The document discusses the differences between packets and frames, and provides details on the transport layer. It explains that the transport layer is responsible for process-to-process delivery and uses port numbers for addressing. Connection-oriented protocols like TCP use three-way handshaking for connection establishment and termination, and implement flow and error control using mechanisms like sliding windows. Connectionless protocols like UDP are simpler but unreliable, treating each packet independently.
Transport protocols establish reliable communication between machines on a network. They provide services like error control, flow control, and multiplexing. The main transport protocols are TCP and UDP. TCP is connection-oriented and provides reliable, ordered delivery. UDP is connectionless and faster but unreliable. Both protocols use port numbers to identify sending and receiving processes and segment packet headers with fields like source/destination port and sequence numbers. DNS is an application layer protocol that maps domain names to IP addresses, enabling human-friendly web addresses. It uses a hierarchical system of root, TLD, and authoritative name servers to resolve names.
The document discusses various aspects of transport layer protocols including:
- Transport layer provides reliable data transfer between source and destination through end-to-end connections.
- Elements of transport protocols include addressing, connection establishment and release, flow control, buffering, and multiplexing.
- TCP is a connection-oriented transport protocol that provides reliable, ordered delivery of bytes in a byte stream.
- HTTP is an application-layer protocol used to access data on the world wide web through request-response transactions.
The document discusses transport layer protocols, specifically UDP and TCP. It provides details on:
- UDP being a connectionless, unreliable protocol using checksums and having no flow/error control.
- TCP being connection-oriented and reliable, using sequence numbers, acknowledgments, flow and error control, and establishing connections via three-way handshakes before bidirectional data transfer.
- Both UDP and TCP encapsulating data into segments or datagrams which are delivered process-to-process using port numbers.
The document discusses transport layer protocols TCP and UDP. It provides an overview of process-to-process communication using transport layer protocols. It describes the roles, services, requirements, addressing, encapsulation, multiplexing, and error control functions of the transport layer. It specifically examines TCP and UDP, comparing their connection-oriented and connectionless services, typical applications, and segment/datagram formats.
The transport layer provides end-to-end communication over a network by providing services such as connection-oriented communication, reliability, flow control, and multiplexing. It links the application layer to the network layer and performs functions like segmenting messages and establishing connections between endpoints. Common transport protocols are TCP, which provides connection-oriented and reliable data transfer, and UDP, which provides connectionless datagram delivery.
Unit 4-Transport Layer Protocols-3.pptxDESTROYER39
The document discusses transport layer protocols. It covers the User Datagram Protocol (UDP), Transmission Control Protocol (TCP), and Stream Control Transmission Protocol (SCTP). For UDP, it describes its connectionless and unreliable nature, datagram format, services, and applications. For TCP, it outlines its connection-oriented and reliable design with features like congestion control, flow control, error checking, and segment structure. It also briefly introduces SCTP and its services.
The document discusses transport layer protocols. It covers User Datagram Protocol (UDP), Transmission Control Protocol (TCP), and Stream Control Transmission Protocol (SCTP). UDP is described as a connectionless protocol that does not provide reliability, flow control, or error checking. TCP is connection-oriented and provides reliable in-order delivery through features like sequencing, acknowledgements, retransmissions, flow control, and congestion control. TCP establishes connections using a three-way handshake and transmits data in segments. SCTP is also described as a reliable transport layer protocol providing some features of both TCP and UDP.
The document discusses the differences between packets and frames, and provides details on the transport layer. It explains that the transport layer is responsible for process-to-process delivery and uses port numbers for addressing. Connection-oriented protocols like TCP use three-way handshaking for connection establishment and termination, and implement flow and error control using mechanisms like sliding windows. Connectionless protocols like UDP are simpler but unreliable, treating each packet independently.
Transport protocols establish reliable communication between machines on a network. They provide services like error control, flow control, and multiplexing. The main transport protocols are TCP and UDP. TCP is connection-oriented and provides reliable, ordered delivery. UDP is connectionless and faster but unreliable. Both protocols use port numbers to identify sending and receiving processes and segment packet headers with fields like source/destination port and sequence numbers. DNS is an application layer protocol that maps domain names to IP addresses, enabling human-friendly web addresses. It uses a hierarchical system of root, TLD, and authoritative name servers to resolve names.
The document discusses various aspects of transport layer protocols including:
- Transport layer provides reliable data transfer between source and destination through end-to-end connections.
