SlideShare a Scribd company logo
1 of 50
Vidya Vardhaka College of Engineering, Mysuru
Department of Computer Science & Engineering
Computer Networks (15CS52)
Module-2:Transport Layer
Gururaj H L
Assistant Professor,
Dept. of CSE, VVCE, Mysuru
gururaj1711@vvce.ac.in
gururajhl.blogspot.com
Contents
1. Introduction and Transport-Layer Services
2. Multiplexing and Demultiplexing
3. Connectionless Transport: UDP
4. Principles of Reliable Data Transfer
5. Connection-Oriented Transport: TCP
6. Principles of Congestion Control
7. TCP Congestion Control
30-07-2018 Dept. of CSE, VVCE, Mysuru 2
Introduction and Transport-Layer Services
• Provide logical communication between application processes running on
different hosts
• Transport protocols run in end systems
• sender side: breaks application messages into segments, passes to network
layer
• Receiver side: reassembles segments into messages, passes to app layer
• More than one transport protocol available to applications
• Internet: TCP and UDP
30-07-2018 Dept. of CSE, VVCE, Mysuru 3
Figure1 Logical Connection
30-07-2018 Dept. of CSE, VVCE, Mysuru 4
Relationship Between Transport and Network Layers
• Network layer:
Logical communication between hosts
• Transport layer:
Logical communication between processes relies on,
enhances, network layer services.
Overview of the Transport Layer in the Internet
• TCP/IP Model
• UDP-datagram, packet ( RFC 768)
• TCP-segments (RFC 793)
30-07-2018 Dept. of CSE, VVCE, Mysuru 5
Overview of the Transport Layer in the Internet
TCP Services
• Reliable
• Ordered
• Point to point
• Byte stream
• Full duplex
• Flow and congestion control
30-07-2018 Dept. of CSE, VVCE, Mysuru 6
UDP Services
• Unreliable
• Unordered
• No flow and congestion control
• Checksum
• Connectionless service
Multiplexing and Demultiplexing
• Source port number field
• Destination port number field
• Port number is a 16-bit number (0 to 65535).
• The port numbers ranging from 0 to 1023 are called well-known port
numbers (HTTP :80 and FTP : 21).
30-07-2018 Dept. of CSE, VVCE, Mysuru 7
30-07-2018 Dept. of CSE, VVCE, Mysuru 8
Figure 2 Transport layer multiplexing and demultiplexing
Multiplexing and Demultiplexing
• Connectionless/UDP Multiplexing & Demultiplexing
UDP socket is identified by a two-tuple: (destination IP address, destination
port number).
• Connection oriented/TCP Multiplexing & Demultiplexing
TCP socket is identified by a four-tuple: (source IP address, source port
number, destination IP address, destination port number).
30-07-2018 Dept. of CSE, VVCE, Mysuru 9
Figure 3 Two clients, using the same destination port number (80) to communicate with the same Web server application
30-07-2018 Dept. of CSE, VVCE, Mysuru 10
Connectionless Transport: UDP
• “No frills,” “bare bones” Internet transport protocol
• “best effort” service, UDP segments may be:
• lost
• delivered out-of-order to application
• Connectionless:
• No handshaking between UDP sender, receiver
• Each UDP segment handled independently of others
• UDP use:
• streaming multimedia applications (loss tolerant, rate sensitive)
• DNS
• SNMP
• Reliable transfer over UDP:
• Add reliability at application layer
• Application-specific error recovery.
30-07-2018 Dept. of CSE, VVCE, Mysuru 11
UDP Segment Structure
30-07-2018 Dept. of CSE, VVCE, Mysuru 12
UDP Checksum
• The errors will be detected in the transmitted data
• Treat segment contents, including header fields, as sequence of 16-bit
integers.
• Checksum: addition (one’s complement sum) of segment contents
30-07-2018 Dept. of CSE, VVCE, Mysuru 13
Principles of Reliable Data Transfer
• Frames can corrupted or lost.
• Recover the corrupted or lost frames  Reliable data transfer
• One of the most researched topic in networking
• We will provide a framework for reliable data transfer protocol in link
layer it will be extended to transport layer
