SlideShare a Scribd company logo
1 of 40
transport layer
lecturer
Mr. Arvind Pandey
Connectionless Transport: UDP (User
Datagram Protocol)
 UDP is the connectionless transport protocol in the TCP/IP protocol
stack.
 UDP is a simple protocol that exchanges datagram without guaranteed
delivery.
 It relies on higher layer protocols to handle error and retransmit data.
 UDP doesn’t use window or Asks reliability is provided by application
layer protocols.
 UDP is designed for applications that do not need to put sequence of
segments together.
 The following application layer protocols use UDP: TFTP, SNMP, DHCP,
and DNS
contd.
 Used in transport layer
 Offers unreliable connectionless service
 Provides faster service than that of TCP.
 Offers minimum error checking mechanism.
 Supports multicasting because connectionless.
 Offers minimum flow control mechanism.
 Also used by SNMP (Simple Network Management Protocol)
congestion
 congestion is a network may occur if the load on
the network is greater that capacity of network .
 eg. so many person are downloading files on
same network because of network will be slow .
Causes of Congestion
 When there are more input lines and less or single output lines.
 When there is slow router i.e., if routers CPU’s, are slow
 If the router has no free buffers i.e., insufficient memory to hold queue of
packets.
 If the components used in subnet (link, router, switches, etc) have different
traffics carrying and switching capacities, then congestion occurs.
 If the bandwidths of the lines are low, it can’t carry large volume of packets and
caused congestion. Hence, congestion cannot be eradicated but can be
controlled.
Open Loop Congestion Control
 Open loop congestion control policies are applied to
prevent congestion before it happens.
 The congestion control is handled either by the
source or the destination.
Policies adopted by open loop congestion control –
A. Retransmission Policy
B. Window Policy
C. Discarding Policy
D. Acknowledgment Policy
E. Admission Policy
Closed Loop Congestion Control
 Closed loop congestion control technique is used to treat or
alleviate congestion after it happens.
Several techniques are used by different protocols; some of them
are:
A. Backpressure
B. Choke Packet Technique
C. Implicit Signaling
D. Explicit Signaling
Congestion Control Algorithms
 Leaky Bucket Algorithm
 Token Bucket Algorithm
 Choke Bucket Algorithm
leaky bucket algorithm
leaky bucket algorithm contd.
Token Bucket Algorithm
 The Token Bucket Algorithm compare to Leaky Bucket
Algorithm allow the output rate vary depending on the size of
burst.
 In this algorithm the buckets holds token to transmit a
packet, the host must capture and destroy one token.
 Tokens are generated by a clock at the rate of one token
every ∆t sec.
 Idle hosts can capture and save up tokens (up to the max.
size of the bucket) in order to send larger bursts later
Some advantage of token Bucket over
leaky bucket
 If bucket is full in token Bucket , token are discard
not packets. While in leaky bucket, packets are
discarded.
 Token Bucket can send Large bursts can faster rate
while leaky bucket always sends packets at
constant rate.
difference between token bucket and leakey
bucket algorithm
19
Relation between transport layer and networklayer
• The Network layer and transport layer are responsible for moving messages from end to end in
anetwork.
• Theyare soclosely tied together that they are usuallydiscussed together.
• The transport layer performs three functions: linking the application layer to the
network, segmenting (breaking long messages into smaller packets for transmission), and session
management (establishing an end-to-end connection between the sender and receiver).
• The network layer performs two functions: routing (determining the next computer
to which the message should be sent to reach the final destination) and addressing (finding
the addressof thatnext computer).
• There are several standard transport and network layer protocols that specify how packets
are to be organized, in the sameway that there are standards for data link layer packets,
20
21
RELIABLE DATATRANSFER PROTOCOL
 Located on the Transport Layer like TCP or UDP.
 RDT protocol ensure delivery of all packets and enable the receiver to deliver the
packets in order to its application layer.
 RDT protocol can be designed using some basic tools Known as a stop-and-wait protocol.
 Stop-and-wait has poor performance in a long-distance connection.
 To improve transmission rate, RDT protocol must use pipelining.
 TCP ensures all parts of a message to reach the destination undamaged.
 But sometimes parts of a message fails to reach the destination or damaged message deliver.
 Thus, TCP has to detect and recover from lost or damaged message , Recovering from errors is
called reliable data transfer.
Pipelined ReliableData
TransferProtocols
• Thisprotocolallowsfor multiple datapackets to
be sent while waiting for ACK.Results better
