SlideShare a Scribd company logo
Chapter 7: 
Transport Layer 
Introduction to Networking 
© 2008 Cisco Systems, Inc. All Presentation_ID rights reserved. Cisco Confidential 1
Chapter 7 
7.1 Transport Layer Protocols 
7.2 TCP and UDP 
7.3 Summary 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Chapter 7: Objectives 
 Describe the purpose of the transport layer in managing the 
transportation of data in end-to-end communication. 
 Describe characteristics of the TCP and UDP protocols, including 
port numbers and their uses. 
 Explain how TCP session establishment and termination 
processes facilitate reliable communication. 
 Explain how TCP protocol data units are transmitted and 
acknowledged to guarantee delivery. 
 Explain the UDP client processes to establish communication with 
a server. 
 Determine whether high-reliability TCP transmissions, or non-guaranteed 
UDP transmissions, are best suited for common 
applications. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
Role of the Transport Layer 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
Transportation of Data 
Role of the Transport Layer 
The Transport Layer is responsible for establishing a temporary 
communication session between two applications and delivering data 
between them. TCP/IP uses two protocols to achieve this: 
 Transmission Control Protocol (TCP) 
 User Datagram Protocol (UDP) 
Primary Responsibilities of Transport layer Protocols 
 Tracking the individual communication between applications on the 
source and destination hosts 
 Segmenting data for manageability and reassembling segmented 
data into streams of application data at the destination 
 Identifying the proper application for each communication stream 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
Transportation of Data 
Conversation Multiplexing 
Segmenting the data 
 Enables many different 
communications, from many 
different users, to be 
interleaved (multiplexed) on 
the same network, at the 
same time. 
 Provides the means to both 
send and receive data when 
running multiple applications. 
 Header added to each 
segment to identify it. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Transportation of Data 
Transport Layer Reliability 
Different applications have different transport reliability requirements 
TCP/IP provides two transport layer protocols, TCP and UDP 
Transmission Control Protocol (TCP) 
 Provides reliable delivery ensuring that all of the data arrives at the 
destination. 
 Uses acknowledged delivery and other processes to ensure delivery 
 Makes larger demands on the network – more overhead 
User Datagram Protocol (UDP) 
 Provides just the basic functions for delivery – no reliability 
 Less overhead 
TCP or UDP 
 There is a trade-off between the value of reliability and the burden it 
places on the network. 
 Application developers choose the transport protocol based on the 
requirements of their applications. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
Introducing TCP and UDP 
Introducing TCP 
Transmission Control Protocol (TCP) 
 RFC 793 
 Connection-oriented – creating a session between source and 
destination 
 Reliable delivery – retransmitting lost or corrupt data 
 Ordered data reconstruction – numbering and sequencing of 
segments 
 Flow control - regulating the amount of data transmitted 
 Stateful protocol – keeping track of the session 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Introducing TCP and UDP 
Introducing UDP 
User Datagram Protocol (UDP) 
 RFC 768 
 Connectionless 
 Unreliable delivery 
 No ordered data reconstruction 
 No flow control 
 Stateless protocol 
Applications that use UDP: 
 Domain Name System (DNS) 
 Video Streaming 
 Voice over IP (VoIP) 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Introducing TCP and UDP 
Separating Multiple Communications 
Port Numbers are used by TCP and UDP to differentiate between 
applications. 
. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Introducing TCP and UDP 
TCP and UDP Port Addressing 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Introducing TCP and UDP 
TCP and UDP Port Addressing 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Introducing TCP and UDP 
TCP and UDP Port Addressing 
Netstat 
 Used to examine TCP connections that are open and 
running on a networked host 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
TCP Communication 
TCP Server Processes 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
TCP Communication 
TCP Connection, Establishment and 
Termination 
Three-Way Handshake 
 Establishes that the destination device is present on the 
network. 
 Verifies that the destination device has an active 
service and is accepting requests on the destination 
port number that the initiating client intends to use for 
the session. 
 Informs the destination device that the source client 
intends to establish a communication session on that 
port number. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
TCP Communication NEED New Graphic for this and next two slides 
TCP Three-Way Handshake – Step 1 
 Step 1: The initiating client requests a client-to-server 
communication session with the server. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
TCP Communication 
TCP Three-Way Handshake – Step 2 
 Step 2: The server acknowledges the client-to-server 
communication session and requests a 
server-to-client communication session. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
TCP Communication 
TCP Three-Way Handshake – Step 3 
 Step 3: The initiating client acknowledges the 
server-to-client communication session. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
TCP Communication 
TCP Session Termination 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Reliability and Flow Control 
TCP Reliability – Ordered Delivery 
Sequence numbers used to reassemble segments into 
original order 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
TCP Reliability – Acknowledgement and 
Window Size 
The sequence number and acknowledgement number 
are used together to confirm receipt. 
Window Size - The amount of data that a source can 
transmit before an acknowledgement must be received. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
TCP Reliability and Flow Control 
Window Size and Acknowledgements 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
Reliability and Flow Control 
TCP Flow Control – Congestion Avoidance 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
Reliability and Flow Control 
TCP Reliability - Acknowledgements 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
UDP Communication 
UDP Low Overhead vs. Reliability 
UDP 
 Simple protocol that provides the basic transport layer functions 
 Used by applications that can tolerate small loss of data 
 Used by applications that cannot tolerate delay 
Used by 
 Domain Name System (DNS) 
 Simple Network Management Protocol (SNMP) 
 Dynamic Host Configuration Protocol (DHCP) 
 Trivial File Transfer Protocol (TFTP) 
 IP telephony or Voice over IP (VoIP) 
 Online games 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
UDP Communication 
Datagram Reassembly 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
UDP Communication 
UDP Server and Client Processes 
 UDP-based server applications are assigned well-known 
or registered port numbers. 
 UDP client process randomly selects port number from 
range of dynamic port numbers as the source port. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
TCP or UDP 
Applications that use TCP 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
TCP or UDP 
Applications that use UDP 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Chapter 7: Summary 
 The role of the Transport layer is to provide three main 
functions: multiplexing, segmentation and reassembly, and 
error checking. 
 These functions are necessary in order to address issues in 
quality of service and security on networks. 
 Knowing how TCP and UDP operate and which popular 
applications use each protocol will allow the implementation 
of quality of service and build more reliable networks. 
 Ports provide a “tunnel” for data to get from the Transport 
layer to the appropriate application at the destination. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31