30-07-2018 Dept. of CSE, VVCE, Mysuru 14
30-07-2018 Dept. of CSE, VVCE, Mysuru 15
30-07-2018 Dept. of CSE, VVCE, Mysuru 16
Reliable data transfer: Service model and service implementation
RDT1.0: reliable transfer over a reliable channel
• Underlying channel perfectly reliable
• no bit errors
• no loss of packets
• Separate FSMs for sender, receiver:
• sender sends data into underlying channel
• receiver reads data from underlying channel
30-07-2018 Dept. of CSE, VVCE, Mysuru 17
RDT1.0: Channel with bit errors
• Required Functionality
• CRC Checksum
• Receiver Feedback
• Positive feedback
• Negative feedback
30-07-2018 Dept. of CSE, VVCE, Mysuru 18
Automatic Repeat Request (ARQ)
• Protocols based on feedback and retransmission
• RDTv1.o has fatal flaw if ACK/ NACK got corrupted
30-07-2018 Dept. of CSE, VVCE, Mysuru 19
30-07-2018 Dept. of CSE, VVCE, Mysuru 20
30-07-2018 Dept. of CSE, VVCE, Mysuru 21
30-07-2018 Dept. of CSE, VVCE, Mysuru 22
“Sequence Number space”
RTDv2.1
• Operation: NACK free operation
30-07-2018 Dept. of CSE, VVCE, Mysuru 23
30-07-2018 Dept. of CSE, VVCE, Mysuru 24
30-07-2018 Dept. of CSE, VVCE, Mysuru 25
RDT 2.1 Sender
30-07-2018 Dept. of CSE, VVCE, Mysuru 26
RDT 2.1 Receiver
Channel with Errors and Losses
• Sender gets no feedback : Need a timeout mechanism
• Waiting time is a link level characteristics
• Propagation time
• Transmission time
• Processing time
30-07-2018 Dept. of CSE, VVCE, Mysuru 27
30-07-2018 Dept. of CSE, VVCE, Mysuru 28
30-07-2018 Dept. of CSE, VVCE, Mysuru 29
30-07-2018 Dept. of CSE, VVCE, Mysuru 30
Sorcerers apprentice bug
30-07-2018 Dept. of CSE, VVCE, Mysuru 31
RDT 3.0 Sender
Performance of RDT 3.0
• The throughput achieved for 1 Gbps link, 15 ms prop. delay, 8000 bit
packet:
• Sender Utilization
30-07-2018 Dept. of CSE, VVCE, Mysuru 32
30-07-2018 Dept. of CSE, VVCE, Mysuru 33
Go Back N ARQ
30-07-2018 Dept. of CSE, VVCE, Mysuru 34
Damaged frames and Lost ACK
30-07-2018 Dept. of CSE, VVCE, Mysuru 35
Selective Repeat ARQ
30-07-2018 Dept. of CSE, VVCE, Mysuru 36
TCP
30-07-2018 Dept. of CSE, VVCE, Mysuru 37
TCP Segment format
30-07-2018 Dept. of CSE, VVCE, Mysuru 38
SYN and ACK
30-07-2018 Dept. of CSE, VVCE, Mysuru 39
TCP RTT and Timeout
• Longer than RTT
• but RTT varies
• Too short: premature timeout, unnecessary retransmissions
• Too long: slow reaction to segment loss
30-07-2018 Dept. of CSE, VVCE, Mysuru 40
TCP Reliable Transfer Protocol
• TCP creates rdt service on top of IP’s unreliable service
• pipelined segments
• cumulative acks
• single retransmission timer
• retransmissions triggered by:
• timeout events
• duplicate acks
30-07-2018 Dept. of CSE, VVCE, Mysuru 41
let’s initially consider simplified TCP sender:
• ignore duplicate acks
• ignore flow control, congestion control
TCP Retransmission Scenarios
30-07-2018 Dept. of CSE, VVCE, Mysuru 42
30-07-2018 Dept. of CSE, VVCE, Mysuru 43
Fast Retransmit
30-07-2018 Dept. of CSE, VVCE, Mysuru 44
TCP Flow Control
• Receiver controls sender, so sender won’t overflow receiver’s buffer by
transmitting too much, too fast
• Receive window (rwnd) is used to give the sender an idea of how much free buffer
space is available at the receiver.
30-07-2018 Dept. of CSE, VVCE, Mysuru 45
TCP Connection Management
Before exchanging data, sender/receiver “handshake”:
• Agree to establish connection (each knowing the other willing to
establish connection)
• Agree on connection parameters
30-07-2018 Dept. of CSE, VVCE, Mysuru 46
Three way handshake Procedure
30-07-2018 Dept. of CSE, VVCE, Mysuru 47
Connection Termination
30-07-2018 Dept. of CSE, VVCE, Mysuru 48
REFERENCES
Text Book:
[1]James F kurose, Keith W Ross “Computer Networking -A
top down approach” Sixth Edition, Pearson publication, 2017
[2] NPTEL videos on Computer Networks.
30-07-2018 Dept. of CSE, VVCE, Mysuru 49
THANK YOU
30-07-2018 Dept. of CSE, VVCE, Mysuru 50

