recovery
Multiplexing
Routing Addressing
Error
control
Flow
control
Data link
establishment
Synch Framing
Access to transm.
media
Physical and electrical
interface
Activation/ deactivation
of con.
Application layer
Presentation layer
Session layer
Transport layer
Network layer
Link layer
Physical layer
Transport Service Primitives
The primitives for a simple transport service.
Services provided by the Transport Layer
• The services provided by the transport layer are similar to those of
the data link layer.
• The data link layer provides the services within a single network
while the transport layer provides the services across an
internetwork made up of many networks.
• The data link layer controls the physical layer while the transport
layer controls all the lower layers.
• The services provided by the transport layer protocols can be
divided into five categories:
1. End-to-end delivery
2. Addressing
3. Reliable delivery
4. Flow control
5. Multiplexing
1. End-to-end delivery
• The transport layer transmits the entire message
to the destination.
• Therefore, it ensures the end-to-end delivery of an
entire message from a source to the destination
via different routers.
2. Addressing
• According to the layered model, the transport layer interacts with
the functions of the session layer.
• Many protocols combine session, presentation, and application layer
protocols into a single layer known as the application layer.
• In these cases, delivery to the session layer means the delivery to
the application layer. Data generated by an application on one
machine must be transmitted to the correct application on another
machine. In this case, addressing is provided by the transport layer.
• The transport layer provides the user address which is specified as a
station or port. The port variable represents a particular TS user of a
specified station known as a Transport Service access point (TSAP).
Each station has only one transport entity.
The transport layer protocols need to know which upper-layer
protocols are communicating.
3. Reliable delivery
• The transport layer provides reliability services by
retransmitting the lost and damaged packets.
• The reliable delivery has four aspects:
i. Error control
ii. Sequence control
iii. Loss control
iv. Duplication control
i. Error Control
• The primary role of reliability is Error Control. In reality, no
transmission will be 100 percent error-free delivery. Therefore,
transport layer protocols are designed to provide error-free
transmission.
• The data link layer also provides the error handling mechanism, but it
ensures only node-to-node error-free delivery. However, node-to-
node reliability does not ensure the end-to-end reliability.
• The data link layer checks for the error between each network. If an
error is introduced inside one of the routers, then this error will not
be caught by the data link layer. It only detects those errors that have
been introduced between the beginning and end of the link.
Therefore, the transport layer performs the checking for the errors
end-to-end to ensure that the packet has arrived correctly.
• The second aspect of the reliability is sequence control which is
implemented at the transport layer.
• On the sending end, the transport layer is responsible for ensuring
that the packets received from the upper layers can be used by the
lower layers.
• On the receiving end, it ensures that the various segments of a
transmission can be correctly reassembled.
ii. Sequence Control
• Loss Control is a third aspect of reliability.
• The transport layer ensures that all the fragments of a transmission
arrive at the destination or not.
• On the sending end, all the fragments of transmission are given
sequence numbers by a transport layer. These sequence numbers
allow the receivers transport layer to identify the missing segment.
iii. Loss Control
• Duplication Control is the fourth aspect of reliability.
• The transport layer guarantees that no duplicate data arrive at the
destination.
• Sequence numbers are used to identify the lost packets; similarly, it
allows the receiver to identify and discard duplicate segments.
iv. Duplication Control
4. Flow Control
• Flow control is used to prevent the sender from overwhelming the
receiver.
• If the receiver is overloaded with too much data, then the receiver
discards the packets and asking for the retransmission of packets.
• This increases network congestion and thus, reducing the system
performance.
• The transport layer is responsible for flow control. It uses the sliding
window protocol that makes the data transmission more efficient
as well as it controls the flow of data so that the receiver does not
become overwhelmed. Sliding window protocol is byte oriented
rather than frame oriented.
5. Multiplexing
• The transport layer uses the multiplexing to improve transmission
efficiency.
• Multiplexing can occur in two ways:
– Upward multiplexing
– Downward multiplexing
• Upward multiplexing: Upward multiplexing means multiple
transport layer connections use the same network connection. To
make more cost-effective, the transport layer sends several
transmissions bound for the same destination along the same
path; this is achieved through upward multiplexing.
Cont..
• Upward multiplexing: Upward multiplexing means multiple
transport layer connections use the same network connection.
• To make more cost-effective, the transport layer sends several
transmissions bound for the same destination along the same
path; this is achieved through upward multiplexing.
• Downward multiplexing: Downward multiplexing means one
transport layer connection uses the multiple network connections.
• Downward multiplexing allows the transport layer to split a
connection among several paths to improve the throughput. This
type of multiplexing is used when networks have a low or slow
capacity.
Congestion Control
• If the transport entities on many machines send too
many packets into the network too quickly, the network
will become congested, with performance degraded as
packets are delayed and lost.
• Congestion occurs at routers, so it is detected at the