networkutilization
• senderandreceiverneedbuffersto hold
multiple packets
• packetsneedsequencenumbersin order to
identify them
• anacknowledgement needs to refer to
corresponding sequencenumber
• retransmissioncangiveriseto duplicate
packets
• sequencenumbersin packetsallowreceiver
to detect duplicates
Protocol pipelining is a technique in which multiple requests are written out to a
single socket without waiting for the corresponding responses. Pipelining can be used
in various application layer network protocols, like HTTP/1.1, SMTP and FTP.
26
ADVANTAGE
• much better than stop-and-wait
DISADVANTAGE
• More complicated to deal with reliability issues, e.g., corrupted, lost, out of orderdata.
• Two generic approaches to solving this
• Go-Back-N protocols
• Selective repeat protocols
Flow Control
 When a data frame (Layer-2 data) is sent from one host to another
over a single medium, it is required that the sender and receiver
should work at the same speed.
 That is, sender sends at a speed on which the receiver can process
and accept the data.
 What if the speed (hardware/software) of the sender or receiver
differs? If sender is sending too fast the receiver may be overloaded
and data may be lost.
Two types of mechanisms can be deployed to control the flow:
Stop and Wait
Sliding Window
Stop and Wait
This flow control mechanism forces the sender after transmitting a data frame to
stop and wait until the acknowledgement of the data-frame sent is received.
Sliding Window
 In this flow control mechanism, both sender and receiver agree on the
number of data-frames after which the acknowledgement should be sent.
 As we learnt, stop and wait flow control mechanism wastes resources, this
protocol tries to make use of underlying resources as much as possible.
Error Control
 When data-frame is transmitted, there is a probability that data-frame may
be lost in the transit or it is received corrupted.
 In both cases, the receiver does not receive the correct data-frame and
sender does not know anything about any loss.
 In such case, both sender and receiver are equipped with some protocols
which helps them to detect transit errors such as loss of data-frame.
 Hence, either the sender retransmits the data-frame or the receiver may
request to resend the previous data-frame.
Requirements for error control mechanism:
 Error detection - The sender and receiver, either both or any, must confirm
that there is some error in the transit.
 Positive ACK - When the receiver receives a correct frame, it should
acknowledge it.
 Negative ACK - When the receiver receives a damaged frame or a duplicate
frame, it sends a NACK back to the sender and the sender must retransmit the
correct frame.
 Retransmission: The sender maintains a clock and sets a timeout period.
 If an acknowledgement of a data-frame previously transmitted does not arrive
before the timeout ,the sender retransmits the frame, thinking that the
frame or it’s acknowledgement is lost in transit
There are three types of techniques available to control the errors by
Automatic Repeat Requests (ARQ):
35
• Stop and wait ARQ mechanism does not utilize the resources at their best.
• When the acknowledgement is received, the sender sits idle and does nothing.
• In Go-Back-N ARQ method, both sender and receiver maintain a window.
Go-Back-N(GBN)
 The sending-window size enables the sender to send multiple frames without
receiving the acknowledgement of the previous ones.
 The receiving-window enables the receiver to receive multiple frames and
acknowledge them.
 The receiver keeps track of incoming frame’s sequence number.
 When the sender sends all the frames in window, it checks up to what sequence
number it has received positive acknowledgement.
 If all frames are positively acknowledged, the sender sends next set of frames.
 If sender finds that it has received NACK or has not receive any ACK for a
particular frame, it retransmits all the frames after which it does not receive any
positive ACK.
37
Advantage over Go-Back-N:
• Fewer Retransmissions.
Disadvantages:
• More complexity at sender and receiver
• Each frame must be acknowledged individually
• Receiver may receive frames out of sequence
38
Selective Repeat
• In Go-back-N ARQ, it is assumed that
the receiver does not have any buffer
space for its window size and has to
process each frame as it comes.
• This enforces the sender to retransmit
all the frames which are not
acknowledged.
In Selective-Repeat ARQ, the receiver while keeping
track of sequence numbers, buffers the frames in
memory and sends NACK for only frame which is missing
or damaged.
The sender in this case, sends only packet for which
NACK is received.
39
40
ADVANTAGE
• The sender only retransmits frames, for which a NAK is received.
• This will increase the efficiency of the protocol.
DISADVANTAGE
• More complexity at sender and receiver
• Each packet must be acknowledged individual
• Receiver may receive packets out of sequence