More Related Content

What's hot

Transport protocols
Transport protocolsTransport protocols
Transport protocolsOnline
 
application layer protocols
application layer protocolsapplication layer protocols
application layer protocolsbhavanatmithun
 
Transport layer features and functionality
Transport layer features and functionalityTransport layer features and functionality
Transport layer features and functionalitySatyendra Mohan
 
Transport Layer In Computer Network
Transport Layer In Computer NetworkTransport Layer In Computer Network
Transport Layer In Computer NetworkDestro Destro
 
Proof of Transit: Securely Verifying a Path or Service Chain
Proof of Transit: Securely Verifying a Path or Service ChainProof of Transit: Securely Verifying a Path or Service Chain
Proof of Transit: Securely Verifying a Path or Service ChainFrank Brockners
 
transport layer protocols
transport layer protocolstransport layer protocols
transport layer protocolsBE Smârt
 
Computer networks unit iv
Computer networks    unit ivComputer networks    unit iv
Computer networks unit ivJAIGANESH SEKAR
 
Network Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerNetwork Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerAbdelkhalik Mosa
 
The Transport Layer
The Transport LayerThe Transport Layer
The Transport Layeradil raja
 
Multipath TCP as Security Solution
Multipath TCP as Security SolutionMultipath TCP as Security Solution
Multipath TCP as Security SolutionNishant Pawar
 
The Meteor Framework
The Meteor FrameworkThe Meteor Framework
The Meteor FrameworkDamien Magoni
 
transport layer
transport layer transport layer
transport layer usman19
 
19 Network Layer Protocols
19 Network Layer Protocols19 Network Layer Protocols
19 Network Layer ProtocolsMeenakshi Paul
 

What's hot (19)

Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
application layer protocols
application layer protocolsapplication layer protocols
application layer protocols
 
Transport layer features and functionality
Transport layer features and functionalityTransport layer features and functionality
Transport layer features and functionality
 
Transport Layer In Computer Network
Transport Layer In Computer NetworkTransport Layer In Computer Network
Transport Layer In Computer Network
 
Proof of Transit: Securely Verifying a Path or Service Chain
Proof of Transit: Securely Verifying a Path or Service ChainProof of Transit: Securely Verifying a Path or Service Chain
Proof of Transit: Securely Verifying a Path or Service Chain
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
transport layer protocols
transport layer protocolstransport layer protocols
transport layer protocols
 
Computer networks unit iv
Computer networks    unit ivComputer networks    unit iv
Computer networks unit iv
 
Network Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerNetwork Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport Layer
 
The Transport Layer
The Transport LayerThe Transport Layer
The Transport Layer
 
Multipath TCP as Security Solution
Multipath TCP as Security SolutionMultipath TCP as Security Solution
Multipath TCP as Security Solution
 