network layer.
• The network and transport layers share the responsibility
for handling congestion.
Cont..
• However, the most effective way to control congestion is to reduce
the load that the transport layer is placing on the network.
Two layers are the responsible for congestion control:
• Transport layer, controls the offered load [here]
• Network layer, experiences congestion [previous]
– Desirable bandwidth allocation
– Regulating the sending rate
– Wireless issues
1. Desirable Bandwidth Allocation
(a) Good throughput
(b) Delay as a function of offered load
Cont..
• Before we describe how to regulate traffic, we must
understand what we are trying to achieve by running a
congestion control algorithm.
• A good BW allocation will deliver good performance and
avoids congestion in the NW,
• it will be fair across competing transport entities, and it
will quickly track changes in traffic demands.
Cont..
Max-min bandwidth allocation for four flows
• Notion of max-min fairness.
2. Regulating the Sending Rate
(a) A fast network feeding a low-capacity receiver.
(b) A slow network feeding a high-capacity receiver.
Cont..
Additive and multiplicative bandwidth adjustments
3.Wireless Link
• Wireless networks lose packets all the time due to transmission
errors.
• Congestion control algorithm should observe are losses due to
insufficient bandwidth, not losses due to transmission errors.
• 802.11 uses a stop and- wait protocol to deliver each frame
The Internet Transport Protocols:
UDP (User Datagram Protocol)
• Introduction to UDP
• Remote Procedure Call
• Real-Time Transport
UDP
UDP
• UDP stands for User Datagram Protocol.
• UDP is a simple protocol and it provides non sequenced transport
functionality.
• UDP is a connectionless protocol.
• This type of protocol is used when reliability and security are less
important than speed and size.
• UDP is an end-to-end transport level protocol that adds
transport-level addresses, checksum error control, and length
information to the data from the upper layer.
• The packet produced by the UDP protocol is known as a user
datagram.
User Datagram Format
• The user datagram has a 16-byte header which is shown below:
Where,
• Source port address: It defines the address of the application process that has
delivered a message. The source port address is of 16 bits address.
• Destination port address: It defines the address of the application process that
will receive the message. The destination port address is of a 16-bit address.
• Total length: It defines the total length of the user datagram in bytes. It is a 16-
bit field.
• Checksum: The checksum is a 16-bit field which is used in error detection.
Disadvantages of UDP protocol
• UDP provides basic functions needed for the end-to-end delivery
of a transmission.
• It does not provide any sequencing or reordering functions and
does not specify the damaged packet when reporting an error.
• UDP can discover that an error has occurred, but it does not
specify which packet has been lost as it does not contain an ID or
sequencing number of a particular data segment.
Frame for UDP
• Optional checksum field for extra reliability: checksums
header, data and IP header.
The UDP header.
Remote Procedure Call (RPC)
Remote Procedure Call (RPC) is a powerful technique for
constructing distributed, client-server based applications.
The two processes may be on the same system, or they may be on
different systems with a network connecting them.
Real-Time Transport Protocol
(a) The position of RTP in the protocol stack. (b)
Packet nesting.
Real-Time Transport Protocol
• Real Time Transport Protocol, is a data transfer protocol designed
specifically to exchange real-time sensitive, audio-visual data on IP-
based networks.
• RTP is often used in Voice-over-IP telephony (VoIP telephony).
• At transport level, Real Time Transport Protocol typically uses
connectionless UDP (User Datagram Protocol).
• RTP allows data to be exchanged in Unicast as well as Multicast
communication.
• In order to handle and meet the necessary Quality of Service
parameters (QoS parameters) during the transfer, RTP partners
with (RTCP).
Real-Time Transport Protocol
Smoothing the output stream by buffering packets
Playout with Buffering and Jitter Control
Real-Time Transport Protocol
(a) High jitter (b) Low jitter
Transport Layer protocols
• The transport layer is represented by two protocols: TCP and
UDP.
• The IP protocol in the network layer delivers a datagram from
a source host to the destination host.
• Nowadays, the operating system supports multiuser and
multiprocessing environments, an executing program is called
a process.
• The transport layer protocols define some connections to
individual ports known as protocol ports.
• An IP protocol is a host-to-host protocol used to deliver a
packet from source host to the destination host while
transport layer protocols are port-to-port protocols that work
on the top of the IP protocols to deliver the packet from the
originating port to the IP services, and from IP services to the
destination port.
• Each port is defined by a positive integer address, and it is of
16 bits.
UDP
• UDP stands for User Datagram Protocol.
• UDP is a simple protocol and it provides nonsequenced transport
functionality.
• UDP is a connectionless protocol.
• This type of protocol is used when reliability and security are less
important than speed and size.
• UDP is an end-to-end transport level protocol that adds transport-
level addresses, checksum error control, and length information to
the data from the upper layer.
• The packet produced by the UDP protocol is known as a user
datagram.
UDP format
Where,
Source port address: It defines the address of the application process that has delivered a
message. The source port address is of 16 bits address.
Destination port address: It defines the address of the application process that will receive
the message. The destination port address is of a 16-bit address.
Total length: It defines the total length of the user datagram in bytes. It is a 16-bit field.
Checksum: The checksum is a 16-bit field which is used in error detection.
