SlideShare a Scribd company logo
Chapter 3 TCP and IP
1
Chapter 3
TCP and IP
Chapter 3 TCP and IP
2
Introduction
 Transmission Control Protocol (TCP)
 User Datagram Protocol (UDP)
 Internet Protocol (IP)
 IPv6
Chapter 3 TCP and IP
3
TCP
 RFC 793, RFC 1122
 Outgoing data is logically a stream of
octets from user
 Stream broken into blocks of data, or
segments
 TCP accumulates octets from user until
segment is large enough, or data marked
with PUSH flag
 User can mark data as URGENT
Chapter 3 TCP and IP
4
 Similarly, incoming data is a stream of
octets presented to user
 Data marked with PUSH flag triggers
delivery of data to user, otherwise TCP
decides when to deliver data
 Data marked with URGENT flag causes
user to be signaled
Chapter 3 TCP and IP
5
Checksum Field
 Applied to data segment and part of the
header (Pseudo header). The pseudo
header includes the source and destination
IP addresses, protocol and segment length
fields from the IP header. TCP protects
itself from mis-delivery by IP.
 Protects against bit errors in user data and
addressing information
 Filled in at source
 Checked at destination
Chapter 3 TCP and IP
6
Options
 Maximum segment size – defined in RFC 793 –
it specifies the maximum segment size in octets
that will be accepted in this connection. 16-bit
and can only be used in the initial connection
request segments.
 Window scale factor – The value of F in 2F,
where the value of the window field is
multiplied. Max value of F is 14 and this option
is only used in the initial connection request
segments.
 Timestamp
Chapter 3 TCP and IP
7
Figure 2.1
Some of the Fields
 Sequence Number (32 bits) – sequence number of the first data
octet in this segment except when SYN flag is set. If set this
field is ISN + 1 – ISN and the first data octet.
 Data offset (4 bits) – number of 32-bit words in the header.
 Window (16 bit) – Flow control credit allocation, in octets.
Contains the number of data octets beginning with the one
indicated in the ACK field that the sender is willing to accept.
 Flags (6 bits) – URG, ACK, PSH, RST, SYN and FIN.
 Urgent Pointer (16 bits) – points to the last octet in a sequence
of urgent data. This allows the receiver to know how much
urgent data is coming.
Chapter 3 TCP and IP
8
Chapter 3 TCP and IP
9
UDP
 RFC 768
 Connectionless, unreliable
 Less overhead
 Simply adds port addressing to IP
 Checksum is optional
Chapter 3 TCP and IP
10
Appropriate Uses of UDP
 Inward data collection – as in sensor ntks
 Outward data dissemination – broadcast
message to users.
 Request-response – when applications
control the transaction service.
 Real-time applications – in voice and
telemetry.
Chapter 3 TCP and IP
11
IP
 RFC 791
 Field highlights:
– Type of service, defined in RFC 1349, see
Figure 3.1 – provides guidance to end-system
IP modules and to routers along the
datagram’s path.
– More bit
– Don’t fragment bit
– Time to live (similar to a hop count)
Chapter 3 TCP and IP
12
Figure 2.2
Chapter 3 TCP and IP
13
Figure 3.1
Chapter 3 TCP and IP
14
Fragmentation and Reassembly
 Only two of the 3 bits in the flag field are currently defined.
The more bit and the don’t fragment bit.
 Networks may have different maximum packet size
 Router may need to fragment datagrams before sending to next
network
 Fragments may need further fragmenting in later networks
 In IP, Reassembly is done only at final destination since
fragments may take different routes.
– What is the disadvantage of this scheme (pkts can only get smaller as
data moves through the internet).
– What disadvantages result if intermediate routers do the reassembly?
(large buffers are required at routers and all fragments must pass
through the same router)
Fragmentation and Reassembly
 The IP fragmentation technique uses the following information from the IP
header:
– Identification (ID), Data Length (difference between total length and Internet header
length), Fragment offset, More Flag
 The source end system creates a datagram with a Data Length equal to the
entire length of the data field, with Offset = 0, and a More Flag set to 0
(False)
 To fragment a long datagram, an IP module in a router performs the
following tasks:
– Create two new datagrams and copy the header fields of the incoming datagram into both.
– Divide the incoming user data field into two approximately equal portions along a 64-bit
boundary, placing one portion in each new datagram. The first portion must be a multiple
of 64 bits.
– Set the Data Length of the first new datagram to the length of the inserted data, and set
More Flag to 1 (true). The Offset field is unchanged.
– Set the Data Length of the second new datagram to the length of the inserted data, and
add the length of the first data portion divided by 8 to the Offset field. The More Flag
remains the same (in this case false if fragmented to two).
Chapter 3 TCP and IP
15
Chapter 3 TCP and IP
16
Figure 3.2
Chapter 3 TCP and IP
17
Type of Service TOS Subfield
 Set by source system – provides guidance
on selection of the next path for this
segment.
 Routers may ignore TOS
 Router may respond to requested TOS
value through:
– Route selection – IPv4 focuses here
– Subnetwork service
– Queuing discipline
TOS
 When TOS routing is implemented, RFC 1812 specifies the ff rules for
forwarding a datagram with a nonzero TOS.
– The router determines all available routes to the destination; if there
are none, the datagram is discarded.
– If one or more routes have the same TOS as the requested TOS, then
the router chooses the route with the best metric based on its routing
algorithms.
– Otherwise, if one or more routes with a TOS=0 (normal service), then
the best of these routes is chosen.
– Otherwise, the router discards the datagram.
 Under this set of rules, a router might discard a datagram even though a
route is available, because there is no route with either the same TOS or
normal service.
 In practice, routing algorithms always support a TOS=0 route for any
reachable destination.
Chapter 3 TCP and IP
18
Chapter 3 TCP and IP
19
Table 3.1
Chapter 3 TCP and IP
20
Type of Service Precedence
Subfield
 Indicates degree of urgency or priority to be
associated with a datagram.
 Provides guidance about the relative allocation of
router resources for this datagram.
 Like TOS subfield, may be ignored and there are
3 approaches to responding
 Intended to affect queuing discipline at router
– Queue service
– Congestion control
Chapter 3 TCP and IP
21
IPv4 Options
 Security
 Source routing
 Route recording
 timestamping
Chapter 3 TCP and IP
22
IPv6
 IPng turned to IPv6 standard in 1996.
 Increase IP address from 32 bits to 128
 Accommodate higher network speeds, mix
of data streams (graphics, video, audio)
 Fixed size 40-octet header, followed by
optional extension headers
 Longer header but fewer fields (8 vs 12),
so routers should have less processing
Chapter 3 TCP and IP
23
IPv6 Header
 Version
 Traffic class – to support various forms of differentiated
services.
 Flow label – a flow is a sequence of pks sent from a
particular src to a particular dst for which the src desires
special handling by the intervening routers.
 Payload length
 Next header
 Hop limit
 Source address
 Destination address
Chapter 3 TCP and IP
24
IPv6 Addresses
 128 bits
 Longer addresses can have structure that
assists routing
 3 types:
– Unicast
– Anycast
– multicast
Chapter 3 TCP and IP
25
Figure 3.3
Chapter 3 TCP and IP
26
Optional Extension Headers
 Hop-by-hop options
 Routing – provides extended routing, like
src routing in IPv4.
 Fragment
 Authentication
 Encapsulating security payload
 Destination options
Chapter 3 TCP and IP
27
Figure 3.4

