SlideShare a Scribd company logo
Transport Layer PART V
Position of transport layer
Transport layer duties
Chapters Chapter 22   Process-to-Process Delivery Chapter 23   Congestion Control and QoS
Chapter 22 Process-to-Process Delivery: UDP and TCP
22.1  Process-to-Process Delivery Client-Server Paradigm Addressing Multiplexing and Demultiplexing Connectionless/Connection-Oriented Reliable/Unreliable
The transport layer is responsible for process-to-process delivery.  Note :
Figure 22.1   Types of data deliveries
Figure 22.2   Port numbers
Figure 22.3   IP addresses versus port numbers
Figure 22.4   IANA ranges
Figure 22.5   Socket address
Figure 22.6   Multiplexing and demultiplexing
Figure 22.7   Connection establishment
Figure 22.8   Connection termination
Figure 22.9   Error control
22.2  UDP Port Numbers User Datagram Applications
UDP is a connectionless, unreliable protocol that has no flow and error control. It uses port numbers to multiplex data from the application layer. Note :
Table 22.1  Well-known ports used by UDP Simple Network Management Protocol  SNMP 161 Simple Network Management Protocol (trap) SNMP 162 Trivial File Transfer Protocol TFTP    69 Remote Procedure Call RPC 111 Network Time Protocol NTP 123 Domain Name Service  Nameserver    53 Server port to download bootstrap information Bootps    67 Client port to download bootstrap information Bootpc    68 Returns the date and the time Daytime    13 Returns a quote of the day Quote    17 Returns a string of characters Chargen    19 Active users Users    11 Discards any datagram that is received Discard      9 Echo Protocol Echoes a received datagram back to the sender      7 Description Port
Figure 22.10   User datagram format
The calculation of checksum and its inclusion in the user datagram are optional.  Note :
UDP is a convenient transport-layer protocol for applications that provide flow and error control. It is also used by multimedia applications. Note :
22.3  TCP Port Numbers Services Sequence Numbers Segments Connection Transition Diagram Flow and Error Control Silly Window Syndrome
Table 22.2  Well-known ports used by TCP Remote Procedure Call RPC 111 Finger  Finger    79 Hypertext Transfer Protocol HTTP    80 Simple Mail Transfer Protocol SMTP    25 Domain Name Server  DNS    53 Bootstrap Protocol BOOTP    67 File Transfer Protocol (data connection) FTP, Data    20 File Transfer Protocol (control connection) FTP, Control    21 Terminal Network TELNET    23 Returns the date and the time Daytime    13 Returns a quote of the day Quote    17 Returns a string of characters Chargen    19 Active users Users    11 Discards any datagram that is received Discard      9 Echo Protocol Echoes a received datagram back to the sender     7 Description Port
Figure 22.11   Stream delivery
Figure 22.12   Sending and receiving buffers
Figure 22.13   TCP segments
Example 1 Imagine a TCP connection is transferring a file of 6000 bytes. The first byte is numbered 10010. What are the sequence numbers for each segment if data are sent in five segments with the first four segments carrying 1000 bytes and the last segment carrying 2000 bytes? Solution The following shows the sequence number for each segment: Segment 1   ==>   sequence number: 10,010 (range: 10,010 to 11,009) Segment 2 ==>   sequence number: 11,010 (range: 11,010 to 12,009) Segment 3   ==>   sequence number: 12,010 (range: 12,010 to 13,009) Segment 4 ==>   sequence number: 13,010 (range: 13,010 to 14,009) Segment 5 ==>   sequence number: 14,010 (range: 14,010 to 16,009)
The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a randomly generated number. Note :
The value of the sequence number field in a segment defines the number of the first data byte contained in that segment. Note :
The value of the acknowledgment field in a segment defines the number of the next byte a party expects to receive.  The acknowledgment number is cumulative. Note :
Figure 22.14   TCP segment format
Figure 22.15   Control field
Table 22.3  Description of flags in the control field Terminate the connection. FIN Synchronize sequence numbers during connection. SYN The connection must be reset. RST Push the data. PSH The value of the acknowledgment field is valid. ACK The value of the urgent pointer field is valid. URG Description Flag
Figure 22.16   Three-step connection establishment
Figure 22.17   Four-step connection termination
Table 22.4  States for TCP The server is waiting for the application to close. CLOSE-WAIT The server is waiting for the last acknowledgment. LAST-ACK The other side has accepted the closing of the connection. FIN-WAIT-2 Waiting for retransmitted segments to die. TIME-WAIT Connection is established. ESTABLISHED The application has requested the closing of the connection. FIN-WAIT-1 A connection request is sent; waiting for acknowledgment. SYN-SENT A connection request is received. SYN-RCVD The server is waiting for calls from the client. LISTEN There is no connection. Description CLOSED State
Figure 22.18   State transition diagram
A sliding window is used to make transmission more efficient as well as to control the flow of data so that the destination does not become overwhelmed with data. TCP’s sliding windows are byte-oriented. Note :
Figure 22.19   Sender buffer
Figure 22.20   Receiver window
Figure 22.21   Sender buffer and sender window
Figure 22.22   Sliding the sender window
Figure 22.23   Expanding the sender window
Figure 22.24   Shrinking the sender window
In TCP, the sender window size is totally controlled by the receiver window value (the number of empty locations in the receiver buffer). However, the actual window size can be smaller if there is congestion in the network. Note :
Some points about TCP’s sliding windows: Note : The source does not have to send a full  window’s worth of data. The size of the window can be increased or  decreased by the destination. The destination can send an acknowledgment  at any time.
Figure 22.25   Lost segment
Figure 22.26   Lost acknowledgment
Figure 22.27   TCP timers