Disadvantages of UDP protocol
• UDP provides basic functions needed for the end-to-end
delivery of a transmission.
• It does not provide any sequencing or reordering functions
and does not specify the damaged packet when reporting an
error.
• UDP can discover that an error has occurred, but it does not
specify which packet has been lost as it does not contain an ID
or sequencing number of a particular data segment.
TCP
• TCP stands for Transmission Control Protocol.
• It provides full transport layer services to applications.
• It is a connection-oriented protocol means the connection
established between both the ends of the transmission. For
creating the connection, TCP generates a virtual circuit between
sender and receiver for the duration of a transmission.
Features Of TCP protocol
• Stream data transfer: TCP protocol transfers the data in the form of contiguous
stream of bytes. TCP group the bytes in the form of TCP segments and then
passed it to the IP layer for transmission to the destination. TCP itself segments
the data and forward to the IP.
• Reliability: TCP assigns a sequence number to each byte transmitted and expects
a positive acknowledgement from the receiving TCP. If ACK is not received within
a timeout interval, then the data is retransmitted to the destination.
The receiving TCP uses the sequence number to reassemble the segments if they
arrive out of order or to eliminate the duplicate segments.
• Flow Control: When receiving TCP sends an acknowledgement back to the sender
indicating the number the bytes it can receive without overflowing its internal
buffer. The number of bytes is sent in ACK in the form of the highest sequence
number that it can receive without any problem. This mechanism is also referred
to as a window mechanism.
Features Of TCP protocol
• Multiplexing: Multiplexing is a process of accepting the data from different
applications and forwarding to the different applications on different computers.
At the receiving end, the data is forwarded to the correct application. This process
is known as demultiplexing. TCP transmits the packet to the correct application by
using the logical channels known as ports.
• Logical Connections: The combination of sockets, sequence numbers, and
window sizes, is called a logical connection. Each connection is identified by the
pair of sockets used by sending and receiving processes.
• Full Duplex: TCP provides Full Duplex service, i.e., the data flow in both the
directions at the same time. To achieve Full Duplex service, each TCP should have
sending and receiving buffers so that the segments can flow in both the
directions. TCP is a connection-oriented protocol. Suppose the process A wants to
send and receive the data from process B. The following steps occur:
– Establish a connection between two TCPs.
– Data is exchanged in both the directions.
– The Connection is terminated.
TCP Segment Format
TCP Segment Format
• Where,
• Source port address: It is used to define the address of the application program in a source
computer. It is a 16-bit field.
• Destination port address: It is used to define the address of the application program in a
destination computer. It is a 16-bit field.
• Sequence number: A stream of data is divided into two or more TCP segments. The 32-bit
sequence number field represents the position of the data in an original data stream.
• Acknowledgement number: A 32-field acknowledgement number acknowledge the data
from other communicating devices. If ACK field is set to 1, then it specifies the sequence
number that the receiver is expecting to receive.
• Header Length (HLEN): It specifies the size of the TCP header in 32-bit words. The minimum
size of the header is 5 words, and the maximum size of the header is 15 words. Therefore,
the maximum size of the TCP header is 60 bytes, and the minimum size of the TCP header is
20 bytes.
• Reserved: It is a six-bit field which is reserved for future use.
• Control bits: Each bit of a control field functions individually and independently. A control bit
defines the use of a segment or serves as a validity check for other fields.
There are total six types of flags in
control field:
• URG: The URG field indicates that the data in a segment is urgent.
• ACK: When ACK field is set, then it validates the
acknowledgement number.
• PSH: The PSH field is used to inform the sender that higher
throughput is needed so if possible, data must be pushed with
higher throughput.
• RST: The reset bit is used to reset the TCP connection when there
is any confusion occurs in the sequence numbers.
• SYN: The SYN field is used to synchronize the sequence numbers
in three types of segments: connection request, connection
confirmation ( with the ACK bit set ), and confirmation
acknowledgement.
There are total six types of flags in
control field:
• FIN: The FIN field is used to inform the receiving TCP module that
the sender has finished sending data. It is used in connection
termination in three types of segments: termination request,
termination confirmation, and acknowledgement of termination
confirmation.
– Window Size: The window is a 16-bit field that defines the size of the window.
– Checksum: The checksum is a 16-bit field used in error detection.
– Urgent pointer: If URG flag is set to 1, then this 16-bit field is an offset from the
sequence number indicating that it is a last urgent data byte.
– Options and padding: It defines the optional fields that convey the additional
information to the receiver.
Differences b/w TCP & UDP
Basis for Comparison TCP UDP
Definition TCP establishes a virtual circuit
before transmitting the data.
UDP transmits the data
directly to the destination
computer without verifying
whether the receiver is ready
to receive or not.
Connection Type It is a Connection-Oriented
protocol
It is a Connectionless protocol
Speed slow high
Reliability It is a reliable protocol. It is an unreliable protocol.
Header size 20 bytes 8 bytes
acknowledgement It waits for the
acknowledgement of data and
has the ability to resend the lost
packets.
It neither takes the
acknowledgement, nor it
retransmits the damaged
frame.