More Related Content

What's hot

Transport layer udp and tcp network
Transport layer udp and tcp networkTransport layer udp and tcp network
Transport layer udp and tcp networkHamzahMohammed4
 
Lec 12(Transport Layer)
Lec 12(Transport Layer)Lec 12(Transport Layer)
Lec 12(Transport Layer)maamir farooq
 
User Datagram protocol For Msc CS
User Datagram protocol For Msc CSUser Datagram protocol For Msc CS
User Datagram protocol For Msc CSThanveen
 
Introduction of tcp, ip & udp
Introduction of tcp, ip & udpIntroduction of tcp, ip & udp
Introduction of tcp, ip & udprahul kundu
 
transport layer protocols
transport layer protocolstransport layer protocols
transport layer protocolsBE Smârt
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake Alok Tripathi
 
the transport layer
the transport layerthe transport layer
the transport layertumetr1
 
Tcp vs udp difference and comparison diffen
Tcp vs udp   difference and comparison   diffenTcp vs udp   difference and comparison   diffen
Tcp vs udp difference and comparison diffenHarikiran Raju
 
Transport services
Transport servicesTransport services
Transport servicesNavin Kumar
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layertmavroidis
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol Akhil .B
 
TCP Theory
TCP TheoryTCP Theory
TCP Theorysoohyunc
 
Features of tcp (part 2) .68
Features of tcp  (part 2) .68Features of tcp  (part 2) .68
Features of tcp (part 2) .68myrajendra
 

What's hot (20)

Transport layer udp and tcp network
Transport layer udp and tcp networkTransport layer udp and tcp network
Transport layer udp and tcp network
 
Lec 12(Transport Layer)
Lec 12(Transport Layer)Lec 12(Transport Layer)
Lec 12(Transport Layer)
 
TCP/IP and UDP protocols
TCP/IP and UDP protocolsTCP/IP and UDP protocols
TCP/IP and UDP protocols
 
User Datagram protocol For Msc CS
User Datagram protocol For Msc CSUser Datagram protocol For Msc CS
User Datagram protocol For Msc CS
 
Introduction of tcp, ip & udp
Introduction of tcp, ip & udpIntroduction of tcp, ip & udp
Introduction of tcp, ip & udp
 
transport layer protocols
transport layer protocolstransport layer protocols
transport layer protocols
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
the transport layer
the transport layerthe transport layer
the transport layer
 
Tcp Udp Notes
Tcp Udp NotesTcp Udp Notes
Tcp Udp Notes
 
Tcp vs udp difference and comparison diffen
Tcp vs udp   difference and comparison   diffenTcp vs udp   difference and comparison   diffen
Tcp vs udp difference and comparison diffen
 
Tcp udp
Tcp udpTcp udp
Tcp udp
 
Udp vs-tcp
Udp vs-tcpUdp vs-tcp
Udp vs-tcp
 
TCP Vs UDP
TCP Vs UDP TCP Vs UDP
TCP Vs UDP
 
Transport services
Transport servicesTransport services
Transport services
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layer
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
TCP Theory
TCP TheoryTCP Theory
TCP Theory
 
Features of tcp (part 2) .68
Features of tcp  (part 2) .68Features of tcp  (part 2) .68
Features of tcp (part 2) .68
 

Similar to Transport layer

09 Data Link LayerFlow Control.ppt
09 Data Link LayerFlow Control.ppt09 Data Link LayerFlow Control.ppt
09 Data Link LayerFlow Control.pptShaliniKumariGupta1
 