More Related Content

What's hot

Chapter 24
Chapter 24Chapter 24
Chapter 24
Faisal Mehmood
 
23 Process to_Process_Delivery_UDP_TCP_and_SCTP
23 Process to_Process_Delivery_UDP_TCP_and_SCTP23 Process to_Process_Delivery_UDP_TCP_and_SCTP
23 Process to_Process_Delivery_UDP_TCP_and_SCTP
Ahmar Hashmi
 
Chapter 27
Chapter 27Chapter 27
Chapter 27
Faisal Mehmood
 
Chapter 26
Chapter 26Chapter 26
Chapter 26
Faisal Mehmood
 
08 Switching
08 Switching08 Switching
08 Switching
Ahmar Hashmi
 
4c Address Mapping, Error Reporting and Multicasting
4c Address Mapping, Error Reporting and Multicasting4c Address Mapping, Error Reporting and Multicasting
4c Address Mapping, Error Reporting and Multicastingkavish dani
 
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File TransferChapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File TransferWayne Jones Jnr
 
12 Multiple Access
12 Multiple Access12 Multiple Access
12 Multiple Access
Ahmar Hashmi
 
Ars msr 1-intradomain
Ars msr 1-intradomainArs msr 1-intradomain
Ars msr 1-intradomain
NarcisIlie1
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks
Kathirvel Ayyaswamy
 

What's hot (20)

Chapter 24
Chapter 24Chapter 24
Chapter 24
 
23 Process to_Process_Delivery_UDP_TCP_and_SCTP
23 Process to_Process_Delivery_UDP_TCP_and_SCTP23 Process to_Process_Delivery_UDP_TCP_and_SCTP
23 Process to_Process_Delivery_UDP_TCP_and_SCTP
 
Ch27
Ch27Ch27
Ch27
 
Chapter 27
Chapter 27Chapter 27
Chapter 27
 
Ch28
Ch28Ch28
Ch28
 
Chapter 26
Chapter 26Chapter 26
Chapter 26
 
Ch21
Ch21Ch21
Ch21
 
08 Switching
08 Switching08 Switching
08 Switching
 
4c Address Mapping, Error Reporting and Multicasting
4c Address Mapping, Error Reporting and Multicasting4c Address Mapping, Error Reporting and Multicasting
4c Address Mapping, Error Reporting and Multicasting
 