More Related Content

What's hot

What's hot (20)

Framing Protocols
Framing ProtocolsFraming Protocols
Framing Protocols
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
 
Chapter4 1
Chapter4 1Chapter4 1
Chapter4 1
 
Clock synchronization in distributed system
Clock synchronization in distributed systemClock synchronization in distributed system
Clock synchronization in distributed system
 
Data link control
Data link controlData link control
Data link control
 
Leaky bucket algorithm
Leaky bucket algorithmLeaky bucket algorithm
Leaky bucket algorithm
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Control
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
 
IPv4
IPv4IPv4
IPv4
 
Token ring
Token ringToken ring
Token ring
 
Routing algorithm network layer
Routing algorithm  network layerRouting algorithm  network layer
Routing algorithm network layer
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol
 
Application Layer
Application Layer Application Layer
Application Layer
 
Transportlayer tanenbaum
Transportlayer tanenbaumTransportlayer tanenbaum
Transportlayer tanenbaum
 
Internetworking
InternetworkingInternetworking
Internetworking
 

Similar to Transport layer

Similar to Transport layer (20)

Transport laye
Transport laye Transport laye
Transport laye
 
The OSI model
 The OSI model The OSI model
The OSI model
 
Unit 5 : Transport Layer
Unit 5 : Transport LayerUnit 5 : Transport Layer
Unit 5 : Transport Layer
 
Transport layer.pptx
Transport layer.pptxTransport layer.pptx
Transport layer.pptx
 
Module 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdfModule 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdf
 
tcpiposi.pptx
tcpiposi.pptxtcpiposi.pptx
tcpiposi.pptx
 
cns-unit-4-onlinenotepad.io.pdf
cns-unit-4-onlinenotepad.io.pdfcns-unit-4-onlinenotepad.io.pdf
cns-unit-4-onlinenotepad.io.pdf
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocol
 
Basics of Ethernet
Basics of Ethernet Basics of Ethernet
Basics of Ethernet
 
DS Unit-4-Communication .pdf
DS Unit-4-Communication .pdfDS Unit-4-Communication .pdf
DS Unit-4-Communication .pdf
 
Chapter 3 final
Chapter 3 finalChapter 3 final
Chapter 3 final
 
Chapter 3 final
Chapter 3 finalChapter 3 final
Chapter 3 final
 
Chapter 3 final
Chapter 3 finalChapter 3 final
Chapter 3 final
 
Transport layer
Transport layerTransport layer
Transport layer
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx
 
Osi layer model
Osi layer modelOsi layer model
Osi layer model
 
Computer network coe351- part4- final
Computer network coe351- part4- finalComputer network coe351- part4- final
Computer network coe351- part4- final
 
08 coms 525 tcpip - tcp 1
08   coms 525 tcpip - tcp 108   coms 525 tcpip - tcp 1
08 coms 525 tcpip - tcp 1
 
Osi
OsiOsi
Osi
 
Mobile computing unit-5
Mobile computing unit-5Mobile computing unit-5
Mobile computing unit-5
 

More from Sri Manakula Vinayagar Engineering College

Performance Analysis of MIMO–OFDM for PCHBF , RELAY Technique with MMSE For T...
Performance Analysis of MIMO–OFDM for PCHBF , RELAY Technique with MMSE For T...Performance Analysis of MIMO–OFDM for PCHBF , RELAY Technique with MMSE For T...
Performance Analysis of MIMO–OFDM for PCHBF , RELAY Technique with MMSE For T...Sri Manakula Vinayagar Engineering College
 

More from Sri Manakula Vinayagar Engineering College (20)

IoT Methodology.pptx
IoT Methodology.pptxIoT Methodology.pptx
IoT Methodology.pptx
 
