SlideShare a Scribd company logo
1 of 18
Connection Establishment
⚫A connection is a requirementof a reliabledata
delivery service.
⚫It is set up before theactual dataexchange takes place.
⚫ The connection is used toacknowledge the receiptof
packets and retransmit those thatare lost.
Requirement
⚫Required byconnection-oriented transport protocols
like TCP
⚫Need connection establishment procedures toallow:
each end to know theotherexists
negotiation of optional parameters
triggers allocationof transportentity resources
Ways of Establish the connection
⚫Two-Way Handshake
⚫Three-Way Handshake
Three-Way Handshake
SYN+ACK
⚫SYN:
⚫It is forsynchronization of sequence numbers
⚫It consumes 1 sequence number
⚫Carries no real data
⚫SYN+ACK:
⚫SYN segment forcommunication in otherdirection and
⚫ACK forthe received SYN
⚫It consumes 1 sequence number
⚫ACK
⚫Justan ACK segment
⚫Does not consume any sequence number
⚫threeway handshake
SYN, SYN-ACK, ACK
⚫connection determined by sourceand destination
sockets (host, port)
⚫can only havea single connection between any unique
pairsof ports
⚫butone portcan connect to multipleports
Flow Control
⚫Flowcontrol is the mechanism thatensures thesender
how muchdatashould besenttoreceiver that it is not lost.
⚫this mechanism makes thesendertowait foran
acknowlegement before sending the nextdata.
⚫this technique thatallowstwostationsworking atdifferent
speeds tocommunicatewitheachother.
⚫flowcontrol alsoworksondata link layer.
Flow Control two
Methods
⚫Stop-and-wait
⚫Sliding-window
Stop-and-wait
⚫This is the simplest form of flow control where a sender
transmits a data frame. After receiving the frame, the
receiver indicates its willingness to accept another frame
by sending back an ACK frame acknowledging the frame
just received.
Sliding-window
⚫With the useof multiple frames fora single message,
the stop-and-wait protocol does not perform well.
⚫it allows to sender to send a specific number of
packets or frames before requiring a
acknowledgment from the receiver.
⚫it commonly used in protocols like TCP for reliable
data transmission over the internet.
⚫Sendersliding Window:
⚫Receiversliding Window:
Congestion Control
⚫Congestion isa situation in Communication Networks
in which too many packets are present in a part of the
subnet, performance degrades. Congestion in a
network mayoccurwhen the load on the
network (i.e. the numberof packets sent to the
network) is greater than the capacity of the
network (i.e. the numberof packetsa network can
handle.). Networkcongestionoccurs in caseof traffic
overloading.
Causes Of Congestion
⚫if all of a sudden a stream of packets arrive on several
input linesand need to beouton the sameoutput line.
⚫Slowprocessorsalsocause Congestion. If the router
CPU is slowat performing the task.
Effects of Congestion
⚫Congestion affects twovital parameters of the network
performance
⚫1. Through put
⚫2. Delay
Congestion Control Techniques
⚫Open loop: Protocols topreventoravoid congestion,
ensuring that the system never enters a Congested
State.
⚫Close loop: Protocols thatallowsystem toenter
congested state, detect it, and remove it.
Congestion Control Algorithms
⚫Leaky BucketAlgorithm
⚫Token BucketAlgorithm
connection establishment flow and congestion control.pptx

More Related Content

Similar to connection establishment flow and congestion control.pptx

Tcp santa cruz
Tcp santa cruzTcp santa cruz
Tcp santa cruzlosalamos
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake Alok Tripathi
 
aktu-computer-network-quantum-rotated.pdf
aktu-computer-network-quantum-rotated.pdfaktu-computer-network-quantum-rotated.pdf
aktu-computer-network-quantum-rotated.pdfSaranshChauhan15
 
Transport Layer [Autosaved]
Transport Layer [Autosaved]Transport Layer [Autosaved]
Transport Layer [Autosaved]Ram Dutt Shukla
 
