SlideShare a Scribd company logo
1 of 52
Download to read offline
CS8591 COMPUTER NETWORKS
UNIT – IV
Dr.A.Kathirvel, Professor & Head, Computer Science & Engg.
M N M Jain Engineering College, Chennai
Unit - IV
TRANSPORT LAYER
Introduction – Transport Layer
Protocols – Services – Port Numbers
– User Datagram Protocol –
Transmission Control Protocol –
SCTP.
Behrouz A. Forouzan, Data Communications and Networking, Fifth Edition
TMH, 2013
23-1 PROCESS-TO-PROCESS DELIVERY
The transport layer is responsible for process-to-
process delivery—the delivery of a packet, part of a
message, from one process to another. Two processes
communicate in a client/server relationship, as we will
see later.
Client/Server Paradigm
Multiplexing and Demultiplexing
Connectionless Versus Connection-Oriented Service
Reliable Versus Unreliable
Three Protocols
Topics discussed in this section:
3
The transport layer is responsible for
process-to-process delivery.
Note
4
Figure 23.1 Types of data deliveries
Figure 23.2 Port numbers
Figure 23.4 IANA ranges
5
Figure 23.3 IP addresses versus port numbers
6
Figure 23.6 Multiplexing and demultiplexing
Figure 23.5 Socket address
Figure 23.7 Error control
7
Figure 23.8 Position of UDP, TCP, and SCTP in TCP/IP suite
8
23-2 USER DATAGRAM PROTOCOL (UDP)
The User Datagram Protocol (UDP) is called a
connectionless, unreliable transport protocol. It does
not add anything to the services of IP except to provide
process-to-process communication instead of host-to-
host communication.
Well-Known Ports for UDP
User Datagram
Checksum
UDP Operation
Use of UDP
Topics discussed in this section:
9
Table 23.1 Well-known ports used with UDP
10
In UNIX, the well-known ports are stored in a file called
/etc/services. Each line in this file gives the name of the server and
the well-known port number. We can use the grep utility to extract
the line corresponding to the desired application. The following
shows the port for FTP. Note that FTP can use port 21 with either
UDP or TCP.
Example 23.1
11
SNMP uses two port numbers 161&162, each for a different purpose.
Figure 23.9 User datagram format
UDP length
= IP length – IP header’s length
Note
12
Figure 23.10 Pseudoheader for checksum calculation
13
Figure shows the checksum calculation for a very small user datagram
with only 7 bytes of data. Because the number of bytes of data is odd,
padding is added for checksum calculation. The pseudoheader as well
as the padding will be dropped when the user datagram is delivered to
IP.
Example 23.2
14
Figure Checksum calculation of a simple UDP user datagram
Figure 23.12 Queues in UDP
15
23-3 TCP
TCP is a connection-oriented protocol; it creates a
virtual connection between two TCPs to send data. In
addition, TCP uses flow and error control mechanisms
at the transport level.
TCP Services
TCP Features
Segment
A TCP Connection
Flow Control
Error Control
Topics discussed in this section:
16
Table 23.2 Well-known ports used by TCP
17
Figure 23.13 Stream delivery
18
The bytes of data being transferred in each
connection are numbered by TCP. The numbering
starts with a randomly generated number.
Note
Figure 23.14 Sending and receiving buffers
19
Figure 23.15 TCP segments
20
The following shows the sequence number for
each segment:
Example 23.3
21
The value in the sequence number field
of a segment defines the number of the
first data byte contained in that segment.
Note
Figure 23.16 TCP segment format
The value of the acknowledgment field in a segment
defines the number of the next byte a party expects
to receive.The acknowledgment no. is cumulative.
Note
22
Figure 23.17 Control field
23
Figure 23.18 Connection establishment using three-way handshaking
Note
A SYN segment cannot carry data,
but it consumes one seq. no.
A SYN+ACK segment cannot carry
data, but does consume one seq. no.
An ACK segment, if carrying no data,
consumes no seq. no.
24
Figure 23.19 Data transfer
25
The FIN segment consumes
one sequence number if it
does not carry data.
Note
The FIN + ACK segment
consumes one sequence
number if it does not carry
data.
Figure 23.20 Connection termination using three-way handshaking
26
Figure 23.21 Half-close Figure 23.22 Sliding window
A sliding window is used to make
transmission more efficient as
well as to control the flow of data
so that the destination does not
become overwhelmed with data.
TCP sliding windows are byte-
oriented.
Note
27
Solution
The value of rwnd = 5000 − 1000 = 4000. Host B can receive only