DLC_23 (3).pptx
DLC_23 (3).pptxDLC_23 (3).pptx
DLC_23 (3).pptxzulhelmanz
 
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdfNetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdfoptokunal1
 
Transport Layer In Computer Network
Transport Layer In Computer NetworkTransport Layer In Computer Network
Transport Layer In Computer NetworkDestro Destro
 
Module 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdfModule 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdfShivakrishnan18
 
Data link layer
Data link layerData link layer
Data link layersbkbca
 
Unit IV_Flow.pptx
Unit IV_Flow.pptxUnit IV_Flow.pptx
Unit IV_Flow.pptxTejasRao8
 
Traffic Characterization
Traffic CharacterizationTraffic Characterization
Traffic CharacterizationIsmail Mukiibi
 
Data communication network ppt_Unit_4.pptx
Data communication network ppt_Unit_4.pptxData communication network ppt_Unit_4.pptx
Data communication network ppt_Unit_4.pptxBHAVYPATEL34
 
Computer Networks Module 2.pdf
Computer Networks Module 2.pdfComputer Networks Module 2.pdf
Computer Networks Module 2.pdfShanthalaKV
 
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasComparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasIOSR Journals
 
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasComparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasIOSR Journals
 
Computer networks unit iv
Computer networks    unit ivComputer networks    unit iv
Computer networks unit ivJAIGANESH SEKAR
 

Similar to Transport layer (20)

09 Data Link LayerFlow Control.ppt
09 Data Link LayerFlow Control.ppt09 Data Link LayerFlow Control.ppt
09 Data Link LayerFlow Control.ppt
 
DLC_23 (3).pptx
DLC_23 (3).pptxDLC_23 (3).pptx
DLC_23 (3).pptx
 
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdfNetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
 
Nigga.pdf
Nigga.pdfNigga.pdf
Nigga.pdf
 
Transport Layer In Computer Network
Transport Layer In Computer NetworkTransport Layer In Computer Network
Transport Layer In Computer Network
 
Module 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdfModule 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdf
 
Data link layer
Data link layerData link layer
Data link layer
 
Mcseminar
McseminarMcseminar
Mcseminar
 
Unit IV_Flow.pptx
Unit IV_Flow.pptxUnit IV_Flow.pptx
Unit IV_Flow.pptx
 
DATA LINK LAYER.pdf
DATA LINK LAYER.pdfDATA LINK LAYER.pdf
DATA LINK LAYER.pdf
 
Ba25315321
Ba25315321Ba25315321
Ba25315321
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
Traffic Characterization
Traffic CharacterizationTraffic Characterization
Traffic Characterization
 
Data link layer (Unit 2).pdf
Data link layer (Unit 2).pdfData link layer (Unit 2).pdf
Data link layer (Unit 2).pdf
 
Data communication network ppt_Unit_4.pptx
Data communication network ppt_Unit_4.pptxData communication network ppt_Unit_4.pptx
Data communication network ppt_Unit_4.pptx
 
CN UNIT III.pptx
CN UNIT III.pptxCN UNIT III.pptx
CN UNIT III.pptx
 
Computer Networks Module 2.pdf
Computer Networks Module 2.pdfComputer Networks Module 2.pdf
Computer Networks Module 2.pdf
 
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasComparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
 
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasComparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
 
Computer networks unit iv
Computer networks    unit ivComputer networks    unit iv
Computer networks unit iv
 

More from arvind pandey

ADBMS ALL 2069-73 [CSITauthority.blogspot.com].pdf
ADBMS ALL 2069-73 [CSITauthority.blogspot.com].pdfADBMS ALL 2069-73 [CSITauthority.blogspot.com].pdf
ADBMS ALL 2069-73 [CSITauthority.blogspot.com].pdfarvind pandey
 
Internet service provider and network backbone
Internet service provider and network backboneInternet service provider and network backbone
Internet service provider and network backbonearvind pandey
 