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File TransferChapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
 
Ch 26
Ch 26Ch 26
Ch 26
 
12 Multiple Access
12 Multiple Access12 Multiple Access
12 Multiple Access
 
Ars msr 1-intradomain
Ars msr 1-intradomainArs msr 1-intradomain
Ars msr 1-intradomain
 
Chapter 29 - Mutimedia
Chapter 29 - MutimediaChapter 29 - Mutimedia
Chapter 29 - Mutimedia
 
Multicast address
Multicast addressMulticast address
Multicast address
 
Ch13
Ch13Ch13
Ch13
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks
 
Ch08
Ch08Ch08
Ch08
 
Ch18
Ch18Ch18
Ch18
 
Ch 15
Ch 15Ch 15
Ch 15
 

Viewers also liked

DNS - Domain Name System
DNS - Domain Name SystemDNS - Domain Name System
DNS - Domain Name System
Peter R. Egli
 
Port numbers
Port numbersPort numbers
Port numbers
Jagannadh Rao
 
Common Ports
Common PortsCommon Ports
Common Ports
SMKN 3 Kota Tangerang
 
A walk through Windows firewall and Netsh commands
A walk through Windows firewall and Netsh commandsA walk through Windows firewall and Netsh commands
A walk through Windows firewall and Netsh commands
Rhydham Joshi
 
Guide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System UtilitiesGuide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System Utilities
Gene Carboni
 
Webinar Gratuito: "Analisis Forense al Firewall de Windows"
Webinar Gratuito: "Analisis Forense al Firewall de Windows"Webinar Gratuito: "Analisis Forense al Firewall de Windows"
Webinar Gratuito: "Analisis Forense al Firewall de Windows"
Alonso Caballero
 

Viewers also liked (20)

DNS - Domain Name System
DNS - Domain Name SystemDNS - Domain Name System
DNS - Domain Name System
 
Port numbers
Port numbersPort numbers
Port numbers
 
Common Ports
Common PortsCommon Ports
Common Ports
 
A walk through Windows firewall and Netsh commands
A walk through Windows firewall and Netsh commandsA walk through Windows firewall and Netsh commands
A walk through Windows firewall and Netsh commands
 
Guide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System UtilitiesGuide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System Utilities
 
Webinar Gratuito: "Analisis Forense al Firewall de Windows"
Webinar Gratuito: "Analisis Forense al Firewall de Windows"Webinar Gratuito: "Analisis Forense al Firewall de Windows"
Webinar Gratuito: "Analisis Forense al Firewall de Windows"
 
Ch 27
Ch 27Ch 27
Ch 27
 
Ch 31
Ch 31Ch 31
Ch 31
 
Ch 24
Ch 24Ch 24
Ch 24
 
Ch 29
Ch 29Ch 29
Ch 29
 
Ch 28
Ch 28Ch 28
Ch 28
 
Ch 07
Ch 07Ch 07
Ch 07
 
Ch 16
Ch 16Ch 16
Ch 16
 
Ch 12
Ch 12Ch 12
Ch 12
 
Ch 23
Ch 23Ch 23
Ch 23
 
Ch 18
Ch 18Ch 18
Ch 18
 
Ch14
Ch14Ch14
Ch14
 
Ch 30
Ch 30Ch 30
Ch 30
 
Ch 14
Ch 14Ch 14
Ch 14
 
Ch 25
Ch 25Ch 25
Ch 25
 

Similar to Ch 22

Unit_3_TCP_UDP.ppt
Unit_3_TCP_UDP.pptUnit_3_TCP_UDP.ppt
Unit_3_TCP_UDP.ppt
zmulani8
 