4000 bytes of data before overflowing its buffer. Host B advertises this
value in its next segment to A.
What is the value of the receiver window (rwnd) for host A if
the receiver, host B, has a buffer size of 5000 bytes and 1000
bytes of received and unprocessed data?
Example 23.4
28
Example 23.5 : What is the size of the window for host A if the
value of rwnd is 3000 bytes and the value of cwnd is 3500 bytes?
Solution
The size of the window is the smaller of rwnd and cwnd, which is
3000 bytes.
reality this value is thousands of bytes). The receiver has sent an
acknowledgment number of 200 with an rwnd of 9 bytes (in reality this
value is thousands of bytes). The size of the sender window is the
minimum of rwnd and cwnd, or 9 bytes. Bytes 200 to 202 are sent, but
not acknowledged. Bytes 203 to 208 can be sent without worrying
about acknowledgment. Bytes 209 and above cannot be sent.
Example 23.6
Figure shows an unrealistic example of a sliding window. The
sender has sent bytes up to 202. We assume that cwnd is 20 (in
29
Some points about TCP sliding windows:
❏ The size of the window is the lesser of rwnd and
cwnd.
❏ The source does not have to send a full window’s
worth of data.
❏ The window can be opened or closed by the
receiver, but should not be shrunk.
❏ The destination can send an acknowledgment at
any time as long as it does not result in a shrinking
window.
❏ The receiver can temporarily shut down the
window; the sender, however, can always send a
segment of 1 byte after the window is shut down.
Note
30
ACK segments do not consume sequence numbers
and are not acknowledged.
Note
In modern implementations, a retransmission occurs if the
retransmission timer expires or three duplicate ACK
segments have arrived.
No retransmission timer is set for an ACK segment.
Data may arrive out of order and be temporarily stored by
the receiving TCP, but TCP guarantees that no out-of-order
segment is delivered to the process.
31
Figure 23.24 Normal operation
32
Figure 23.25 Lost segment
33
Figure 23.26 Fast retransmission
The receiver TCP
delivers only
ordered data to
the process.
Note
34
23-4 SCTP
Stream Control Transmission Protocol (SCTP) is a
new reliable, message-oriented transport layer
protocol. SCTP, however, is mostly designed for
Internet applications that have recently been
introduced. These new applications need a more
sophisticated service than TCP can provide.
SCTP Services and Features
Packet Format
An SCTPAssociation
Flow Control and Error Control
Topics discussed in this section:
35
Table 23.4 Some SCTP applications
SCTP is a message-oriented, reliable protocol that
combines the best features of UDP and TCP.
Note
36
Figure 23.27 Multiple-stream concept
An association in SCTP can involve
multiple streams.
Note
37
Figure 23.28 Multihoming concept
SCTP association allows multiple IP
addresses for each end.
Note
38
In SCTP, a data chunk is numbered using a TSN.
Note
39
To distinguish between different streams, SCTP uses an SI.
To distinguish between different data chunks belonging to
the same stream, SCTP uses SSNs.
TCP has segments; SCTP has packets.
Figure 23.29 Comparison between a TCP segment and an SCTP packet
40
In SCTP, control information and data
information are carried in separate chunks.
Note
Figure 23.30 Packet, data chunks, and streams
Data chunks are identified by three items: TSN, SI, and SSN.
TSN is a cumulative number identifying the association; SI
defines the stream; SSN defines the chunk in a stream.
Note
41
Figure 23.31 SCTP packet format
In SCTP, acknowledgment numbers are used to acknowledge only data
chunks; control chunks are ack. by other control chunks if necessary.
Note
In an SCTP packet, control chunks come before data chunks.
42
Figure 23.32 General header Figure 23.33 Four-way handshaking
43
Table 23.5 Chunks
44
A connection in SCTP is called an association.
Note
No other chunk is allowed in a packet carrying an INIT or
INIT ACK chunk. A COOKIE ECHO or a COOKIE ACK chunk
can carry data chunks.
In SCTP, only DATA chunks consume TSNs; DATA chunks
are the only chunks that are acknowledged.
45
Figure 23.34 Simple data transfer
The
acknowledgment
in SCTP defines
the cumulative
TSN, the TSN of
the last data
chunk received in
order.
Note
46
Figure 23.35 Association termination
47
Figure 23.36 Flow control, receiver site
Figure 23.37 Flow control, sender site
48
Figure 23.38 Flow control scenario
49
Figure 23.39 Error control, receiver site
50
Figure 23.40 Error control, sender site
51
Questions?