More Related Content

Similar to Chapter03.ppt Advance network concept chapter3

Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
Ghaffar Khan
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
Kruti Niranjan
 
tcpheader-151221111244.pdf
tcpheader-151221111244.pdftcpheader-151221111244.pdf
tcpheader-151221111244.pdf
EnumulaBhargava1
 
Tcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication headerTcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication header
Faizan Shaikh
 
Tcp ip
Tcp ipTcp ip
Introduction to IP
Introduction to IPIntroduction to IP
Introduction to IP
aibad ahmed
 
Ip protocol
Ip protocolIp protocol
Ip protocol
H K
 
sandhiya
sandhiyasandhiya
sandhiya
DeepaR42
 
Network Layer
Network LayerNetwork Layer
Network Layer
Ghaffar Khan
 
Ipspk1
Ipspk1Ipspk1
The Internet Protocol version 4 (IPv4)
The Internet Protocol version 4 (IPv4)The Internet Protocol version 4 (IPv4)
The Internet Protocol version 4 (IPv4)
Thesis Scientist Private Limited
 
Chapter 3. sensors in the network domain
Chapter 3. sensors in the network domainChapter 3. sensors in the network domain
Chapter 3. sensors in the network domain
Phu Nguyen
 
Custom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_RouterCustom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_Router
Vishal Vasudev
 
C. N. II Lec.4.pdf h
C. N. II Lec.4.pdf                      hC. N. II Lec.4.pdf                      h
C. N. II Lec.4.pdf h
abdnazar2003
 
1.1.2 - Concept of Network and TCP_IP Model (2).pptx
1.1.2 - Concept of Network and TCP_IP Model (2).pptx1.1.2 - Concept of Network and TCP_IP Model (2).pptx
1.1.2 - Concept of Network and TCP_IP Model (2).pptx
VINAYTANWAR18
 
the transport layer
the transport layerthe transport layer
the transport layer
tumetr1
 
Ip and icmp
Ip and icmpIp and icmp
Ip and icmp
Programmer
 
Network Layer & Transport Layer
Network Layer & Transport LayerNetwork Layer & Transport Layer
Network Layer & Transport Layer
Sweta Kumari Barnwal
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
ssuserf7cd2b
 
IP Utilites
IP UtilitesIP Utilites
IP Utilites
hariprasadnr
 

Similar to Chapter03.ppt Advance network concept chapter3 (20)

Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
 
tcpheader-151221111244.pdf
tcpheader-151221111244.pdftcpheader-151221111244.pdf
tcpheader-151221111244.pdf
 
Tcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication headerTcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication header
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
Introduction to IP
Introduction to IPIntroduction to IP
Introduction to IP
 
Ip protocol
Ip protocolIp protocol
Ip protocol
 
sandhiya
sandhiyasandhiya
sandhiya
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Ipspk1
Ipspk1Ipspk1
Ipspk1
 
The Internet Protocol version 4 (IPv4)
The Internet Protocol version 4 (IPv4)The Internet Protocol version 4 (IPv4)
The Internet Protocol version 4 (IPv4)
 
Chapter 3. sensors in the network domain
Chapter 3. sensors in the network domainChapter 3. sensors in the network domain
Chapter 3. sensors in the network domain
 
Custom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_RouterCustom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_Router
 
C. N. II Lec.4.pdf h
C. N. II Lec.4.pdf                      hC. N. II Lec.4.pdf                      h
C. N. II Lec.4.pdf h
 
1.1.2 - Concept of Network and TCP_IP Model (2).pptx
1.1.2 - Concept of Network and TCP_IP Model (2).pptx1.1.2 - Concept of Network and TCP_IP Model (2).pptx
1.1.2 - Concept of Network and TCP_IP Model (2).pptx
 
the transport layer
the transport layerthe transport layer
the transport layer
 
Ip and icmp
Ip and icmpIp and icmp
Ip and icmp
 
Network Layer & Transport Layer
Network Layer & Transport LayerNetwork Layer & Transport Layer
Network Layer & Transport Layer
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
 
IP Utilites
IP UtilitesIP Utilites
IP Utilites
 

More from AbrahamGadissa

broadband and high speed LANS Chapter06.ppt
broadband and high speed LANS Chapter06.pptbroadband and high speed LANS Chapter06.ppt
broadband and high speed LANS Chapter06.ppt
AbrahamGadissa
 
broadband and high speed commu Chapter10.ppt
broadband and high speed commu Chapter10.pptbroadband and high speed commu Chapter10.ppt
broadband and high speed commu Chapter10.ppt
AbrahamGadissa
 
high speed broadband communicationChapter11.ppt
high speed broadband communicationChapter11.ppthigh speed broadband communicationChapter11.ppt
high speed broadband communicationChapter11.ppt
AbrahamGadissa
 
Chapter three.03_FundamentalParameters.pdf
Chapter three.03_FundamentalParameters.pdfChapter three.03_FundamentalParameters.pdf
Chapter three.03_FundamentalParameters.pdf
AbrahamGadissa
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdf
AbrahamGadissa
 