- Elements of transport protocols include addressing, connection establishment and release, flow control, buffering, and multiplexing.
- TCP is a connection-oriented transport protocol that provides reliable, ordered delivery of bytes in a byte stream.
- HTTP is an application-layer protocol used to access data on the world wide web through request-response transactions.
The document discusses transport layer protocols, specifically UDP and TCP. It provides details on:
- UDP being a connectionless, unreliable protocol using checksums and having no flow/error control.
- TCP being connection-oriented and reliable, using sequence numbers, acknowledgments, flow and error control, and establishing connections via three-way handshakes before bidirectional data transfer.
- Both UDP and TCP encapsulating data into segments or datagrams which are delivered process-to-process using port numbers.
The document discusses transport layer protocols TCP and UDP. It provides an overview of process-to-process communication using transport layer protocols. It describes the roles, services, requirements, addressing, encapsulation, multiplexing, and error control functions of the transport layer. It specifically examines TCP and UDP, comparing their connection-oriented and connectionless services, typical applications, and segment/datagram formats.
The transport layer provides end-to-end communication over a network by providing services such as connection-oriented communication, reliability, flow control, and multiplexing. It links the application layer to the network layer and performs functions like segmenting messages and establishing connections between endpoints. Common transport protocols are TCP, which provides connection-oriented and reliable data transfer, and UDP, which provides connectionless datagram delivery.
Unit 4-Transport Layer Protocols-3.pptxDESTROYER39
The document discusses transport layer protocols. It covers the User Datagram Protocol (UDP), Transmission Control Protocol (TCP), and Stream Control Transmission Protocol (SCTP). For UDP, it describes its connectionless and unreliable nature, datagram format, services, and applications. For TCP, it outlines its connection-oriented and reliable design with features like congestion control, flow control, error checking, and segment structure. It also briefly introduces SCTP and its services.
The document discusses transport layer protocols. It covers User Datagram Protocol (UDP), Transmission Control Protocol (TCP), and Stream Control Transmission Protocol (SCTP). UDP is described as a connectionless protocol that does not provide reliability, flow control, or error checking. TCP is connection-oriented and provides reliable in-order delivery through features like sequencing, acknowledgements, retransmissions, flow control, and congestion control. TCP establishes connections using a three-way handshake and transmits data in segments. SCTP is also described as a reliable transport layer protocol providing some features of both TCP and UDP.
The document describes a reliable data transfer protocol called rdt1.0 that operates over a perfectly reliable channel. Rdt1.0 uses finite state machines (FSMs) to specify the operation of the sender and receiver. The FSMs each have a single state, and transitions back to themselves upon events. The sender accepts data from the upper layer and sends it on the channel. The receiver receives data from the channel and delivers it to the upper layer. As the channel is perfectly reliable, rdt1.0 provides simple, trivial reliable data transfer with no loss or corruption of data.
This document provides an overview of the transport layer and TCP protocol. It discusses UDP and TCP header formats, per-segment checksum calculation for UDP, TCP connection management using three-way handshake, TCP reliability of data transfer using acknowledgements and retransmissions, TCP flow control to prevent receivers from being overwhelmed, and TCP congestion control using a leaky bucket algorithm. The document also lists group members at the end.
The document summarizes key aspects of the transport layer from Chapter 3 of the textbook "Computer Networking: A Top Down Approach". It discusses the goals of the transport layer, including providing multiplexing/demultiplexing, reliable data transfer, congestion control and flow control. It then describes the two main Internet transport protocols - UDP (connectionless) and TCP (connection-oriented), focusing on their differences and how TCP provides reliability.
The document discusses the transport layer in computer networks. It provides 3 key points:
1. The transport layer provides a service to the application layer and obtains a service from the network layer. It is responsible for multiplexing/demultiplexing, reliable data transfer, flow control, and congestion control.
2. The main transport layer protocols used in the Internet are UDP (connectionless) and TCP (connection-oriented). TCP provides reliable in-order byte streams with congestion control and flow control. UDP is unreliable and unordered.
3. Reliable data transfer protocols like RDT use mechanisms like checksums, acknowledgements, negative acknowledgements, retransmissions, and sequence numbers to
The transport layer provides process-to-process communication between applications on networked devices. It handles addressing with port numbers, encapsulation/decapsulation of data, multiplexing/demultiplexing data to the correct processes, flow control to prevent buffer overflows, error control with packet sequencing and acknowledgments, and congestion control to regulate data transmission and avoid overwhelming network switches and routers. Key functions of the transport layer enable reliable data transfer between applications across the internet.