More Related Content

What's hot

Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLjunnubabu
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure callSunita Sahu
 
The Transport Layer
The Transport LayerThe Transport Layer
The Transport Layeradil raja
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocolPradeep Kumar TS
 
Routing Information Protocol (RIP)
Routing Information Protocol(RIP)Routing Information Protocol(RIP)
Routing Information Protocol (RIP)waqasahmad1995
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computingZituSahu
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)k33a
 
Network layer
Network layerNetwork layer
Network layersbkbca
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manetshiujinghan
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference ModelMukesh Tekwani
 
Communications is distributed systems
Communications is distributed systemsCommunications is distributed systems
Communications is distributed systemsSHATHAN
 

What's hot (20)

Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
 
Multicast routing
Multicast routingMulticast routing
Multicast routing
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure call
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
Data link layer
Data link layerData link layer
Data link layer
 
The Transport Layer
The Transport LayerThe Transport Layer
The Transport Layer
 
Transport layer protocols : TCP and UDP
Transport layer protocols  : TCP and UDPTransport layer protocols  : TCP and UDP
Transport layer protocols : TCP and UDP
 
Application layer
Application layerApplication layer
Application layer
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
 
Routing Information Protocol (RIP)
Routing Information Protocol(RIP)Routing Information Protocol(RIP)
Routing Information Protocol (RIP)
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computing
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Network layer
Network layerNetwork layer
Network layer
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manet
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Communications is distributed systems
Communications is distributed systemsCommunications is distributed systems
Communications is distributed systems
 
Routing ppt
Routing pptRouting ppt
Routing ppt
 

Similar to Cs8591 u4

UNIT IV-Transport Layer.pptx
UNIT IV-Transport Layer.pptxUNIT IV-Transport Layer.pptx
UNIT IV-Transport Layer.pptxLAVANYAsrietacin
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks Kathirvel Ayyaswamy
 
transport-layer-forouzan.pdf
transport-layer-forouzan.pdftransport-layer-forouzan.pdf
transport-layer-forouzan.pdfAsifSalim12
 
23 Process to_Process_Delivery_UDP_TCP_and_SCTP
23 Process to_Process_Delivery_UDP_TCP_and_SCTP23 Process to_Process_Delivery_UDP_TCP_and_SCTP
23 Process to_Process_Delivery_UDP_TCP_and_SCTPAhmar Hashmi
 
Transport layer TCP and UDP.ppt
Transport layer TCP and UDP.pptTransport layer TCP and UDP.ppt
Transport layer TCP and UDP.pptAlliVinay1
 
DCN 5th ed. slides ch24 Transport-Layer Protocols.pdf
DCN 5th ed. slides ch24 Transport-Layer Protocols.pdfDCN 5th ed. slides ch24 Transport-Layer Protocols.pdf
DCN 5th ed. slides ch24 Transport-Layer Protocols.pdfBilal Munir Mughal
 
transport layer protocols
transport layer protocolstransport layer protocols
transport layer protocolsBE Smârt
 
Transport layer udp and tcp network
Transport layer udp and tcp networkTransport layer udp and tcp network
Transport layer udp and tcp networkHamzahMohammed4
 
04 MK-PPT End-to-End Protocols.ppt
04 MK-PPT End-to-End Protocols.ppt04 MK-PPT End-to-End Protocols.ppt
04 MK-PPT End-to-End Protocols.pptdhivyak49
 
Unit_3_TCP_UDP.ppt
Unit_3_TCP_UDP.pptUnit_3_TCP_UDP.ppt
Unit_3_TCP_UDP.pptzmulani8
 
Computer Communication Networks- TRANSPORT LAYER PROTOCOLS
Computer Communication Networks- TRANSPORT LAYER PROTOCOLSComputer Communication Networks- TRANSPORT LAYER PROTOCOLS
Computer Communication Networks- TRANSPORT LAYER PROTOCOLSKrishna Nanda
 

Similar to Cs8591 u4 (20)

UNIT IV-Transport Layer.pptx
UNIT IV-Transport Layer.pptxUNIT IV-Transport Layer.pptx
UNIT IV-Transport Layer.pptx
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks
 
Ch23
Ch23Ch23
Ch23
 
Chapter 23
Chapter 23Chapter 23
Chapter 23
 
transport-layer-forouzan.pdf
transport-layer-forouzan.pdftransport-layer-forouzan.pdf
transport-layer-forouzan.pdf
 