Core java complete ppt(note)
Core java  complete  ppt(note)Core java  complete  ppt(note)
Core java complete ppt(note)arvind pandey
 
Unit 6- Development Evolution model
Unit 6- Development Evolution model Unit 6- Development Evolution model
Unit 6- Development Evolution model arvind pandey
 
Unit 5- Architectural Design in software engineering
Unit 5- Architectural Design in software engineering Unit 5- Architectural Design in software engineering
Unit 5- Architectural Design in software engineering arvind pandey
 
Unit 4- Software Engineering System Model Notes
Unit 4- Software Engineering System Model Notes Unit 4- Software Engineering System Model Notes
Unit 4- Software Engineering System Model Notes arvind pandey
 
Unit 3- requirements for software development
Unit 3-  requirements for software  development Unit 3-  requirements for software  development
Unit 3- requirements for software development arvind pandey
 
Unit 2-software development process notes
Unit 2-software development process notes Unit 2-software development process notes
Unit 2-software development process notes arvind pandey
 
Unit 1-overview of software engineering
Unit 1-overview of software engineering Unit 1-overview of software engineering
Unit 1-overview of software engineering arvind pandey
 
Chapter1 computer introduction note
Chapter1  computer introduction note Chapter1  computer introduction note
Chapter1 computer introduction note arvind pandey
 
computer network fundamental note
computer network fundamental note computer network fundamental note
computer network fundamental note arvind pandey
 

More from arvind pandey (15)

ADBMS ALL 2069-73 [CSITauthority.blogspot.com].pdf
ADBMS ALL 2069-73 [CSITauthority.blogspot.com].pdfADBMS ALL 2069-73 [CSITauthority.blogspot.com].pdf
ADBMS ALL 2069-73 [CSITauthority.blogspot.com].pdf
 
Syllabus.pdf
Syllabus.pdfSyllabus.pdf
Syllabus.pdf
 
Network entites
Network entitesNetwork entites
Network entites
 
Internet service provider and network backbone
Internet service provider and network backboneInternet service provider and network backbone
Internet service provider and network backbone
 
Core java complete ppt(note)
Core java  complete  ppt(note)Core java  complete  ppt(note)
Core java complete ppt(note)
 
Unit 6- Development Evolution model
Unit 6- Development Evolution model Unit 6- Development Evolution model
Unit 6- Development Evolution model
 
Unit 5- Architectural Design in software engineering
Unit 5- Architectural Design in software engineering Unit 5- Architectural Design in software engineering
Unit 5- Architectural Design in software engineering
 
Unit 4- Software Engineering System Model Notes
Unit 4- Software Engineering System Model Notes Unit 4- Software Engineering System Model Notes
Unit 4- Software Engineering System Model Notes
 
Unit 3- requirements for software development
Unit 3-  requirements for software  development Unit 3-  requirements for software  development
Unit 3- requirements for software development
 
Unit 2-software development process notes
Unit 2-software development process notes Unit 2-software development process notes
Unit 2-software development process notes
 
Unit 1-overview of software engineering
Unit 1-overview of software engineering Unit 1-overview of software engineering
Unit 1-overview of software engineering
 
Chapter1 computer introduction note
Chapter1  computer introduction note Chapter1  computer introduction note
Chapter1 computer introduction note
 
computer network fundamental note
computer network fundamental note computer network fundamental note
computer network fundamental note
 
I have a dream
I have a dreamI have a dream
I have a dream
 
brain.ppts
brain.pptsbrain.ppts
brain.ppts
 

Recently uploaded

KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 

Recently uploaded (20)

KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 

Transport layer

  • 2. Connectionless Transport: UDP (User Datagram Protocol)  UDP is the connectionless transport protocol in the TCP/IP protocol stack.  UDP is a simple protocol that exchanges datagram without guaranteed delivery.  It relies on higher layer protocols to handle error and retransmit data.  UDP doesn’t use window or Asks reliability is provided by application layer protocols.  UDP is designed for applications that do not need to put sequence of segments together.  The following application layer protocols use UDP: TFTP, SNMP, DHCP, and DNS
  • 3. contd.  Used in transport layer  Offers unreliable connectionless service  Provides faster service than that of TCP.  Offers minimum error checking mechanism.  Supports multicasting because connectionless.  Offers minimum flow control mechanism.  Also used by SNMP (Simple Network Management Protocol)
  • 4.
  • 5.
  • 6.
  • 7. congestion  congestion is a network may occur if the load on the network is greater that capacity of network .  eg. so many person are downloading files on same network because of network will be slow .
  • 8. Causes of Congestion  When there are more input lines and less or single output lines.  When there is slow router i.e., if routers CPU’s, are slow  If the router has no free buffers i.e., insufficient memory to hold queue of packets.  If the components used in subnet (link, router, switches, etc) have different traffics carrying and switching capacities, then congestion occurs.  If the bandwidths of the lines are low, it can’t carry large volume of packets and caused congestion. Hence, congestion cannot be eradicated but can be controlled.
  • 9.
  • 10. Open Loop Congestion Control  Open loop congestion control policies are applied to prevent congestion before it happens.  The congestion control is handled either by the source or the destination. Policies adopted by open loop congestion control – A. Retransmission Policy B. Window Policy C. Discarding Policy D. Acknowledgment Policy E. Admission Policy
  • 11. Closed Loop Congestion Control  Closed loop congestion control technique is used to treat or alleviate congestion after it happens. Several techniques are used by different protocols; some of them are: A. Backpressure B. Choke Packet Technique C. Implicit Signaling D. Explicit Signaling
  • 12. Congestion Control Algorithms  Leaky Bucket Algorithm  Token Bucket Algorithm  Choke Bucket Algorithm
  • 15.
  • 16. Token Bucket Algorithm  The Token Bucket Algorithm compare to Leaky Bucket Algorithm allow the output rate vary depending on the size of burst.  In this algorithm the buckets holds token to transmit a packet, the host must capture and destroy one token.  Tokens are generated by a clock at the rate of one token every ∆t sec.  Idle hosts can capture and save up tokens (up to the max. size of the bucket) in order to send larger bursts later
  • 17. Some advantage of token Bucket over leaky bucket  If bucket is full in token Bucket , token are discard not packets. While in leaky bucket, packets are discarded.  Token Bucket can send Large bursts can faster rate while leaky bucket always sends packets at constant rate.
  • 18. difference between token bucket and leakey bucket algorithm
  • 19. 19 Relation between transport layer and networklayer • The Network layer and transport layer are responsible for moving messages from end to end in anetwork. • Theyare soclosely tied together that they are usuallydiscussed together. • The transport layer performs three functions: linking the application layer to the network, segmenting (breaking long messages into smaller packets for transmission), and session management (establishing an end-to-end connection between the sender and receiver). • The network layer performs two functions: routing (determining the next computer to which the message should be sent to reach the final destination) and addressing (finding the addressof thatnext computer). • There are several standard transport and network layer protocols that specify how packets are to be organized, in the sameway that there are standards for data link layer packets,
  • 20. 20
  • 21. 21 RELIABLE DATATRANSFER PROTOCOL  Located on the Transport Layer like TCP or UDP.  RDT protocol ensure delivery of all packets and enable the receiver to deliver the packets in order to its application layer.  RDT protocol can be designed using some basic tools Known as a stop-and-wait protocol.  Stop-and-wait has poor performance in a long-distance connection.  To improve transmission rate, RDT protocol must use pipelining.  TCP ensures all parts of a message to reach the destination undamaged.  But sometimes parts of a message fails to reach the destination or damaged message deliver.  Thus, TCP has to detect and recover from lost or damaged message , Recovering from errors is called reliable data transfer.
  • 22.
  • 23.