Transport Protocols
Transport ProtocolsTransport Protocols
Transport Protocols
 
Transport layer
Transport layerTransport layer
Transport layer
 
Transport layer protocols : TCP and UDP
Transport layer protocols  : TCP and UDPTransport layer protocols  : TCP and UDP
Transport layer protocols : TCP and UDP
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
The Meteor Framework
The Meteor FrameworkThe Meteor Framework
The Meteor Framework
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
transport layer
transport layer transport layer
transport layer
 
19 Network Layer Protocols
19 Network Layer Protocols19 Network Layer Protocols
19 Network Layer Protocols
 

Similar to Module 2

LECTURE-Transport-Layer_lec.ppt
LECTURE-Transport-Layer_lec.pptLECTURE-Transport-Layer_lec.ppt
LECTURE-Transport-Layer_lec.pptMonirHossain707319
 
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdfDr. Shivashankar
 
Computer networks Module 3 Transport layer
Computer networks Module 3 Transport layerComputer networks Module 3 Transport layer
Computer networks Module 3 Transport layerclaudle200415
 
Dccp evaluation for sip signaling ict4 m
Dccp evaluation for sip signaling   ict4 m Dccp evaluation for sip signaling   ict4 m
Dccp evaluation for sip signaling ict4 m Agus Awaludin
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3Roman Brovko
 
transport.pptx
transport.pptxtransport.pptx
transport.pptxjatinder42
 
Computer Communication Networks- TRANSPORT LAYER PROTOCOLS
Computer Communication Networks- TRANSPORT LAYER PROTOCOLSComputer Communication Networks- TRANSPORT LAYER PROTOCOLS
Computer Communication Networks- TRANSPORT LAYER PROTOCOLSKrishna Nanda
 
Implementation ans analysis_of_quic_for_mqtt
Implementation ans analysis_of_quic_for_mqttImplementation ans analysis_of_quic_for_mqtt
Implementation ans analysis_of_quic_for_mqttPuneet Kumar
 
UDP and TCP header.ppt
UDP and TCP header.pptUDP and TCP header.ppt
UDP and TCP header.pptnehayarrapothu
 
RECAP: The Simulation Approach
RECAP: The Simulation ApproachRECAP: The Simulation Approach
RECAP: The Simulation ApproachRECAP Project
 
Chapter 3 - Transport Layer for VN Students
Chapter 3 - Transport Layer for VN StudentsChapter 3 - Transport Layer for VN Students
Chapter 3 - Transport Layer for VN Studentsalberttochiro
 
Unit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptxUnit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptxDESTROYER39
 
Unit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptxUnit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptxsarosh32
 

Similar to Module 2 (20)

LECTURE-Transport-Layer_lec.ppt
LECTURE-Transport-Layer_lec.pptLECTURE-Transport-Layer_lec.ppt
LECTURE-Transport-Layer_lec.ppt
 
User Datagram Protocol
User Datagram ProtocolUser Datagram Protocol
User Datagram Protocol
 
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf
 
Computer networks Module 3 Transport layer
Computer networks Module 3 Transport layerComputer networks Module 3 Transport layer
Computer networks Module 3 Transport layer
 
Dccp evaluation for sip signaling ict4 m
Dccp evaluation for sip signaling   ict4 m Dccp evaluation for sip signaling   ict4 m
Dccp evaluation for sip signaling ict4 m
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3
 
Transport_layer.ppt
Transport_layer.pptTransport_layer.ppt
Transport_layer.ppt
 
transport.pptx
transport.pptxtransport.pptx
transport.pptx
 
MODULE-4_CCN.pptx
MODULE-4_CCN.pptxMODULE-4_CCN.pptx
MODULE-4_CCN.pptx
 
3. transport layer
3. transport layer3. transport layer
3. transport layer
 
Computer Communication Networks- TRANSPORT LAYER PROTOCOLS
Computer Communication Networks- TRANSPORT LAYER PROTOCOLSComputer Communication Networks- TRANSPORT LAYER PROTOCOLS
Computer Communication Networks- TRANSPORT LAYER PROTOCOLS
 