Ch23
Ch23Ch23
Ch23
 
23 Process to_Process_Delivery_UDP_TCP_and_SCTP
23 Process to_Process_Delivery_UDP_TCP_and_SCTP23 Process to_Process_Delivery_UDP_TCP_and_SCTP
23 Process to_Process_Delivery_UDP_TCP_and_SCTP
 
udp , tcp ,sctp
udp , tcp ,sctpudp , tcp ,sctp
udp , tcp ,sctp
 
Ch 22
Ch 22Ch 22
Ch 22
 
Tcp udp
Tcp udpTcp udp
Tcp udp
 
Transport layer TCP and UDP.ppt
Transport layer TCP and UDP.pptTransport layer TCP and UDP.ppt
Transport layer TCP and UDP.ppt
 
DCN 5th ed. slides ch24 Transport-Layer Protocols.pdf
DCN 5th ed. slides ch24 Transport-Layer Protocols.pdfDCN 5th ed. slides ch24 Transport-Layer Protocols.pdf
DCN 5th ed. slides ch24 Transport-Layer Protocols.pdf
 
transport layer protocols
transport layer protocolstransport layer protocols
transport layer protocols
 
Transport layer udp and tcp network
Transport layer udp and tcp networkTransport layer udp and tcp network
Transport layer udp and tcp network
 
unit 3 ns.ppt
unit 3 ns.pptunit 3 ns.ppt
unit 3 ns.ppt
 
Transport_layer.ppt
Transport_layer.pptTransport_layer.ppt
Transport_layer.ppt
 
04 MK-PPT End-to-End Protocols.ppt
04 MK-PPT End-to-End Protocols.ppt04 MK-PPT End-to-End Protocols.ppt
04 MK-PPT End-to-End Protocols.ppt
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
 
Unit_3_TCP_UDP.ppt
Unit_3_TCP_UDP.pptUnit_3_TCP_UDP.ppt
Unit_3_TCP_UDP.ppt
 
Computer Communication Networks- TRANSPORT LAYER PROTOCOLS
Computer Communication Networks- TRANSPORT LAYER PROTOCOLSComputer Communication Networks- TRANSPORT LAYER PROTOCOLS
Computer Communication Networks- TRANSPORT LAYER PROTOCOLS
 

More from Kathirvel Ayyaswamy

22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTUREKathirvel Ayyaswamy
 
20CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 220CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 2Kathirvel Ayyaswamy
 
Recent Trends in IoT and Sustainability
Recent Trends in IoT and SustainabilityRecent Trends in IoT and Sustainability
Recent Trends in IoT and SustainabilityKathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security 18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security Kathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology20CS024 Ethics in Information Technology
20CS024 Ethics in Information TechnologyKathirvel Ayyaswamy
 

More from Kathirvel Ayyaswamy (20)

22CS201 COA
22CS201 COA22CS201 COA
22CS201 COA
 
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
 
22CS201 COA
22CS201 COA22CS201 COA
22CS201 COA
 
18CS3040_Distributed Systems
18CS3040_Distributed Systems18CS3040_Distributed Systems
18CS3040_Distributed Systems
 
20CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 220CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 2
 
18CS3040 Distributed System
18CS3040 Distributed System	18CS3040 Distributed System
18CS3040 Distributed System
 
20CS2021 Distributed Computing
20CS2021 Distributed Computing 20CS2021 Distributed Computing
20CS2021 Distributed Computing
 
20CS2021 DISTRIBUTED COMPUTING
20CS2021 DISTRIBUTED COMPUTING20CS2021 DISTRIBUTED COMPUTING
20CS2021 DISTRIBUTED COMPUTING
 
18CS3040 DISTRIBUTED SYSTEMS
18CS3040 DISTRIBUTED SYSTEMS18CS3040 DISTRIBUTED SYSTEMS
18CS3040 DISTRIBUTED SYSTEMS
 
Recent Trends in IoT and Sustainability
Recent Trends in IoT and SustainabilityRecent Trends in IoT and Sustainability
Recent Trends in IoT and Sustainability
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security 18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
20CS2008 Computer Networks
20CS2008 Computer Networks20CS2008 Computer Networks
20CS2008 Computer Networks
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 