Antenna efficency lecture course chapter 3.pdf
Antenna  efficency lecture course chapter 3.pdfAntenna  efficency lecture course chapter 3.pdf
Antenna efficency lecture course chapter 3.pdf
AbrahamGadissa
 
Antenna lecture course CHapter 2_(2)[1].pdf
Antenna lecture course  CHapter 2_(2)[1].pdfAntenna lecture course  CHapter 2_(2)[1].pdf
Antenna lecture course CHapter 2_(2)[1].pdf
AbrahamGadissa
 
Antenna Lecture course CHapter one 1.pdf
Antenna Lecture course  CHapter one 1.pdfAntenna Lecture course  CHapter one 1.pdf
Antenna Lecture course CHapter one 1.pdf
AbrahamGadissa
 
Chapter06.ppt this is chapter six. use it
Chapter06.ppt this is chapter six. use itChapter06.ppt this is chapter six. use it
Chapter06.ppt this is chapter six. use it
AbrahamGadissa
 
Chapter04.pptAdvance concept of networking
Chapter04.pptAdvance concept of networkingChapter04.pptAdvance concept of networking
Chapter04.pptAdvance concept of networking
AbrahamGadissa
 
Chapter01&02.ppt Advanced computer network
Chapter01&02.ppt Advanced computer networkChapter01&02.ppt Advanced computer network
Chapter01&02.ppt Advanced computer network
AbrahamGadissa
 
Lecture-07 .pdf
Lecture-07 .pdfLecture-07 .pdf
Lecture-07 .pdf
AbrahamGadissa
 
Lecture-05.pdf
Lecture-05.pdfLecture-05.pdf
Lecture-05.pdf
AbrahamGadissa
 
Lecture_1.ppt
Lecture_1.pptLecture_1.ppt
Lecture_1.ppt
AbrahamGadissa
 
importance-security-awareness-training-33013.pdf
importance-security-awareness-training-33013.pdfimportance-security-awareness-training-33013.pdf
importance-security-awareness-training-33013.pdf
AbrahamGadissa
 
Lecture_1.ppt
Lecture_1.pptLecture_1.ppt
Lecture_1.ppt
AbrahamGadissa
 
IP Addressing.ppt
IP Addressing.pptIP Addressing.ppt
IP Addressing.ppt
AbrahamGadissa
 

More from AbrahamGadissa (17)

broadband and high speed LANS Chapter06.ppt
broadband and high speed LANS Chapter06.pptbroadband and high speed LANS Chapter06.ppt
broadband and high speed LANS Chapter06.ppt
 
broadband and high speed commu Chapter10.ppt
broadband and high speed commu Chapter10.pptbroadband and high speed commu Chapter10.ppt
broadband and high speed commu Chapter10.ppt
 
high speed broadband communicationChapter11.ppt
high speed broadband communicationChapter11.ppthigh speed broadband communicationChapter11.ppt
high speed broadband communicationChapter11.ppt
 
Chapter three.03_FundamentalParameters.pdf
Chapter three.03_FundamentalParameters.pdfChapter three.03_FundamentalParameters.pdf
Chapter three.03_FundamentalParameters.pdf
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdf
 
Antenna efficency lecture course chapter 3.pdf
Antenna  efficency lecture course chapter 3.pdfAntenna  efficency lecture course chapter 3.pdf
Antenna efficency lecture course chapter 3.pdf
 
Antenna lecture course CHapter 2_(2)[1].pdf
Antenna lecture course  CHapter 2_(2)[1].pdfAntenna lecture course  CHapter 2_(2)[1].pdf
Antenna lecture course CHapter 2_(2)[1].pdf
 
Antenna Lecture course CHapter one 1.pdf
Antenna Lecture course  CHapter one 1.pdfAntenna Lecture course  CHapter one 1.pdf
Antenna Lecture course CHapter one 1.pdf
 
Chapter06.ppt this is chapter six. use it
Chapter06.ppt this is chapter six. use itChapter06.ppt this is chapter six. use it
Chapter06.ppt this is chapter six. use it
 
Chapter04.pptAdvance concept of networking
Chapter04.pptAdvance concept of networkingChapter04.pptAdvance concept of networking
Chapter04.pptAdvance concept of networking
 