UNIT IV-Transport Layer.pptx
UNIT IV-Transport Layer.pptxUNIT IV-Transport Layer.pptx
UNIT IV-Transport Layer.pptx
LAVANYAsrietacin
 
Cs8591 u4
Cs8591 u4Cs8591 u4
transport-layer-forouzan.pdf
transport-layer-forouzan.pdftransport-layer-forouzan.pdf
transport-layer-forouzan.pdf
AsifSalim12
 
Ch23
Ch23Ch23
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
Sparsh Samir
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
Noctorous Jamal
 
DCN 5th ed. slides ch24 Transport-Layer Protocols.pdf
DCN 5th ed. slides ch24 Transport-Layer Protocols.pdfDCN 5th ed. slides ch24 Transport-Layer Protocols.pdf
DCN 5th ed. slides ch24 Transport-Layer Protocols.pdf
Bilal Munir Mughal
 
Transport layer TCP and UDP.ppt
Transport layer TCP and UDP.pptTransport layer TCP and UDP.ppt
Transport layer TCP and UDP.ppt
AlliVinay1
 
transport layer protocols
transport layer protocolstransport layer protocols
transport layer protocols
BE Smârt
 
Transport_layer.ppt
Transport_layer.pptTransport_layer.ppt
Transport_layer.ppt
Jayaprasanna4
 
Tcp udp
Tcp udpTcp udp
Tcp udp
Programmer
 
Transport layer udp and tcp network
Transport layer udp and tcp networkTransport layer udp and tcp network
Transport layer udp and tcp network
HamzahMohammed4
 
Transportlayer.ppt
Transportlayer.pptTransportlayer.ppt
Transportlayer.ppt
AayushMishra89
 
Lec6
Lec6Lec6
Lec6
amrnaser3
 
CNS_Module-2-ppt.pptx
CNS_Module-2-ppt.pptxCNS_Module-2-ppt.pptx
CNS_Module-2-ppt.pptx
HIMANKMISHRA2
 
unit 3 ns.ppt
unit 3 ns.pptunit 3 ns.ppt
unit 3 ns.ppt
Kamesh486870
 
tcp.pptx
tcp.pptxtcp.pptx
udp , tcp ,sctp
udp , tcp ,sctpudp , tcp ,sctp
udp , tcp ,sctp
AKSHIT KOHLI
 

Similar to Ch 22 (20)

Unit_3_TCP_UDP.ppt
Unit_3_TCP_UDP.pptUnit_3_TCP_UDP.ppt
Unit_3_TCP_UDP.ppt
 
UNIT IV-Transport Layer.pptx
UNIT IV-Transport Layer.pptxUNIT IV-Transport Layer.pptx
UNIT IV-Transport Layer.pptx
 
Cs8591 u4
Cs8591 u4Cs8591 u4
Cs8591 u4
 
transport-layer-forouzan.pdf
transport-layer-forouzan.pdftransport-layer-forouzan.pdf
transport-layer-forouzan.pdf
 
Ch23
Ch23Ch23
Ch23
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
 
DCN 5th ed. slides ch24 Transport-Layer Protocols.pdf
DCN 5th ed. slides ch24 Transport-Layer Protocols.pdfDCN 5th ed. slides ch24 Transport-Layer Protocols.pdf
DCN 5th ed. slides ch24 Transport-Layer Protocols.pdf
 
Transport layer TCP and UDP.ppt
Transport layer TCP and UDP.pptTransport layer TCP and UDP.ppt
Transport layer TCP and UDP.ppt
 
transport layer protocols
transport layer protocolstransport layer protocols
transport layer protocols
 
Ch12
Ch12Ch12
Ch12
 
Transport_layer.ppt
Transport_layer.pptTransport_layer.ppt
Transport_layer.ppt
 
Tcp udp
Tcp udpTcp udp
Tcp udp
 
Transport layer udp and tcp network
Transport layer udp and tcp networkTransport layer udp and tcp network
Transport layer udp and tcp network
 