Implementation ans analysis_of_quic_for_mqtt
Implementation ans analysis_of_quic_for_mqttImplementation ans analysis_of_quic_for_mqtt
Implementation ans analysis_of_quic_for_mqtt
 
unit 3 ns.ppt
unit 3 ns.pptunit 3 ns.ppt
unit 3 ns.ppt
 
Module 1
Module 1Module 1
Module 1
 
UDP and TCP header.ppt
UDP and TCP header.pptUDP and TCP header.ppt
UDP and TCP header.ppt
 
RECAP: The Simulation Approach
RECAP: The Simulation ApproachRECAP: The Simulation Approach
RECAP: The Simulation Approach
 
Chapter 3 - Transport Layer for VN Students
Chapter 3 - Transport Layer for VN StudentsChapter 3 - Transport Layer for VN Students
Chapter 3 - Transport Layer for VN Students
 
Lecture set 7
Lecture set 7Lecture set 7
Lecture set 7
 
Unit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptxUnit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptx
 
Unit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptxUnit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptx
 

Recently uploaded

analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxKarpagam Institute of Teechnology
 
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and ToolsMaximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Toolssoginsider
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1T.D. Shashikala
 
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxSLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxCHAIRMAN M
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalSwarnaSLcse
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...IJECEIAES
 
Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfJNTUA
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...drjose256
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfJNTUA
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdfAlexander Litvinenko
 
Circuit Breakers for Engineering Students
Circuit Breakers for Engineering StudentsCircuit Breakers for Engineering Students
Circuit Breakers for Engineering Studentskannan348865
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptjigup7320
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxMustafa Ahmed
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisDr.Costas Sachpazis
 
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailinghandbook on reinforce concrete and detailing
handbook on reinforce concrete and detailingAshishSingh1301
 
Software Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdfSoftware Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdfssuser5c9d4b1
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docxrahulmanepalli02
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
 

Recently uploaded (20)

analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and ToolsMaximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
 
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxSLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference Modal
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
 
Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdf
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
Circuit Breakers for Engineering Students
Circuit Breakers for Engineering StudentsCircuit Breakers for Engineering Students
Circuit Breakers for Engineering Students
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) ppt
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
 
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailinghandbook on reinforce concrete and detailing
handbook on reinforce concrete and detailing
 
Software Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdfSoftware Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdf
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 