IV B.Tech I Sem CSE&IT JNTUK R10 regulation students have Mobile computing paper. This slides especially contains UNIT - 5 total material required for end exams
This document provides an overview of network layer concepts including network layer services, packet switching, performance metrics, addressing, routing, and congestion control. It describes the key responsibilities of the network layer such as packetizing data, routing packets from source to destination, and error control. Metrics like delay, throughput, and packet loss are discussed as well as congestion control mechanisms to improve performance like retransmission policies and congestion notification.
PPT Slides explains about OSI layer, Internet Protocol(IP), Transmission Control Protocol (TCP), User Datagram Protocol (UDP) & Internet Control Message Protocol(ICMP). It focuses on Protocol Headers and the interpretation of various header fields.
PPT describes about how to detect malicious datagrams, packet filtering systems behaviors & anomalies causing due to fragmentation.
Data link control involves framing data, flow and error control, and common protocols like HDLC and PPP. Framing involves adding source/destination addresses to frames for transmission. Flow control restricts how much data the sender sends before waiting for acknowledgment. Error control uses techniques like automatic repeat request to retransmit lost data frames. HDLC and PPP are protocols that define frame formats and control procedures for point-to-point links.
The document provides an overview of TCP (Transmission Control Protocol) features and the TCP header. It discusses the role of the transport layer in allowing communication between endpoints, and how TCP provides reliable data transport. The structure of the TCP header is explained in detail, including the source/destination ports, sequence/acknowledgment numbers, flags, window size, checksum and options. Quiz questions are also provided to test understanding.
The document discusses the Transmission Control Protocol (TCP). It explains that TCP provides reliable, ordered delivery of a stream of bytes between applications on networked hosts. It accomplishes this through functions like segmenting data, assigning port numbers to identify applications, establishing connections, providing acknowledgements and retransmissions to ensure reliable delivery, and maintaining sequence numbers to ensure correct ordering. The document also describes TCP's three-way handshake for connection establishment and four-step process for connection termination.
This document provides an agenda and overview of topics related to the transport layer and networking essentials. The agenda includes discussions of the transport layer, UDP overview, TCP communication process, the socket API, and tools and utilities. Specific topics that will be covered include the role and functions of the transport layer, UDP features and headers, TCP reliability mechanisms like connection establishment and termination, sequence numbers and acknowledgments, window sliding, and data loss/retransmission. The document also provides brief overviews and usage examples for common networking tools like ifconfig, nmcli, route, ping, traceroute, netstat, dig, ncat, nmap, tcpdump, and wireshark.
The transport layer provides process-to-process communication and utilizes three main protocols: UDP, TCP, and SCTP. UDP is a connectionless protocol that does not guarantee delivery, while TCP provides reliable, ordered delivery through a connection-oriented approach. SCTP also provides reliable delivery with the added capability of multiple streams. Key aspects of these protocols include port numbers, packet/segment formatting, and connection establishment handshaking.
TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet).
The document provides information about the network layer. It discusses network layer services including packetizing, addressing, routing, and forwarding. It describes various network layer protocols like IP and ICMPv4. It also covers topics like unicast routing algorithms, multicasting, IPV6 addressing, performance metrics, and congestion control techniques.
The document discusses various topics related to data link layer and media access control including:
1. Link layer addressing and the three types of addresses - unicast, multicast, and broadcast.
2. Address Resolution Protocol (ARP) which is used to map IP addresses to MAC addresses.
3. Error detection and correction mechanisms at the data link layer including parity checks, cyclic redundancy checks, and checksums.
4. Common data link layer protocols for flow control and error handling such as HDLC, PPP, Ethernet, and IEEE 802.11.
Transport Layer Services : Multiplexing And DemultiplexingKeyur Vadodariya
This document discusses the transport layer of computer networks. It begins with introducing the group members and topic, which is the transport layer introduction, services, multiplexing and demultiplexing. Then it provides definitions of the transport layer, its functions and services. It describes how the transport layer provides process to process delivery, end-to-end connections, congestion control, data integrity, flow control, multiplexing and demultiplexing. It explains the differences between connectionless and connection-oriented multiplexing and demultiplexing. In the end, it lists some references.