Transport_Layer_Protocols.pptx
Transport_Layer_Protocols.pptxTransport_Layer_Protocols.pptx
Transport_Layer_Protocols.pptxAnkitKumar891632
 
High Performance Networking with Advanced TCP
High Performance Networking with Advanced TCPHigh Performance Networking with Advanced TCP
High Performance Networking with Advanced TCPDilum Bandara
 
Jaimin chp-6 - transport layer- 2011 batch
Jaimin   chp-6 - transport layer- 2011 batchJaimin   chp-6 - transport layer- 2011 batch
Jaimin chp-6 - transport layer- 2011 batchJaimin Jani
 
Transmission Control Protocol_ Computer Networks
Transmission Control Protocol_ Computer NetworksTransmission Control Protocol_ Computer Networks
Transmission Control Protocol_ Computer NetworksManimaran A
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot LayerMaulik Patel
 

Similar to connection establishment flow and congestion control.pptx (20)

Ez33917920
Ez33917920Ez33917920
Ez33917920
 
Ez33917920
Ez33917920Ez33917920
Ez33917920
 
Transaction TCP
Transaction TCPTransaction TCP
Transaction TCP
 
Mcseminar
McseminarMcseminar
Mcseminar
 
Tcp santa cruz
Tcp santa cruzTcp santa cruz
Tcp santa cruz
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake
 
aktu-computer-network-quantum-rotated.pdf
aktu-computer-network-quantum-rotated.pdfaktu-computer-network-quantum-rotated.pdf
aktu-computer-network-quantum-rotated.pdf
 
Ba25315321
Ba25315321Ba25315321
Ba25315321
 
Tcp3 wayhandshakeprocess
Tcp3 wayhandshakeprocessTcp3 wayhandshakeprocess
Tcp3 wayhandshakeprocess
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
Transport Layer [Autosaved]
Transport Layer [Autosaved]Transport Layer [Autosaved]
Transport Layer [Autosaved]
 
Transport Layer.pptx
Transport Layer.pptxTransport Layer.pptx
Transport Layer.pptx
 
Transport_Layer_Protocols.pptx
Transport_Layer_Protocols.pptxTransport_Layer_Protocols.pptx
Transport_Layer_Protocols.pptx
 
High Performance Networking with Advanced TCP
High Performance Networking with Advanced TCPHigh Performance Networking with Advanced TCP
High Performance Networking with Advanced TCP
 
Jaimin chp-6 - transport layer- 2011 batch
Jaimin   chp-6 - transport layer- 2011 batchJaimin   chp-6 - transport layer- 2011 batch
Jaimin chp-6 - transport layer- 2011 batch
 
Transmission Control Protocol_ Computer Networks
Transmission Control Protocol_ Computer NetworksTransmission Control Protocol_ Computer Networks
Transmission Control Protocol_ Computer Networks
 
Transport layer
Transport layerTransport layer
Transport layer
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot Layer
 
Unit 2
Unit 2Unit 2
Unit 2
 

More from MNSUAM

Lec-2 Graphics System.ppt
Lec-2 Graphics System.pptLec-2 Graphics System.ppt
Lec-2 Graphics System.pptMNSUAM
 
Lec-1 Computer Graphics.ppt
Lec-1 Computer Graphics.pptLec-1 Computer Graphics.ppt
Lec-1 Computer Graphics.pptMNSUAM
 
Routing protocols.pptx
Routing protocols.pptxRouting protocols.pptx
Routing protocols.pptxMNSUAM
 
ports and sockets.pptx
ports and sockets.pptxports and sockets.pptx
ports and sockets.pptxMNSUAM
 
Network layer protocols.pptx
Network layer protocols.pptxNetwork layer protocols.pptx
Network layer protocols.pptxMNSUAM
 
Multiple Access Technique.pptx
Multiple Access Technique.pptxMultiple Access Technique.pptx
Multiple Access Technique.pptxMNSUAM
 

More from MNSUAM (6)

Lec-2 Graphics System.ppt
Lec-2 Graphics System.pptLec-2 Graphics System.ppt
Lec-2 Graphics System.ppt
 