Module 2

  • 1. Vidya Vardhaka College of Engineering, Mysuru Department of Computer Science & Engineering Computer Networks (15CS52) Module-2:Transport Layer Gururaj H L Assistant Professor, Dept. of CSE, VVCE, Mysuru gururaj1711@vvce.ac.in gururajhl.blogspot.com
  • 2. Contents 1. Introduction and Transport-Layer Services 2. Multiplexing and Demultiplexing 3. Connectionless Transport: UDP 4. Principles of Reliable Data Transfer 5. Connection-Oriented Transport: TCP 6. Principles of Congestion Control 7. TCP Congestion Control 30-07-2018 Dept. of CSE, VVCE, Mysuru 2
  • 3. Introduction and Transport-Layer Services • Provide logical communication between application processes running on different hosts • Transport protocols run in end systems • sender side: breaks application messages into segments, passes to network layer • Receiver side: reassembles segments into messages, passes to app layer • More than one transport protocol available to applications • Internet: TCP and UDP 30-07-2018 Dept. of CSE, VVCE, Mysuru 3
  • 4. Figure1 Logical Connection 30-07-2018 Dept. of CSE, VVCE, Mysuru 4
  • 5. Relationship Between Transport and Network Layers • Network layer: Logical communication between hosts • Transport layer: Logical communication between processes relies on, enhances, network layer services. Overview of the Transport Layer in the Internet • TCP/IP Model • UDP-datagram, packet ( RFC 768) • TCP-segments (RFC 793) 30-07-2018 Dept. of CSE, VVCE, Mysuru 5
  • 6. Overview of the Transport Layer in the Internet TCP Services • Reliable • Ordered • Point to point • Byte stream • Full duplex • Flow and congestion control 30-07-2018 Dept. of CSE, VVCE, Mysuru 6
  • 7. UDP Services • Unreliable • Unordered • No flow and congestion control • Checksum • Connectionless service Multiplexing and Demultiplexing • Source port number field • Destination port number field • Port number is a 16-bit number (0 to 65535). • The port numbers ranging from 0 to 1023 are called well-known port numbers (HTTP :80 and FTP : 21). 30-07-2018 Dept. of CSE, VVCE, Mysuru 7
  • 8. 30-07-2018 Dept. of CSE, VVCE, Mysuru 8 Figure 2 Transport layer multiplexing and demultiplexing
  • 9. Multiplexing and Demultiplexing • Connectionless/UDP Multiplexing & Demultiplexing UDP socket is identified by a two-tuple: (destination IP address, destination port number). • Connection oriented/TCP Multiplexing & Demultiplexing TCP socket is identified by a four-tuple: (source IP address, source port number, destination IP address, destination port number). 30-07-2018 Dept. of CSE, VVCE, Mysuru 9
  • 10. Figure 3 Two clients, using the same destination port number (80) to communicate with the same Web server application 30-07-2018 Dept. of CSE, VVCE, Mysuru 10
  • 11. Connectionless Transport: UDP • “No frills,” “bare bones” Internet transport protocol • “best effort” service, UDP segments may be: • lost • delivered out-of-order to application • Connectionless: • No handshaking between UDP sender, receiver • Each UDP segment handled independently of others • UDP use: • streaming multimedia applications (loss tolerant, rate sensitive) • DNS • SNMP • Reliable transfer over UDP: • Add reliability at application layer • Application-specific error recovery. 30-07-2018 Dept. of CSE, VVCE, Mysuru 11
  • 12. UDP Segment Structure 30-07-2018 Dept. of CSE, VVCE, Mysuru 12
  • 13. UDP Checksum • The errors will be detected in the transmitted data • Treat segment contents, including header fields, as sequence of 16-bit integers. • Checksum: addition (one’s complement sum) of segment contents 30-07-2018 Dept. of CSE, VVCE, Mysuru 13
  • 14. Principles of Reliable Data Transfer • Frames can corrupted or lost. • Recover the corrupted or lost frames  Reliable data transfer • One of the most researched topic in networking • We will provide a framework for reliable data transfer protocol in link layer it will be extended to transport layer 30-07-2018 Dept. of CSE, VVCE, Mysuru 14
  • 15. 30-07-2018 Dept. of CSE, VVCE, Mysuru 15