The transport layer provides efficient, reliable, and cost-effective process-to-process delivery by making use of network layer services. The transport layer works through transport entities to achieve its goal of reliable delivery between application processes. It provides an interface for applications to access its services.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
The document describes a reliable data transfer protocol called rdt1.0 that operates over a perfectly reliable channel. Rdt1.0 uses finite state machines (FSMs) to specify the operation of the sender and receiver. The FSMs each have a single state, and transitions back to themselves upon events. The sender accepts data from the upper layer and sends it on the channel. The receiver receives data from the channel and delivers it to the upper layer. As the channel is perfectly reliable, rdt1.0 provides simple, trivial reliable data transfer with no loss or corruption of data.
This document provides an overview of the transport layer and TCP protocol. It discusses UDP and TCP header formats, per-segment checksum calculation for UDP, TCP connection management using three-way handshake, TCP reliability of data transfer using acknowledgements and retransmissions, TCP flow control to prevent receivers from being overwhelmed, and TCP congestion control using a leaky bucket algorithm. The document also lists group members at the end.
The document summarizes key aspects of the transport layer from Chapter 3 of the textbook "Computer Networking: A Top Down Approach". It discusses the goals of the transport layer, including providing multiplexing/demultiplexing, reliable data transfer, congestion control and flow control. It then describes the two main Internet transport protocols - UDP (connectionless) and TCP (connection-oriented), focusing on their differences and how TCP provides reliability.
The document discusses the transport layer in computer networks. It provides 3 key points:
1. The transport layer provides a service to the application layer and obtains a service from the network layer. It is responsible for multiplexing/demultiplexing, reliable data transfer, flow control, and congestion control.
2. The main transport layer protocols used in the Internet are UDP (connectionless) and TCP (connection-oriented). TCP provides reliable in-order byte streams with congestion control and flow control. UDP is unreliable and unordered.
3. Reliable data transfer protocols like RDT use mechanisms like checksums, acknowledgements, negative acknowledgements, retransmissions, and sequence numbers to
The transport layer provides process-to-process communication between applications on networked devices. It handles addressing with port numbers, encapsulation/decapsulation of data, multiplexing/demultiplexing data to the correct processes, flow control to prevent buffer overflows, error control with packet sequencing and acknowledgments, and congestion control to regulate data transmission and avoid overwhelming network switches and routers. Key functions of the transport layer enable reliable data transfer between applications across the internet.
IV B.Tech I Sem CSE&IT JNTUK R10 regulation students have Mobile computing paper. This slides especially contains UNIT - 5 total material required for end exams
This document provides an overview of network layer concepts including network layer services, packet switching, performance metrics, addressing, routing, and congestion control. It describes the key responsibilities of the network layer such as packetizing data, routing packets from source to destination, and error control. Metrics like delay, throughput, and packet loss are discussed as well as congestion control mechanisms to improve performance like retransmission policies and congestion notification.
PPT Slides explains about OSI layer, Internet Protocol(IP), Transmission Control Protocol (TCP), User Datagram Protocol (UDP) & Internet Control Message Protocol(ICMP). It focuses on Protocol Headers and the interpretation of various header fields.
PPT describes about how to detect malicious datagrams, packet filtering systems behaviors & anomalies causing due to fragmentation.
Data link control involves framing data, flow and error control, and common protocols like HDLC and PPP. Framing involves adding source/destination addresses to frames for transmission. Flow control restricts how much data the sender sends before waiting for acknowledgment. Error control uses techniques like automatic repeat request to retransmit lost data frames. HDLC and PPP are protocols that define frame formats and control procedures for point-to-point links.
The document provides an overview of TCP (Transmission Control Protocol) features and the TCP header. It discusses the role of the transport layer in allowing communication between endpoints, and how TCP provides reliable data transport. The structure of the TCP header is explained in detail, including the source/destination ports, sequence/acknowledgment numbers, flags, window size, checksum and options. Quiz questions are also provided to test understanding.
The document discusses the Transmission Control Protocol (TCP). It explains that TCP provides reliable, ordered delivery of a stream of bytes between applications on networked hosts. It accomplishes this through functions like segmenting data, assigning port numbers to identify applications, establishing connections, providing acknowledgements and retransmissions to ensure reliable delivery, and maintaining sequence numbers to ensure correct ordering. The document also describes TCP's three-way handshake for connection establishment and four-step process for connection termination.