Transportlayer.ppt
Transportlayer.pptTransportlayer.ppt
Transportlayer.ppt
 
Lec6
Lec6Lec6
Lec6
 
CNS_Module-2-ppt.pptx
CNS_Module-2-ppt.pptxCNS_Module-2-ppt.pptx
CNS_Module-2-ppt.pptx
 
unit 3 ns.ppt
unit 3 ns.pptunit 3 ns.ppt
unit 3 ns.ppt
 
tcp.pptx
tcp.pptxtcp.pptx
tcp.pptx
 
udp , tcp ,sctp
udp , tcp ,sctpudp , tcp ,sctp
udp , tcp ,sctp
 

More from soumya ranjan mohanty

Ch 1
Ch 1Ch 1

More from soumya ranjan mohanty (12)

Ch 17
Ch 17Ch 17
Ch 17
 
Ch 13
Ch 13Ch 13
Ch 13
 
Ch 10
Ch 10Ch 10
Ch 10
 
Ch 11
Ch 11Ch 11
Ch 11
 
Ch 09
Ch 09Ch 09
Ch 09
 
Ch 08
Ch 08Ch 08
Ch 08
 
Ch 06
Ch 06Ch 06
Ch 06
 
Ch 05
Ch 05Ch 05
Ch 05
 
Ch 04
Ch 04Ch 04
Ch 04
 
Ch 03
Ch 03Ch 03
Ch 03
 
Ch 02
Ch 02Ch 02
Ch 02
 
Ch 1
Ch 1Ch 1
Ch 1
 

Recently uploaded

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 

Recently uploaded (20)