Recently uploaded

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 

Recently uploaded (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 

Cs8591 u4

  • 1. CS8591 COMPUTER NETWORKS UNIT – IV Dr.A.Kathirvel, Professor & Head, Computer Science & Engg. M N M Jain Engineering College, Chennai
  • 2. Unit - IV TRANSPORT LAYER Introduction – Transport Layer Protocols – Services – Port Numbers – User Datagram Protocol – Transmission Control Protocol – SCTP. Behrouz A. Forouzan, Data Communications and Networking, Fifth Edition TMH, 2013
  • 3. 23-1 PROCESS-TO-PROCESS DELIVERY The transport layer is responsible for process-to- process delivery—the delivery of a packet, part of a message, from one process to another. Two processes communicate in a client/server relationship, as we will see later. Client/Server Paradigm Multiplexing and Demultiplexing Connectionless Versus Connection-Oriented Service Reliable Versus Unreliable Three Protocols Topics discussed in this section: 3
  • 4. The transport layer is responsible for process-to-process delivery. Note 4 Figure 23.1 Types of data deliveries
  • 5. Figure 23.2 Port numbers Figure 23.4 IANA ranges 5
  • 6. Figure 23.3 IP addresses versus port numbers 6 Figure 23.6 Multiplexing and demultiplexing Figure 23.5 Socket address
  • 7. Figure 23.7 Error control 7
  • 8. Figure 23.8 Position of UDP, TCP, and SCTP in TCP/IP suite 8
  • 9. 23-2 USER DATAGRAM PROTOCOL (UDP) The User Datagram Protocol (UDP) is called a connectionless, unreliable transport protocol. It does not add anything to the services of IP except to provide process-to-process communication instead of host-to- host communication. Well-Known Ports for UDP User Datagram Checksum UDP Operation Use of UDP Topics discussed in this section: 9
  • 10. Table 23.1 Well-known ports used with UDP 10
  • 11. In UNIX, the well-known ports are stored in a file called /etc/services. Each line in this file gives the name of the server and the well-known port number. We can use the grep utility to extract the line corresponding to the desired application. The following shows the port for FTP. Note that FTP can use port 21 with either UDP or TCP. Example 23.1 11 SNMP uses two port numbers 161&162, each for a different purpose.
  • 12. Figure 23.9 User datagram format UDP length = IP length – IP header’s length Note 12
  • 13. Figure 23.10 Pseudoheader for checksum calculation 13
  • 14. Figure shows the checksum calculation for a very small user datagram with only 7 bytes of data. Because the number of bytes of data is odd, padding is added for checksum calculation. The pseudoheader as well as the padding will be dropped when the user datagram is delivered to IP. Example 23.2 14 Figure Checksum calculation of a simple UDP user datagram
  • 15. Figure 23.12 Queues in UDP 15
  • 16. 23-3 TCP TCP is a connection-oriented protocol; it creates a virtual connection between two TCPs to send data. In addition, TCP uses flow and error control mechanisms at the transport level. TCP Services TCP Features Segment A TCP Connection Flow Control Error Control Topics discussed in this section: 16
  • 17. Table 23.2 Well-known ports used by TCP 17
  • 18. Figure 23.13 Stream delivery 18 The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a randomly generated number. Note
  • 19. Figure 23.14 Sending and receiving buffers 19
  • 20. Figure 23.15 TCP segments 20
  • 21. The following shows the sequence number for each segment: Example 23.3 21 The value in the sequence number field of a segment defines the number of the first data byte contained in that segment. Note
  • 22. Figure 23.16 TCP segment format The value of the acknowledgment field in a segment defines the number of the next byte a party expects to receive.The acknowledgment no. is cumulative. Note 22
  • 24. Figure 23.18 Connection establishment using three-way handshaking Note A SYN segment cannot carry data, but it consumes one seq. no. A SYN+ACK segment cannot carry data, but does consume one seq. no. An ACK segment, if carrying no data, consumes no seq. no. 24
  • 25. Figure 23.19 Data transfer 25 The FIN segment consumes one sequence number if it does not carry data. Note The FIN + ACK segment consumes one sequence number if it does not carry data.
  • 26. Figure 23.20 Connection termination using three-way handshaking 26
  • 27. Figure 23.21 Half-close Figure 23.22 Sliding window A sliding window is used to make transmission more efficient as well as to control the flow of data so that the destination does not become overwhelmed with data. TCP sliding windows are byte- oriented. Note 27