ACNS UNIT-5.pdf
ACNS UNIT-5.pdfACNS UNIT-5.pdf
ACNS UNIT-5.pdf
 
2. ACNS UNIT-1.pptx
2. ACNS UNIT-1.pptx2. ACNS UNIT-1.pptx
2. ACNS UNIT-1.pptx
 
1. ACNS UNIT-1.pptx
1. ACNS UNIT-1.pptx1. ACNS UNIT-1.pptx
1. ACNS UNIT-1.pptx
 
7. Multi-operator D2D communication.pptx
7. Multi-operator D2D communication.pptx7. Multi-operator D2D communication.pptx
7. Multi-operator D2D communication.pptx
 
11. New challenges in the 5G modelling.pptx
11. New challenges in the 5G modelling.pptx11. New challenges in the 5G modelling.pptx
11. New challenges in the 5G modelling.pptx
 
8. Simulation methodology.pptx
8. Simulation methodology.pptx8. Simulation methodology.pptx
8. Simulation methodology.pptx
 
10. Calibration.pptx
10. Calibration.pptx10. Calibration.pptx
10. Calibration.pptx
 
9. Evaluation methodology.pptx
9. Evaluation methodology.pptx9. Evaluation methodology.pptx
9. Evaluation methodology.pptx
 
4. Ultra Reliable and Low Latency Communications.pptx
4. Ultra Reliable and Low Latency Communications.pptx4. Ultra Reliable and Low Latency Communications.pptx
4. Ultra Reliable and Low Latency Communications.pptx
 
1. Massive Machine-Type Communication.pptx
1. Massive Machine-Type Communication.pptx1. Massive Machine-Type Communication.pptx
1. Massive Machine-Type Communication.pptx
 
1. Coordinated Multi-Point Transmission in 5G.pptx
1. Coordinated Multi-Point Transmission in 5G.pptx1. Coordinated Multi-Point Transmission in 5G.pptx
1. Coordinated Multi-Point Transmission in 5G.pptx
 
Real time operating systems
Real time operating systemsReal time operating systems
Real time operating systems
 
Reliability and clock synchronization
Reliability and clock synchronizationReliability and clock synchronization
Reliability and clock synchronization
 
Low power embedded system design
Low power embedded system designLow power embedded system design
Low power embedded system design
 
Performance Analysis of MIMO–OFDM for PCHBF , RELAY Technique with MMSE For T...
Performance Analysis of MIMO–OFDM for PCHBF , RELAY Technique with MMSE For T...Performance Analysis of MIMO–OFDM for PCHBF , RELAY Technique with MMSE For T...
Performance Analysis of MIMO–OFDM for PCHBF , RELAY Technique with MMSE For T...
 
Telecommunication systems
Telecommunication systemsTelecommunication systems
Telecommunication systems
 
Home appliances
Home appliancesHome appliances
Home appliances
 
loudspeakers and microphones
loudspeakers and microphonesloudspeakers and microphones
loudspeakers and microphones
 
Television standards and systems
Television standards and systemsTelevision standards and systems
Television standards and systems
 

Recently uploaded

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Recently uploaded (20)