  • 16. 30-07-2018 Dept. of CSE, VVCE, Mysuru 16 Reliable data transfer: Service model and service implementation
  • 17. RDT1.0: reliable transfer over a reliable channel • Underlying channel perfectly reliable • no bit errors • no loss of packets • Separate FSMs for sender, receiver: • sender sends data into underlying channel • receiver reads data from underlying channel 30-07-2018 Dept. of CSE, VVCE, Mysuru 17
  • 18. RDT1.0: Channel with bit errors • Required Functionality • CRC Checksum • Receiver Feedback • Positive feedback • Negative feedback 30-07-2018 Dept. of CSE, VVCE, Mysuru 18
  • 19. Automatic Repeat Request (ARQ) • Protocols based on feedback and retransmission • RDTv1.o has fatal flaw if ACK/ NACK got corrupted 30-07-2018 Dept. of CSE, VVCE, Mysuru 19
  • 20. 30-07-2018 Dept. of CSE, VVCE, Mysuru 20
  • 21. 30-07-2018 Dept. of CSE, VVCE, Mysuru 21
  • 22. 30-07-2018 Dept. of CSE, VVCE, Mysuru 22 “Sequence Number space”
  • 23. RTDv2.1 • Operation: NACK free operation 30-07-2018 Dept. of CSE, VVCE, Mysuru 23
  • 24. 30-07-2018 Dept. of CSE, VVCE, Mysuru 24
  • 25. 30-07-2018 Dept. of CSE, VVCE, Mysuru 25 RDT 2.1 Sender
  • 26. 30-07-2018 Dept. of CSE, VVCE, Mysuru 26 RDT 2.1 Receiver
  • 27. Channel with Errors and Losses • Sender gets no feedback : Need a timeout mechanism • Waiting time is a link level characteristics • Propagation time • Transmission time • Processing time 30-07-2018 Dept. of CSE, VVCE, Mysuru 27
  • 28. 30-07-2018 Dept. of CSE, VVCE, Mysuru 28
  • 29. 30-07-2018 Dept. of CSE, VVCE, Mysuru 29
  • 30. 30-07-2018 Dept. of CSE, VVCE, Mysuru 30 Sorcerers apprentice bug
  • 31. 30-07-2018 Dept. of CSE, VVCE, Mysuru 31 RDT 3.0 Sender
  • 32. Performance of RDT 3.0 • The throughput achieved for 1 Gbps link, 15 ms prop. delay, 8000 bit packet: • Sender Utilization 30-07-2018 Dept. of CSE, VVCE, Mysuru 32
  • 33. 30-07-2018 Dept. of CSE, VVCE, Mysuru 33
  • 34. Go Back N ARQ 30-07-2018 Dept. of CSE, VVCE, Mysuru 34
  • 35. Damaged frames and Lost ACK 30-07-2018 Dept. of CSE, VVCE, Mysuru 35
  • 36. Selective Repeat ARQ 30-07-2018 Dept. of CSE, VVCE, Mysuru 36
  • 37. TCP 30-07-2018 Dept. of CSE, VVCE, Mysuru 37
  • 38. TCP Segment format 30-07-2018 Dept. of CSE, VVCE, Mysuru 38
  • 39. SYN and ACK 30-07-2018 Dept. of CSE, VVCE, Mysuru 39
  • 40. TCP RTT and Timeout • Longer than RTT • but RTT varies • Too short: premature timeout, unnecessary retransmissions • Too long: slow reaction to segment loss 30-07-2018 Dept. of CSE, VVCE, Mysuru 40
  • 41. TCP Reliable Transfer Protocol • TCP creates rdt service on top of IP’s unreliable service • pipelined segments • cumulative acks • single retransmission timer • retransmissions triggered by: • timeout events • duplicate acks 30-07-2018 Dept. of CSE, VVCE, Mysuru 41 let’s initially consider simplified TCP sender: • ignore duplicate acks • ignore flow control, congestion control
  • 42. TCP Retransmission Scenarios 30-07-2018 Dept. of CSE, VVCE, Mysuru 42
  • 43. 30-07-2018 Dept. of CSE, VVCE, Mysuru 43
  • 44. Fast Retransmit 30-07-2018 Dept. of CSE, VVCE, Mysuru 44
  • 45. TCP Flow Control • Receiver controls sender, so sender won’t overflow receiver’s buffer by transmitting too much, too fast • Receive window (rwnd) is used to give the sender an idea of how much free buffer space is available at the receiver. 30-07-2018 Dept. of CSE, VVCE, Mysuru 45
  • 46. TCP Connection Management Before exchanging data, sender/receiver “handshake”: • Agree to establish connection (each knowing the other willing to establish connection) • Agree on connection parameters 30-07-2018 Dept. of CSE, VVCE, Mysuru 46
  • 47. Three way handshake Procedure 30-07-2018 Dept. of CSE, VVCE, Mysuru 47
  • 48. Connection Termination 30-07-2018 Dept. of CSE, VVCE, Mysuru 48
  • 49. REFERENCES Text Book: [1]James F kurose, Keith W Ross “Computer Networking -A top down approach” Sixth Edition, Pearson publication, 2017 [2] NPTEL videos on Computer Networks. 30-07-2018 Dept. of CSE, VVCE, Mysuru 49
  • 50. THANK YOU 30-07-2018 Dept. of CSE, VVCE, Mysuru 50