Lec-1 Computer Graphics.ppt
Lec-1 Computer Graphics.pptLec-1 Computer Graphics.ppt
Lec-1 Computer Graphics.ppt
 
Routing protocols.pptx
Routing protocols.pptxRouting protocols.pptx
Routing protocols.pptx
 
ports and sockets.pptx
ports and sockets.pptxports and sockets.pptx
ports and sockets.pptx
 
Network layer protocols.pptx
Network layer protocols.pptxNetwork layer protocols.pptx
Network layer protocols.pptx
 
Multiple Access Technique.pptx
Multiple Access Technique.pptxMultiple Access Technique.pptx
Multiple Access Technique.pptx
 

Recently uploaded

Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistandanishmna97
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 

Recently uploaded (20)

Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 

connection establishment flow and congestion control.pptx

  • 1.
  • 2. Connection Establishment ⚫A connection is a requirementof a reliabledata delivery service. ⚫It is set up before theactual dataexchange takes place. ⚫ The connection is used toacknowledge the receiptof packets and retransmit those thatare lost.
  • 3. Requirement ⚫Required byconnection-oriented transport protocols like TCP ⚫Need connection establishment procedures toallow: each end to know theotherexists negotiation of optional parameters triggers allocationof transportentity resources
  • 4. Ways of Establish the connection ⚫Two-Way Handshake ⚫Three-Way Handshake
  • 6. ⚫SYN: ⚫It is forsynchronization of sequence numbers ⚫It consumes 1 sequence number ⚫Carries no real data ⚫SYN+ACK: ⚫SYN segment forcommunication in otherdirection and ⚫ACK forthe received SYN ⚫It consumes 1 sequence number ⚫ACK ⚫Justan ACK segment ⚫Does not consume any sequence number
  • 7. ⚫threeway handshake SYN, SYN-ACK, ACK ⚫connection determined by sourceand destination sockets (host, port) ⚫can only havea single connection between any unique pairsof ports ⚫butone portcan connect to multipleports
  • 8. Flow Control ⚫Flowcontrol is the mechanism thatensures thesender how muchdatashould besenttoreceiver that it is not lost. ⚫this mechanism makes thesendertowait foran acknowlegement before sending the nextdata. ⚫this technique thatallowstwostationsworking atdifferent speeds tocommunicatewitheachother. ⚫flowcontrol alsoworksondata link layer.
  • 10. Stop-and-wait ⚫This is the simplest form of flow control where a sender transmits a data frame. After receiving the frame, the receiver indicates its willingness to accept another frame by sending back an ACK frame acknowledging the frame just received.
  • 11. Sliding-window ⚫With the useof multiple frames fora single message, the stop-and-wait protocol does not perform well. ⚫it allows to sender to send a specific number of packets or frames before requiring a acknowledgment from the receiver. ⚫it commonly used in protocols like TCP for reliable data transmission over the internet.
  • 13. Congestion Control ⚫Congestion isa situation in Communication Networks in which too many packets are present in a part of the subnet, performance degrades. Congestion in a network mayoccurwhen the load on the network (i.e. the numberof packets sent to the network) is greater than the capacity of the network (i.e. the numberof packetsa network can handle.). Networkcongestionoccurs in caseof traffic overloading.
  • 14. Causes Of Congestion ⚫if all of a sudden a stream of packets arrive on several input linesand need to beouton the sameoutput line. ⚫Slowprocessorsalsocause Congestion. If the router CPU is slowat performing the task.
  • 15. Effects of Congestion ⚫Congestion affects twovital parameters of the network performance ⚫1. Through put ⚫2. Delay
  • 16. Congestion Control Techniques ⚫Open loop: Protocols topreventoravoid congestion, ensuring that the system never enters a Congested State. ⚫Close loop: Protocols thatallowsystem toenter congested state, detect it, and remove it.
  • 17. Congestion Control Algorithms ⚫Leaky BucketAlgorithm ⚫Token BucketAlgorithm