This document provides an agenda and overview of topics related to the transport layer and networking essentials. The agenda includes discussions of the transport layer, UDP overview, TCP communication process, the socket API, and tools and utilities. Specific topics that will be covered include the role and functions of the transport layer, UDP features and headers, TCP reliability mechanisms like connection establishment and termination, sequence numbers and acknowledgments, window sliding, and data loss/retransmission. The document also provides brief overviews and usage examples for common networking tools like ifconfig, nmcli, route, ping, traceroute, netstat, dig, ncat, nmap, tcpdump, and wireshark.
The transport layer provides process-to-process communication and utilizes three main protocols: UDP, TCP, and SCTP. UDP is a connectionless protocol that does not guarantee delivery, while TCP provides reliable, ordered delivery through a connection-oriented approach. SCTP also provides reliable delivery with the added capability of multiple streams. Key aspects of these protocols include port numbers, packet/segment formatting, and connection establishment handshaking.
TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet).
The document provides information about the network layer. It discusses network layer services including packetizing, addressing, routing, and forwarding. It describes various network layer protocols like IP and ICMPv4. It also covers topics like unicast routing algorithms, multicasting, IPV6 addressing, performance metrics, and congestion control techniques.
The document discusses various topics related to data link layer and media access control including:
1. Link layer addressing and the three types of addresses - unicast, multicast, and broadcast.
2. Address Resolution Protocol (ARP) which is used to map IP addresses to MAC addresses.
3. Error detection and correction mechanisms at the data link layer including parity checks, cyclic redundancy checks, and checksums.
4. Common data link layer protocols for flow control and error handling such as HDLC, PPP, Ethernet, and IEEE 802.11.
Transport Layer Services : Multiplexing And DemultiplexingKeyur Vadodariya
This document discusses the transport layer of computer networks. It begins with introducing the group members and topic, which is the transport layer introduction, services, multiplexing and demultiplexing. Then it provides definitions of the transport layer, its functions and services. It describes how the transport layer provides process to process delivery, end-to-end connections, congestion control, data integrity, flow control, multiplexing and demultiplexing. It explains the differences between connectionless and connection-oriented multiplexing and demultiplexing. In the end, it lists some references.
The transport layer provides efficient, reliable, and cost-effective process-to-process delivery by making use of network layer services. The transport layer works through transport entities to achieve its goal of reliable delivery between application processes. It provides an interface for applications to access its services.
Similar to Computer network transport layer MODUL 2.pptx (20)
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
2. Introduction and Transport-Layer
Services
• A transport-layer protocol provides for logical
communication between application
processes running on different hosts.
• Transport-layer protocols are implemented in
the end systems but not in network routers.
3.
4. • On the sending side, the transport layer
converts the application-layer messages it
receives from a sending application process
into transport-layer packets, known as
transport-layer segments in Internet
terminology.
5. • The transport layer then passes the segment to
the network layer at the sending end system,
where the segment is encapsulated within a
network-layer packet (a datagram) and sent to
the destination.
6. • On the receiving side, the network layer
extracts the transport-layer segment from the
datagram and passes the segment up to the
transport layer.
• The transport layer then processes the received
segment, making the data in the segment
available to the receiving application.
7. Relationship Between Transport and
Network Layers
• A transport-layer protocol provides logical
communication between processes running on
different hosts.
• A network-layer protocol provides logical
communication between hosts.
8. • Transport-layer protocols live in the end
systems.
• Within an end system, a transport protocol
moves messages from application processes to
the network edge and vice versa.
• The services that a transport protocol can
provide are often constrained by the service
model of the underlying network-layer
protocol.
9. Overview of the Transport Layer in the
Internet
• A TCP/IP network, makes two distinct
transport-layer protocols available to the
application layer - UDP and TCP.
• In an Internet context, we refer to the transport
layer packet as a segment.
10. • The Internet literature also refers to the
transport-layer packet for TCP as a segment
but often refers to the packet for UDP as a
datagram.
• But this same Internet literature also uses the
term datagram for the network-layer packet.
• It is less confusing to refer to both TCP and
UDP packets as segments, and reserve the term
datagram for the network-layer packet.
11. • The Internet’s network-layer protocol has a
name—IP, for Internet Protocol.
• IP provides logical communication between
hosts.