Chapter01&02.ppt Advanced computer network
Chapter01&02.ppt Advanced computer networkChapter01&02.ppt Advanced computer network
Chapter01&02.ppt Advanced computer network
 
Lecture-07 .pdf
Lecture-07 .pdfLecture-07 .pdf
Lecture-07 .pdf
 
Lecture-05.pdf
Lecture-05.pdfLecture-05.pdf
Lecture-05.pdf
 
Lecture_1.ppt
Lecture_1.pptLecture_1.ppt
Lecture_1.ppt
 
importance-security-awareness-training-33013.pdf
importance-security-awareness-training-33013.pdfimportance-security-awareness-training-33013.pdf
importance-security-awareness-training-33013.pdf
 
Lecture_1.ppt
Lecture_1.pptLecture_1.ppt
Lecture_1.ppt
 
IP Addressing.ppt
IP Addressing.pptIP Addressing.ppt
IP Addressing.ppt
 

Recently uploaded

Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
HODECEDSIET
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
enizeyimana36
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 

Recently uploaded (20)

Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 

Chapter03.ppt Advance network concept chapter3

  • 1. Chapter 3 TCP and IP 1 Chapter 3 TCP and IP
  • 2. Chapter 3 TCP and IP 2 Introduction  Transmission Control Protocol (TCP)  User Datagram Protocol (UDP)  Internet Protocol (IP)  IPv6
  • 3. Chapter 3 TCP and IP 3 TCP  RFC 793, RFC 1122  Outgoing data is logically a stream of octets from user  Stream broken into blocks of data, or segments  TCP accumulates octets from user until segment is large enough, or data marked with PUSH flag  User can mark data as URGENT
  • 4. Chapter 3 TCP and IP 4  Similarly, incoming data is a stream of octets presented to user  Data marked with PUSH flag triggers delivery of data to user, otherwise TCP decides when to deliver data  Data marked with URGENT flag causes user to be signaled
  • 5. Chapter 3 TCP and IP 5 Checksum Field  Applied to data segment and part of the header (Pseudo header). The pseudo header includes the source and destination IP addresses, protocol and segment length fields from the IP header. TCP protects itself from mis-delivery by IP.  Protects against bit errors in user data and addressing information  Filled in at source  Checked at destination
  • 6. Chapter 3 TCP and IP 6 Options  Maximum segment size – defined in RFC 793 – it specifies the maximum segment size in octets that will be accepted in this connection. 16-bit and can only be used in the initial connection request segments.  Window scale factor – The value of F in 2F, where the value of the window field is multiplied. Max value of F is 14 and this option is only used in the initial connection request segments.  Timestamp
  • 7. Chapter 3 TCP and IP 7 Figure 2.1
  • 8. Some of the Fields  Sequence Number (32 bits) – sequence number of the first data octet in this segment except when SYN flag is set. If set this field is ISN + 1 – ISN and the first data octet.  Data offset (4 bits) – number of 32-bit words in the header.  Window (16 bit) – Flow control credit allocation, in octets. Contains the number of data octets beginning with the one indicated in the ACK field that the sender is willing to accept.  Flags (6 bits) – URG, ACK, PSH, RST, SYN and FIN.  Urgent Pointer (16 bits) – points to the last octet in a sequence of urgent data. This allows the receiver to know how much urgent data is coming. Chapter 3 TCP and IP 8
  • 9. Chapter 3 TCP and IP 9 UDP  RFC 768  Connectionless, unreliable  Less overhead  Simply adds port addressing to IP  Checksum is optional
  • 10. Chapter 3 TCP and IP 10 Appropriate Uses of UDP  Inward data collection – as in sensor ntks  Outward data dissemination – broadcast message to users.  Request-response – when applications control the transaction service.  Real-time applications – in voice and telemetry.
  • 11. Chapter 3 TCP and IP 11 IP  RFC 791  Field highlights: – Type of service, defined in RFC 1349, see Figure 3.1 – provides guidance to end-system IP modules and to routers along the datagram’s path. – More bit – Don’t fragment bit – Time to live (similar to a hop count)
  • 12. Chapter 3 TCP and IP 12 Figure 2.2
  • 13. Chapter 3 TCP and IP 13 Figure 3.1