  • 24. Pipelined ReliableData TransferProtocols • Thisprotocolallowsfor multiple datapackets to be sent while waiting for ACK.Results better networkutilization • senderandreceiverneedbuffersto hold multiple packets • packetsneedsequencenumbersin order to identify them • anacknowledgement needs to refer to corresponding sequencenumber • retransmissioncangiveriseto duplicate packets • sequencenumbersin packetsallowreceiver to detect duplicates
  • 25. Protocol pipelining is a technique in which multiple requests are written out to a single socket without waiting for the corresponding responses. Pipelining can be used in various application layer network protocols, like HTTP/1.1, SMTP and FTP.
  • 26. 26 ADVANTAGE • much better than stop-and-wait DISADVANTAGE • More complicated to deal with reliability issues, e.g., corrupted, lost, out of orderdata. • Two generic approaches to solving this • Go-Back-N protocols • Selective repeat protocols
  • 27. Flow Control  When a data frame (Layer-2 data) is sent from one host to another over a single medium, it is required that the sender and receiver should work at the same speed.  That is, sender sends at a speed on which the receiver can process and accept the data.  What if the speed (hardware/software) of the sender or receiver differs? If sender is sending too fast the receiver may be overloaded and data may be lost. Two types of mechanisms can be deployed to control the flow: Stop and Wait Sliding Window
  • 28. Stop and Wait This flow control mechanism forces the sender after transmitting a data frame to stop and wait until the acknowledgement of the data-frame sent is received.
  • 29. Sliding Window  In this flow control mechanism, both sender and receiver agree on the number of data-frames after which the acknowledgement should be sent.  As we learnt, stop and wait flow control mechanism wastes resources, this protocol tries to make use of underlying resources as much as possible.
  • 30. Error Control  When data-frame is transmitted, there is a probability that data-frame may be lost in the transit or it is received corrupted.  In both cases, the receiver does not receive the correct data-frame and sender does not know anything about any loss.  In such case, both sender and receiver are equipped with some protocols which helps them to detect transit errors such as loss of data-frame.  Hence, either the sender retransmits the data-frame or the receiver may request to resend the previous data-frame.
  • 31. Requirements for error control mechanism:  Error detection - The sender and receiver, either both or any, must confirm that there is some error in the transit.  Positive ACK - When the receiver receives a correct frame, it should acknowledge it.  Negative ACK - When the receiver receives a damaged frame or a duplicate frame, it sends a NACK back to the sender and the sender must retransmit the correct frame.  Retransmission: The sender maintains a clock and sets a timeout period.  If an acknowledgement of a data-frame previously transmitted does not arrive before the timeout ,the sender retransmits the frame, thinking that the frame or it’s acknowledgement is lost in transit There are three types of techniques available to control the errors by Automatic Repeat Requests (ARQ):
  • 32.
  • 33.
  • 34.
  • 35. 35 • Stop and wait ARQ mechanism does not utilize the resources at their best. • When the acknowledgement is received, the sender sits idle and does nothing. • In Go-Back-N ARQ method, both sender and receiver maintain a window. Go-Back-N(GBN)
  • 36.  The sending-window size enables the sender to send multiple frames without receiving the acknowledgement of the previous ones.  The receiving-window enables the receiver to receive multiple frames and acknowledge them.  The receiver keeps track of incoming frame’s sequence number.  When the sender sends all the frames in window, it checks up to what sequence number it has received positive acknowledgement.  If all frames are positively acknowledged, the sender sends next set of frames.  If sender finds that it has received NACK or has not receive any ACK for a particular frame, it retransmits all the frames after which it does not receive any positive ACK.
  • 37. 37 Advantage over Go-Back-N: • Fewer Retransmissions. Disadvantages: • More complexity at sender and receiver • Each frame must be acknowledged individually • Receiver may receive frames out of sequence
  • 38. 38 Selective Repeat • In Go-back-N ARQ, it is assumed that the receiver does not have any buffer space for its window size and has to process each frame as it comes. • This enforces the sender to retransmit all the frames which are not acknowledged. In Selective-Repeat ARQ, the receiver while keeping track of sequence numbers, buffers the frames in memory and sends NACK for only frame which is missing or damaged. The sender in this case, sends only packet for which NACK is received.
  • 39. 39
  • 40. 40 ADVANTAGE • The sender only retransmits frames, for which a NAK is received. • This will increase the efficiency of the protocol. DISADVANTAGE • More complexity at sender and receiver • Each packet must be acknowledged individual • Receiver may receive packets out of sequence