• The IP service model is a best-effort delivery
service.
• IP is said to be an unreliable service.
12. • Extending host-to-host delivery to process-to-
process delivery is called transport-layer
multiplexing and demultiplexing.
• UDP and TCP also provide integrity checking
by including error-detection fields in their
segments’ headers.
• like IP, UDP is an unreliable service.
13. • TCP provides reliable data transfer-Using
flow control, sequence numbers,
acknowledgments, and timers.
• TCP thus converts IP’s unreliable service
between end systems into a reliable data
transport service between processes.
• TCP also provides congestion control.
14. Multiplexing and Demultiplexing
• A process can have one or more sockets, doors
through which data passes from the network to
the process and through which data passes
from the process to the network.
• Each socket has a unique identifier.
• The format of the identifier depends on
whether the socket is a UDP or a TCP socket.
15. • At the receiving end, the transport layer
examines the set of fields to identify the
receiving socket and then directs the segment
to that socket.
• This job of delivering the data in a transport-
layer segment to the correct socket is called
demultiplexing.
16. • The job of gathering data chunks at the source
host from different sockets, encapsulating each
data chunk with header information to create
segments.
• This job of passing the segments to the
network layer is called multiplexing.
18. • The transport-layer multiplexing requires
(1) Sockets have unique identifiers, and
(2) Each segment have special fields that
indicate the socket to which the segment is to be
delivered.
• These special fields are the,
- Source port number field.
- Destination port number field.
20. • Each port number is a 16-bit number, ranging
from 0 to 65535.
• The port numbers ranging from 0 to 1023 are
called well-known port numbers.
• When we develop a new application, we must
assign the application a port number.
21. • Each socket in the host could be assigned a
port number.
• When a segment arrives at the host, the
transport layer examines the destination port
number in the segment and directs the segment
to the corresponding socket.
• The segment’s data then passes through the
socket into the attached process.
22. • Two types of Multiplexing and Demultiplexing
- Connectionless Multiplexing and
Demultiplexing
- Connection-Oriented Multiplexing and
Demultiplexing
25. Connectionless Transport: UDP
• If the application developer chooses UDP
instead of TCP, then the application is almost
directly talking with IP.
• In UDP there is no handshaking between
sending and receiving transport-layer entities
before sending a segment.
• For this reason, UDP is said to be
connectionless.
26. Many applications are better suited for UDP for
the following reasons:
• Finer application-level control over what data
is sent, and when.
• No connection establishment.
• No connection state.
• Small packet header overhead.
29. • The application data occupies the data field of
the UDP segment.
• The UDP header has only four fields, each
consisting of two bytes.
• The port numbers allow the destination host to
pass the application data to the correct process
running on the destination end system.
30. • The checksum is used by the receiving host to
check whether errors have been introduced
into the segment.
• The length field specifies the length of the
UDP segment, including the header, in bytes.
31. UDP Checksum
• The UDP checksum provides for error
detection.
• That is, the checksum is used to determine
whether bits within the UDP segment have
been altered as it moved from source to
destination.
32. • UDP at the sender side performs the 1s
complement of the sum of all the 16-bit words
in the segment, with any overflow encountered
during the sum being wrapped around.
• This result is put in the checksum field of the
UDP segment.
33.
34. Principles of Reliable Data Transfer
• The service abstraction provided to the upper-
layer entities is that of a reliable channel
through which data can be transferred.
• It is the responsibility of a reliable data
transfer protocol to implement this service
abstraction.
35.
36. • The sending side of the data transfer protocol
will be invoked from above by a call to
rdt_send().
• On the receiving side, rdt_rcv() will be called
when a packet arrives from the receiving side
of the channel.
• When the rdt protocol wants to deliver data to
the upper layer, it will do so by calling
deliver_data().
37. Building a Reliable Data Transfer Protocol
Reliable Data Transfer over a Perfectly Reliable
Channel: rdt1.0
• The underlying channel is completely reliable.
• The finite-state machine (FSM) definitions
for the rdt1.0 sender and receiver.
• The event causing the transition is shown
above the horizontal line labeling the
transition.
• The actions taken when the event occurs are
shown below the horizontal line.
38. • When no action is taken on an event, or no
event occurs and an action is taken, we’ll use
the symbol ^ below or above the horizontal,
respectively, to explicitly denote the lack of an
action or event.