  • 28. Solution The value of rwnd = 5000 − 1000 = 4000. Host B can receive only 4000 bytes of data before overflowing its buffer. Host B advertises this value in its next segment to A. What is the value of the receiver window (rwnd) for host A if the receiver, host B, has a buffer size of 5000 bytes and 1000 bytes of received and unprocessed data? Example 23.4 28 Example 23.5 : What is the size of the window for host A if the value of rwnd is 3000 bytes and the value of cwnd is 3500 bytes? Solution The size of the window is the smaller of rwnd and cwnd, which is 3000 bytes.
  • 29. reality this value is thousands of bytes). The receiver has sent an acknowledgment number of 200 with an rwnd of 9 bytes (in reality this value is thousands of bytes). The size of the sender window is the minimum of rwnd and cwnd, or 9 bytes. Bytes 200 to 202 are sent, but not acknowledged. Bytes 203 to 208 can be sent without worrying about acknowledgment. Bytes 209 and above cannot be sent. Example 23.6 Figure shows an unrealistic example of a sliding window. The sender has sent bytes up to 202. We assume that cwnd is 20 (in 29
  • 30. Some points about TCP sliding windows: ❏ The size of the window is the lesser of rwnd and cwnd. ❏ The source does not have to send a full window’s worth of data. ❏ The window can be opened or closed by the receiver, but should not be shrunk. ❏ The destination can send an acknowledgment at any time as long as it does not result in a shrinking window. ❏ The receiver can temporarily shut down the window; the sender, however, can always send a segment of 1 byte after the window is shut down. Note 30
  • 31. ACK segments do not consume sequence numbers and are not acknowledged. Note In modern implementations, a retransmission occurs if the retransmission timer expires or three duplicate ACK segments have arrived. No retransmission timer is set for an ACK segment. Data may arrive out of order and be temporarily stored by the receiving TCP, but TCP guarantees that no out-of-order segment is delivered to the process. 31
  • 32. Figure 23.24 Normal operation 32
  • 33. Figure 23.25 Lost segment 33
  • 34. Figure 23.26 Fast retransmission The receiver TCP delivers only ordered data to the process. Note 34
  • 35. 23-4 SCTP Stream Control Transmission Protocol (SCTP) is a new reliable, message-oriented transport layer protocol. SCTP, however, is mostly designed for Internet applications that have recently been introduced. These new applications need a more sophisticated service than TCP can provide. SCTP Services and Features Packet Format An SCTPAssociation Flow Control and Error Control Topics discussed in this section: 35
  • 36. Table 23.4 Some SCTP applications SCTP is a message-oriented, reliable protocol that combines the best features of UDP and TCP. Note 36
  • 37. Figure 23.27 Multiple-stream concept An association in SCTP can involve multiple streams. Note 37
  • 38. Figure 23.28 Multihoming concept SCTP association allows multiple IP addresses for each end. Note 38
  • 39. In SCTP, a data chunk is numbered using a TSN. Note 39 To distinguish between different streams, SCTP uses an SI. To distinguish between different data chunks belonging to the same stream, SCTP uses SSNs. TCP has segments; SCTP has packets.
  • 40. Figure 23.29 Comparison between a TCP segment and an SCTP packet 40 In SCTP, control information and data information are carried in separate chunks. Note
  • 41. Figure 23.30 Packet, data chunks, and streams Data chunks are identified by three items: TSN, SI, and SSN. TSN is a cumulative number identifying the association; SI defines the stream; SSN defines the chunk in a stream. Note 41
  • 42. Figure 23.31 SCTP packet format In SCTP, acknowledgment numbers are used to acknowledge only data chunks; control chunks are ack. by other control chunks if necessary. Note In an SCTP packet, control chunks come before data chunks. 42
  • 43. Figure 23.32 General header Figure 23.33 Four-way handshaking 43
  • 45. A connection in SCTP is called an association. Note No other chunk is allowed in a packet carrying an INIT or INIT ACK chunk. A COOKIE ECHO or a COOKIE ACK chunk can carry data chunks. In SCTP, only DATA chunks consume TSNs; DATA chunks are the only chunks that are acknowledged. 45
  • 46. Figure 23.34 Simple data transfer The acknowledgment in SCTP defines the cumulative TSN, the TSN of the last data chunk received in order. Note 46
  • 47. Figure 23.35 Association termination 47
  • 48. Figure 23.36 Flow control, receiver site Figure 23.37 Flow control, sender site 48
  • 49. Figure 23.38 Flow control scenario 49
  • 50. Figure 23.39 Error control, receiver site 50
  • 51. Figure 23.40 Error control, sender site 51