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 

Transport layer

  • 2. Introduction • The transport layer is a 4th layer from the top. • The main role of the transport layer is to provides a logical communication between application processes running on different hosts. • Although the application processes on different hosts are not physically connected, application processes use the logical communication provided by the transport layer to send the messages to each other. • The transport layer protocols are implemented in the end systems but not in the network routers.
  • 3. Cont.. • A computer network provides more than one protocol to the network applications. For example, TCP and UDP are two transport layer protocols that provide a different set of services to the network layer. • All transport layer protocols provide multiplexing/demultiplexing service. It also provides other services such as reliable data transfer, bandwidth guarantees, and delay guarantees. • Each of the applications in the application layer has the ability to send a message by using TCP or UDP. Both TCP and UDP will then communicate with the internet protocol in the internet layer. The applications can read and write to the transport layer.
  • 4.  The transport layer is an end-to-end layer – this means that nodes within the subnet do not participate in transport layer protocols – only the end hosts.  As with other layers, transport layer protocols send data as a sequence of packets (segments). Cont..
  • 5. OSI Transport Layer Connection control User application 1 ... Encryption/ decryption compression/ expansion Choice of syntax Session control Session to transport mapping Session management Session synch. Layer and flow control Error recovery Multiplexing Routing Addressing Error control Flow control Data link establishment Synch Framing Access to transm. media Physical and electrical interface Activation/ deactivation of con. Application layer Presentation layer Session layer Transport layer Network layer Link layer Physical layer
  • 6.
  • 7. Transport Service Primitives The primitives for a simple transport service.
  • 8. Services provided by the Transport Layer • The services provided by the transport layer are similar to those of the data link layer. • The data link layer provides the services within a single network while the transport layer provides the services across an internetwork made up of many networks. • The data link layer controls the physical layer while the transport layer controls all the lower layers. • The services provided by the transport layer protocols can be divided into five categories: 1. End-to-end delivery 2. Addressing 3. Reliable delivery 4. Flow control 5. Multiplexing
  • 9.
  • 10. 1. End-to-end delivery • The transport layer transmits the entire message to the destination. • Therefore, it ensures the end-to-end delivery of an entire message from a source to the destination via different routers.
  • 11. 2. Addressing • According to the layered model, the transport layer interacts with the functions of the session layer. • Many protocols combine session, presentation, and application layer protocols into a single layer known as the application layer. • In these cases, delivery to the session layer means the delivery to the application layer. Data generated by an application on one machine must be transmitted to the correct application on another machine. In this case, addressing is provided by the transport layer. • The transport layer provides the user address which is specified as a station or port. The port variable represents a particular TS user of a specified station known as a Transport Service access point (TSAP). Each station has only one transport entity.
  • 12. The transport layer protocols need to know which upper-layer protocols are communicating.
  • 13. 3. Reliable delivery • The transport layer provides reliability services by retransmitting the lost and damaged packets. • The reliable delivery has four aspects: i. Error control ii. Sequence control iii. Loss control iv. Duplication control
  • 14.
  • 15. i. Error Control • The primary role of reliability is Error Control. In reality, no transmission will be 100 percent error-free delivery. Therefore, transport layer protocols are designed to provide error-free transmission. • The data link layer also provides the error handling mechanism, but it ensures only node-to-node error-free delivery. However, node-to- node reliability does not ensure the end-to-end reliability. • The data link layer checks for the error between each network. If an error is introduced inside one of the routers, then this error will not be caught by the data link layer. It only detects those errors that have been introduced between the beginning and end of the link. Therefore, the transport layer performs the checking for the errors end-to-end to ensure that the packet has arrived correctly.
  • 16.
  • 17. • The second aspect of the reliability is sequence control which is implemented at the transport layer. • On the sending end, the transport layer is responsible for ensuring that the packets received from the upper layers can be used by the lower layers. • On the receiving end, it ensures that the various segments of a transmission can be correctly reassembled. ii. Sequence Control
  • 18. • Loss Control is a third aspect of reliability. • The transport layer ensures that all the fragments of a transmission arrive at the destination or not. • On the sending end, all the fragments of transmission are given sequence numbers by a transport layer. These sequence numbers allow the receivers transport layer to identify the missing segment. iii. Loss Control
  • 19. • Duplication Control is the fourth aspect of reliability. • The transport layer guarantees that no duplicate data arrive at the destination. • Sequence numbers are used to identify the lost packets; similarly, it allows the receiver to identify and discard duplicate segments. iv. Duplication Control
  • 20. 4. Flow Control • Flow control is used to prevent the sender from overwhelming the receiver. • If the receiver is overloaded with too much data, then the receiver discards the packets and asking for the retransmission of packets. • This increases network congestion and thus, reducing the system performance. • The transport layer is responsible for flow control. It uses the sliding window protocol that makes the data transmission more efficient as well as it controls the flow of data so that the receiver does not become overwhelmed. Sliding window protocol is byte oriented rather than frame oriented.