• The initial state of the FSM is indicated by the
dashed arrow.
39.
40. Reliable Data Transfer over a Channel with Bit
Errors: rdt2.0
• The control messages allow the receiver to let
the sender know what has been received
correctly, and what has been received in error
and thus requires repeating.
• Reliable data transfer protocols based on such
retransmission are known as ARQ (Automatic
Repeat reQuest) protocols.
41. Three additional protocol capabilities are
required in ARQ protocols to handle the
presence of bit errors:
• Error detection
• Receiver feedback
• Retransmission
42.
43.
44. • The sender will not send a new piece of data
until it is sure that the receiver has correctly
received the current packet.
• Because of this behavior, protocols such as
rdt2.0 are known as stop-and-wait protocols.
52. Two basic approaches toward pipelined error
recovery can be identified:
1. Go-Back-N
2. Selective repeat.
53. Go-Back-N (GBN)
• In a Go-Back-N (GBN) protocol, the sender is
allowed to transmit multiple packets without
waiting for an acknowledgment.
• It is constrained to have no more than some
maximum allowable number, N, of
unacknowledged packets in the pipeline.
55. • If we define base to be the sequence number of the oldest
unacknowledged packet and nextseqnum to be the
smallest unused sequence number.
• Four intervals in the range of sequence numbers can be
identified.
• Sequence numbers in the interval [0,base-1] correspond
to packets that have already been transmitted and
acknowledged.
• The interval [base,nextseqnum-1] corresponds to packets
that have been sent but not yet acknowledged.
56. • Sequence numbers in the interval
[nextseqnum,base+N-1] can be used for packets that can
be sent immediately, should data arrive from the upper
layer.
• Finally, sequence numbers greater than or equal to
[base+N] cannot be used until an unacknowledged packet
currently in the pipeline has been acknowledged.
57. • The range of permissible sequence numbers
for transmitted but not yet acknowledged
packets can be viewed as a window of size N
over the range of sequence numbers.
• As the protocol operates, this window slides
forward over the sequence number space.
• For this reason, N is often referred to as the
window size and the GBN protocol itself as a
sliding-window protocol.
58. The GBN sender must respond to three types of
events:
• Invocation from above
• Receipt of an ACK
• A timeout event
59.
60. Selective Repeat (SR)
• A single packet error can thus cause GBN to
retransmit a large number of packets, many
unnecessarily.
• Selective-repeat protocols avoid unnecessary
retransmissions by having the sender
retransmit only those packets that it suspects
were received in error at the receiver.
61.
62. • The SR receiver will acknowledge a correctly
received packet whether or not it is in order.
• Out-of-order packets are buffered until any
missing packets are received, at which point a
batch of packets can be delivered in order to
the upper layer.
63. The various actions taken by the SR sender:
• Data received from above.
• Timeout.
• ACK received.
The various actions taken by the SR receiver:
• Packet with sequence number in [rcv_base,
rcv_base+N-1] is correctly received.
• Packet with sequence number in [rcv_base-N,
rcv_base-1] is correctly received.
• Otherwise Ignore the packet.
64.
65.
66. Transmission Control Protocol:
TCP
• Data referred as Segments
• Connection oriented
• Reliable
• Supports Flow Control Mechanism
• Supports Error Control Mechanism
• Follows the Three Way Handshake mechanism
• Segments should have a maximum segment
size (MSS).
72. Fig: A cumulative acknowledgment avoids retransmission of the
first segment
73. Flow Control
• Avoids the sender data to overflow.
• Have the mechanism of Receiver Window
• Receiver Window is used to give the sender an
idea of how much free buffer space is available
at the receiver.
74. • LastByteRead: the number of the last byte in the data stream
read from the buffer by the application process in B.
• LastByteRcvd: the number of the last byte in the data stream
that has arrived from the network and has been placed in the
receive buffer at B.
• Because TCP is not permitted to overflow the allocated buffer,
we must have:
LastByteRcvd – LastByteRead <= RcvBuffer
• The receive window, denoted rwnd is set to the amount of
spare room in the buffer:
rwnd = RcvBuffer – [LastByteRcvd – LastByteRead]
86. Approaches to Congestion Control
• End-to-end congestion control
Congestion is informed by the end nodes (source –
destination )
• Network-assisted congestion control
Congestion can be informed by
i) Direct feedback ( router to sender node)
ii) Information from Router - Receiver – sender