  • 14. Chapter 3 TCP and IP 14 Fragmentation and Reassembly  Only two of the 3 bits in the flag field are currently defined. The more bit and the don’t fragment bit.  Networks may have different maximum packet size  Router may need to fragment datagrams before sending to next network  Fragments may need further fragmenting in later networks  In IP, Reassembly is done only at final destination since fragments may take different routes. – What is the disadvantage of this scheme (pkts can only get smaller as data moves through the internet). – What disadvantages result if intermediate routers do the reassembly? (large buffers are required at routers and all fragments must pass through the same router)
  • 15. Fragmentation and Reassembly  The IP fragmentation technique uses the following information from the IP header: – Identification (ID), Data Length (difference between total length and Internet header length), Fragment offset, More Flag  The source end system creates a datagram with a Data Length equal to the entire length of the data field, with Offset = 0, and a More Flag set to 0 (False)  To fragment a long datagram, an IP module in a router performs the following tasks: – Create two new datagrams and copy the header fields of the incoming datagram into both. – Divide the incoming user data field into two approximately equal portions along a 64-bit boundary, placing one portion in each new datagram. The first portion must be a multiple of 64 bits. – Set the Data Length of the first new datagram to the length of the inserted data, and set More Flag to 1 (true). The Offset field is unchanged. – Set the Data Length of the second new datagram to the length of the inserted data, and add the length of the first data portion divided by 8 to the Offset field. The More Flag remains the same (in this case false if fragmented to two). Chapter 3 TCP and IP 15
  • 16. Chapter 3 TCP and IP 16 Figure 3.2
  • 17. Chapter 3 TCP and IP 17 Type of Service TOS Subfield  Set by source system – provides guidance on selection of the next path for this segment.  Routers may ignore TOS  Router may respond to requested TOS value through: – Route selection – IPv4 focuses here – Subnetwork service – Queuing discipline
  • 18. TOS  When TOS routing is implemented, RFC 1812 specifies the ff rules for forwarding a datagram with a nonzero TOS. – The router determines all available routes to the destination; if there are none, the datagram is discarded. – If one or more routes have the same TOS as the requested TOS, then the router chooses the route with the best metric based on its routing algorithms. – Otherwise, if one or more routes with a TOS=0 (normal service), then the best of these routes is chosen. – Otherwise, the router discards the datagram.  Under this set of rules, a router might discard a datagram even though a route is available, because there is no route with either the same TOS or normal service.  In practice, routing algorithms always support a TOS=0 route for any reachable destination. Chapter 3 TCP and IP 18
  • 19. Chapter 3 TCP and IP 19 Table 3.1
  • 20. Chapter 3 TCP and IP 20 Type of Service Precedence Subfield  Indicates degree of urgency or priority to be associated with a datagram.  Provides guidance about the relative allocation of router resources for this datagram.  Like TOS subfield, may be ignored and there are 3 approaches to responding  Intended to affect queuing discipline at router – Queue service – Congestion control
  • 21. Chapter 3 TCP and IP 21 IPv4 Options  Security  Source routing  Route recording  timestamping
  • 22. Chapter 3 TCP and IP 22 IPv6  IPng turned to IPv6 standard in 1996.  Increase IP address from 32 bits to 128  Accommodate higher network speeds, mix of data streams (graphics, video, audio)  Fixed size 40-octet header, followed by optional extension headers  Longer header but fewer fields (8 vs 12), so routers should have less processing
  • 23. Chapter 3 TCP and IP 23 IPv6 Header  Version  Traffic class – to support various forms of differentiated services.  Flow label – a flow is a sequence of pks sent from a particular src to a particular dst for which the src desires special handling by the intervening routers.  Payload length  Next header  Hop limit  Source address  Destination address
  • 24. Chapter 3 TCP and IP 24 IPv6 Addresses  128 bits  Longer addresses can have structure that assists routing  3 types: – Unicast – Anycast – multicast
  • 25. Chapter 3 TCP and IP 25 Figure 3.3
  • 26. Chapter 3 TCP and IP 26 Optional Extension Headers  Hop-by-hop options  Routing – provides extended routing, like src routing in IPv4.  Fragment  Authentication  Encapsulating security payload  Destination options
  • 27. Chapter 3 TCP and IP 27 Figure 3.4