  • 21. 5. Multiplexing • The transport layer uses the multiplexing to improve transmission efficiency. • Multiplexing can occur in two ways: – Upward multiplexing – Downward multiplexing • Upward multiplexing: Upward multiplexing means multiple transport layer connections use the same network connection. To make more cost-effective, the transport layer sends several transmissions bound for the same destination along the same path; this is achieved through upward multiplexing.
  • 22. Cont.. • Upward multiplexing: Upward multiplexing means multiple transport layer connections use the same network connection. • To make more cost-effective, the transport layer sends several transmissions bound for the same destination along the same path; this is achieved through upward multiplexing. • Downward multiplexing: Downward multiplexing means one transport layer connection uses the multiple network connections. • Downward multiplexing allows the transport layer to split a connection among several paths to improve the throughput. This type of multiplexing is used when networks have a low or slow capacity.
  • 23.
  • 24.
  • 25. Congestion Control • If the transport entities on many machines send too many packets into the network too quickly, the network will become congested, with performance degraded as packets are delayed and lost. • Congestion occurs at routers, so it is detected at the network layer. • The network and transport layers share the responsibility for handling congestion.
  • 26. Cont.. • However, the most effective way to control congestion is to reduce the load that the transport layer is placing on the network. Two layers are the responsible for congestion control: • Transport layer, controls the offered load [here] • Network layer, experiences congestion [previous] – Desirable bandwidth allocation – Regulating the sending rate – Wireless issues
  • 27. 1. Desirable Bandwidth Allocation (a) Good throughput (b) Delay as a function of offered load
  • 28. Cont.. • Before we describe how to regulate traffic, we must understand what we are trying to achieve by running a congestion control algorithm. • A good BW allocation will deliver good performance and avoids congestion in the NW, • it will be fair across competing transport entities, and it will quickly track changes in traffic demands.
  • 29. Cont.. Max-min bandwidth allocation for four flows • Notion of max-min fairness.
  • 30. 2. Regulating the Sending Rate (a) A fast network feeding a low-capacity receiver. (b) A slow network feeding a high-capacity receiver.
  • 31. Cont.. Additive and multiplicative bandwidth adjustments
  • 32. 3.Wireless Link • Wireless networks lose packets all the time due to transmission errors. • Congestion control algorithm should observe are losses due to insufficient bandwidth, not losses due to transmission errors. • 802.11 uses a stop and- wait protocol to deliver each frame
  • 33. The Internet Transport Protocols: UDP (User Datagram Protocol) • Introduction to UDP • Remote Procedure Call • Real-Time Transport
  • 34. UDP
  • 35. UDP • UDP stands for User Datagram Protocol. • UDP is a simple protocol and it provides non sequenced transport functionality. • UDP is a connectionless protocol. • This type of protocol is used when reliability and security are less important than speed and size. • UDP is an end-to-end transport level protocol that adds transport-level addresses, checksum error control, and length information to the data from the upper layer. • The packet produced by the UDP protocol is known as a user datagram.
  • 36. User Datagram Format • The user datagram has a 16-byte header which is shown below: Where, • Source port address: It defines the address of the application process that has delivered a message. The source port address is of 16 bits address. • Destination port address: It defines the address of the application process that will receive the message. The destination port address is of a 16-bit address. • Total length: It defines the total length of the user datagram in bytes. It is a 16- bit field. • Checksum: The checksum is a 16-bit field which is used in error detection.
  • 37. Disadvantages of UDP protocol • UDP provides basic functions needed for the end-to-end delivery of a transmission. • It does not provide any sequencing or reordering functions and does not specify the damaged packet when reporting an error. • UDP can discover that an error has occurred, but it does not specify which packet has been lost as it does not contain an ID or sequencing number of a particular data segment.
  • 38. Frame for UDP • Optional checksum field for extra reliability: checksums header, data and IP header. The UDP header.
  • 39. Remote Procedure Call (RPC) Remote Procedure Call (RPC) is a powerful technique for constructing distributed, client-server based applications. The two processes may be on the same system, or they may be on different systems with a network connecting them.
  • 40.
  • 41. Real-Time Transport Protocol (a) The position of RTP in the protocol stack. (b) Packet nesting.
  • 42. Real-Time Transport Protocol • Real Time Transport Protocol, is a data transfer protocol designed specifically to exchange real-time sensitive, audio-visual data on IP- based networks. • RTP is often used in Voice-over-IP telephony (VoIP telephony). • At transport level, Real Time Transport Protocol typically uses connectionless UDP (User Datagram Protocol). • RTP allows data to be exchanged in Unicast as well as Multicast communication. • In order to handle and meet the necessary Quality of Service parameters (QoS parameters) during the transfer, RTP partners with (RTCP).
  • 43. Real-Time Transport Protocol Smoothing the output stream by buffering packets Playout with Buffering and Jitter Control
  • 44. Real-Time Transport Protocol (a) High jitter (b) Low jitter
  • 45. Transport Layer protocols • The transport layer is represented by two protocols: TCP and UDP. • The IP protocol in the network layer delivers a datagram from a source host to the destination host. • Nowadays, the operating system supports multiuser and multiprocessing environments, an executing program is called a process. • The transport layer protocols define some connections to individual ports known as protocol ports.
  • 46. • An IP protocol is a host-to-host protocol used to deliver a packet from source host to the destination host while transport layer protocols are port-to-port protocols that work on the top of the IP protocols to deliver the packet from the originating port to the IP services, and from IP services to the destination port. • Each port is defined by a positive integer address, and it is of 16 bits.
  • 47.
  • 48. UDP • UDP stands for User Datagram Protocol. • UDP is a simple protocol and it provides nonsequenced transport functionality. • UDP is a connectionless protocol. • This type of protocol is used when reliability and security are less important than speed and size. • UDP is an end-to-end transport level protocol that adds transport- level addresses, checksum error control, and length information to the data from the upper layer. • The packet produced by the UDP protocol is known as a user datagram.