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 

Ch 22

  • 4. Chapters Chapter 22 Process-to-Process Delivery Chapter 23 Congestion Control and QoS
  • 5. Chapter 22 Process-to-Process Delivery: UDP and TCP
  • 6. 22.1 Process-to-Process Delivery Client-Server Paradigm Addressing Multiplexing and Demultiplexing Connectionless/Connection-Oriented Reliable/Unreliable
  • 7. The transport layer is responsible for process-to-process delivery. Note :
  • 8. Figure 22.1 Types of data deliveries
  • 9. Figure 22.2 Port numbers
  • 10. Figure 22.3 IP addresses versus port numbers
  • 11. Figure 22.4 IANA ranges
  • 12. Figure 22.5 Socket address
  • 13. Figure 22.6 Multiplexing and demultiplexing
  • 14. Figure 22.7 Connection establishment
  • 15. Figure 22.8 Connection termination
  • 16. Figure 22.9 Error control
  • 17. 22.2 UDP Port Numbers User Datagram Applications
  • 18. UDP is a connectionless, unreliable protocol that has no flow and error control. It uses port numbers to multiplex data from the application layer. Note :
  • 19. Table 22.1 Well-known ports used by UDP Simple Network Management Protocol SNMP 161 Simple Network Management Protocol (trap) SNMP 162 Trivial File Transfer Protocol TFTP    69 Remote Procedure Call RPC 111 Network Time Protocol NTP 123 Domain Name Service Nameserver    53 Server port to download bootstrap information Bootps    67 Client port to download bootstrap information Bootpc    68 Returns the date and the time Daytime    13 Returns a quote of the day Quote    17 Returns a string of characters Chargen    19 Active users Users    11 Discards any datagram that is received Discard      9 Echo Protocol Echoes a received datagram back to the sender      7 Description Port
  • 20. Figure 22.10 User datagram format
  • 21. The calculation of checksum and its inclusion in the user datagram are optional. Note :
  • 22. UDP is a convenient transport-layer protocol for applications that provide flow and error control. It is also used by multimedia applications. Note :
  • 23. 22.3 TCP Port Numbers Services Sequence Numbers Segments Connection Transition Diagram Flow and Error Control Silly Window Syndrome
  • 24. Table 22.2 Well-known ports used by TCP Remote Procedure Call RPC 111 Finger Finger    79 Hypertext Transfer Protocol HTTP    80 Simple Mail Transfer Protocol SMTP    25 Domain Name Server DNS    53 Bootstrap Protocol BOOTP    67 File Transfer Protocol (data connection) FTP, Data    20 File Transfer Protocol (control connection) FTP, Control    21 Terminal Network TELNET    23 Returns the date and the time Daytime    13 Returns a quote of the day Quote    17 Returns a string of characters Chargen    19 Active users Users    11 Discards any datagram that is received Discard      9 Echo Protocol Echoes a received datagram back to the sender     7 Description Port
  • 25. Figure 22.11 Stream delivery
  • 26. Figure 22.12 Sending and receiving buffers
  • 27. Figure 22.13 TCP segments
  • 28. Example 1 Imagine a TCP connection is transferring a file of 6000 bytes. The first byte is numbered 10010. What are the sequence numbers for each segment if data are sent in five segments with the first four segments carrying 1000 bytes and the last segment carrying 2000 bytes? Solution The following shows the sequence number for each segment: Segment 1 ==> sequence number: 10,010 (range: 10,010 to 11,009) Segment 2 ==> sequence number: 11,010 (range: 11,010 to 12,009) Segment 3   ==> sequence number: 12,010 (range: 12,010 to 13,009) Segment 4 ==> sequence number: 13,010 (range: 13,010 to 14,009) Segment 5 ==> sequence number: 14,010 (range: 14,010 to 16,009)
  • 29. The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a randomly generated number. Note :
  • 30. The value of the sequence number field in a segment defines the number of the first data byte contained in that segment. Note :
  • 31. The value of the acknowledgment field in a segment defines the number of the next byte a party expects to receive. The acknowledgment number is cumulative. Note :
  • 32. Figure 22.14 TCP segment format
  • 33. Figure 22.15 Control field
  • 34. Table 22.3 Description of flags in the control field Terminate the connection. FIN Synchronize sequence numbers during connection. SYN The connection must be reset. RST Push the data. PSH The value of the acknowledgment field is valid. ACK The value of the urgent pointer field is valid. URG Description Flag
  • 35. Figure 22.16 Three-step connection establishment
  • 36. Figure 22.17 Four-step connection termination
  • 37. Table 22.4 States for TCP The server is waiting for the application to close. CLOSE-WAIT The server is waiting for the last acknowledgment. LAST-ACK The other side has accepted the closing of the connection. FIN-WAIT-2 Waiting for retransmitted segments to die. TIME-WAIT Connection is established. ESTABLISHED The application has requested the closing of the connection. FIN-WAIT-1 A connection request is sent; waiting for acknowledgment. SYN-SENT A connection request is received. SYN-RCVD The server is waiting for calls from the client. LISTEN There is no connection. Description CLOSED State
  • 38. Figure 22.18 State transition diagram
  • 39. A sliding window is used to make transmission more efficient as well as to control the flow of data so that the destination does not become overwhelmed with data. TCP’s sliding windows are byte-oriented. Note :
  • 40. Figure 22.19 Sender buffer
  • 41. Figure 22.20 Receiver window
  • 42. Figure 22.21 Sender buffer and sender window
  • 43. Figure 22.22 Sliding the sender window
  • 44. Figure 22.23 Expanding the sender window
  • 45. Figure 22.24 Shrinking the sender window
  • 46. In TCP, the sender window size is totally controlled by the receiver window value (the number of empty locations in the receiver buffer). However, the actual window size can be smaller if there is congestion in the network. Note :
  • 47. Some points about TCP’s sliding windows: Note : The source does not have to send a full window’s worth of data. The size of the window can be increased or decreased by the destination. The destination can send an acknowledgment at any time.
  • 48. Figure 22.25 Lost segment
  • 49. Figure 22.26 Lost acknowledgment
  • 50. Figure 22.27 TCP timers