  • 49. UDP format Where, Source port address: It defines the address of the application process that has delivered a message. The source port address is of 16 bits address. Destination port address: It defines the address of the application process that will receive the message. The destination port address is of a 16-bit address. Total length: It defines the total length of the user datagram in bytes. It is a 16-bit field. Checksum: The checksum is a 16-bit field which is used in error detection.
  • 50. Disadvantages of UDP protocol • UDP provides basic functions needed for the end-to-end delivery of a transmission. • It does not provide any sequencing or reordering functions and does not specify the damaged packet when reporting an error. • UDP can discover that an error has occurred, but it does not specify which packet has been lost as it does not contain an ID or sequencing number of a particular data segment.
  • 51. TCP • TCP stands for Transmission Control Protocol. • It provides full transport layer services to applications. • It is a connection-oriented protocol means the connection established between both the ends of the transmission. For creating the connection, TCP generates a virtual circuit between sender and receiver for the duration of a transmission.
  • 52. Features Of TCP protocol • Stream data transfer: TCP protocol transfers the data in the form of contiguous stream of bytes. TCP group the bytes in the form of TCP segments and then passed it to the IP layer for transmission to the destination. TCP itself segments the data and forward to the IP. • Reliability: TCP assigns a sequence number to each byte transmitted and expects a positive acknowledgement from the receiving TCP. If ACK is not received within a timeout interval, then the data is retransmitted to the destination. The receiving TCP uses the sequence number to reassemble the segments if they arrive out of order or to eliminate the duplicate segments. • Flow Control: When receiving TCP sends an acknowledgement back to the sender indicating the number the bytes it can receive without overflowing its internal buffer. The number of bytes is sent in ACK in the form of the highest sequence number that it can receive without any problem. This mechanism is also referred to as a window mechanism.
  • 53. Features Of TCP protocol • Multiplexing: Multiplexing is a process of accepting the data from different applications and forwarding to the different applications on different computers. At the receiving end, the data is forwarded to the correct application. This process is known as demultiplexing. TCP transmits the packet to the correct application by using the logical channels known as ports. • Logical Connections: The combination of sockets, sequence numbers, and window sizes, is called a logical connection. Each connection is identified by the pair of sockets used by sending and receiving processes. • Full Duplex: TCP provides Full Duplex service, i.e., the data flow in both the directions at the same time. To achieve Full Duplex service, each TCP should have sending and receiving buffers so that the segments can flow in both the directions. TCP is a connection-oriented protocol. Suppose the process A wants to send and receive the data from process B. The following steps occur: – Establish a connection between two TCPs. – Data is exchanged in both the directions. – The Connection is terminated.
  • 55. TCP Segment Format • Where, • Source port address: It is used to define the address of the application program in a source computer. It is a 16-bit field. • Destination port address: It is used to define the address of the application program in a destination computer. It is a 16-bit field. • Sequence number: A stream of data is divided into two or more TCP segments. The 32-bit sequence number field represents the position of the data in an original data stream. • Acknowledgement number: A 32-field acknowledgement number acknowledge the data from other communicating devices. If ACK field is set to 1, then it specifies the sequence number that the receiver is expecting to receive. • Header Length (HLEN): It specifies the size of the TCP header in 32-bit words. The minimum size of the header is 5 words, and the maximum size of the header is 15 words. Therefore, the maximum size of the TCP header is 60 bytes, and the minimum size of the TCP header is 20 bytes. • Reserved: It is a six-bit field which is reserved for future use. • Control bits: Each bit of a control field functions individually and independently. A control bit defines the use of a segment or serves as a validity check for other fields.
  • 56. There are total six types of flags in control field: • URG: The URG field indicates that the data in a segment is urgent. • ACK: When ACK field is set, then it validates the acknowledgement number. • PSH: The PSH field is used to inform the sender that higher throughput is needed so if possible, data must be pushed with higher throughput. • RST: The reset bit is used to reset the TCP connection when there is any confusion occurs in the sequence numbers. • SYN: The SYN field is used to synchronize the sequence numbers in three types of segments: connection request, connection confirmation ( with the ACK bit set ), and confirmation acknowledgement.
  • 57. There are total six types of flags in control field: • FIN: The FIN field is used to inform the receiving TCP module that the sender has finished sending data. It is used in connection termination in three types of segments: termination request, termination confirmation, and acknowledgement of termination confirmation. – Window Size: The window is a 16-bit field that defines the size of the window. – Checksum: The checksum is a 16-bit field used in error detection. – Urgent pointer: If URG flag is set to 1, then this 16-bit field is an offset from the sequence number indicating that it is a last urgent data byte. – Options and padding: It defines the optional fields that convey the additional information to the receiver.
  • 58. Differences b/w TCP & UDP Basis for Comparison TCP UDP Definition TCP establishes a virtual circuit before transmitting the data. UDP transmits the data directly to the destination computer without verifying whether the receiver is ready to receive or not. Connection Type It is a Connection-Oriented protocol It is a Connectionless protocol Speed slow high Reliability It is a reliable protocol. It is an unreliable protocol. Header size 20 bytes 8 bytes acknowledgement It waits for the acknowledgement of data and has the ability to resend the lost packets. It neither takes the acknowledgement, nor it retransmits the damaged frame.