More Related Content

What's hot

What's hot (20)

CCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkCCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the network
 
Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10
 
CCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerCCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application Layer
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communications
 
Ccna v5-S1-Chapter 7
Ccna v5-S1-Chapter 7Ccna v5-S1-Chapter 7
Ccna v5-S1-Chapter 7
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5
 
CCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - EthernetCCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - Ethernet
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10
 
Ccna v5-S1-Chapter 6
Ccna v5-S1-Chapter 6Ccna v5-S1-Chapter 6
Ccna v5-S1-Chapter 6
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point Connections
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The Network
 
Ccna v5-S1-Chapter 5
Ccna v5-S1-Chapter 5Ccna v5-S1-Chapter 5
Ccna v5-S1-Chapter 5
 
CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5
 
CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2
 
CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
 
Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4
 

Viewers also liked

TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
Michael Noel
 
20071015 Architecting Enterprise Security
20071015  Architecting Enterprise Security20071015  Architecting Enterprise Security
20071015 Architecting Enterprise Security
David Chou
 
F5 Networks Adds To Oracle Database
F5 Networks Adds To Oracle DatabaseF5 Networks Adds To Oracle Database
F5 Networks Adds To Oracle Database
F5 Networks
 
CCNA Exploration 2 - Chapter 4
CCNA Exploration 2 - Chapter 4CCNA Exploration 2 - Chapter 4
CCNA Exploration 2 - Chapter 4
Irsandi Hasan
 
CCNA Exploration 2 - Chapter 3
CCNA Exploration 2 - Chapter 3CCNA Exploration 2 - Chapter 3
CCNA Exploration 2 - Chapter 3
Irsandi Hasan
 

Viewers also liked (20)

CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
Замена Microsoft TMG решением от F5 Networks
Замена Microsoft TMG решением от F5 NetworksЗамена Microsoft TMG решением от F5 Networks
Замена Microsoft TMG решением от F5 Networks
 
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
 
Virtualization / Cloud / SDN
Virtualization / Cloud / SDNVirtualization / Cloud / SDN
Virtualization / Cloud / SDN
 
F5 Networks- Why Legacy Security Systems are Failing
F5 Networks- Why Legacy Security Systems are FailingF5 Networks- Why Legacy Security Systems are Failing
F5 Networks- Why Legacy Security Systems are Failing
 
20071015 Architecting Enterprise Security
20071015  Architecting Enterprise Security20071015  Architecting Enterprise Security
20071015 Architecting Enterprise Security
 
F5 Networks Adds To Oracle Database
F5 Networks Adds To Oracle DatabaseF5 Networks Adds To Oracle Database
F5 Networks Adds To Oracle Database
 
F5 Networks: миграция c Microsoft TMG
F5 Networks: миграция c Microsoft TMGF5 Networks: миграция c Microsoft TMG
F5 Networks: миграция c Microsoft TMG
 
VIPRION Solutions - April 2012
VIPRION Solutions - April 2012VIPRION Solutions - April 2012
VIPRION Solutions - April 2012
 
CCNA Exploration 2 - Chapter 4
CCNA Exploration 2 - Chapter 4CCNA Exploration 2 - Chapter 4
CCNA Exploration 2 - Chapter 4
 
Cisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group TaggingCisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group Tagging
 
HK VForum F5 apps centric security nov 4, 2016 - final
HK VForum F5 apps centric security nov 4, 2016 - finalHK VForum F5 apps centric security nov 4, 2016 - final
HK VForum F5 apps centric security nov 4, 2016 - final
 
F5 Offers Advanced Web Security With BIG-IP v10.1
F5 Offers Advanced Web Security With BIG-IP v10.1F5 Offers Advanced Web Security With BIG-IP v10.1
F5 Offers Advanced Web Security With BIG-IP v10.1
 
CCNA Exploration 2 - Chapter 3
CCNA Exploration 2 - Chapter 3CCNA Exploration 2 - Chapter 3
CCNA Exploration 2 - Chapter 3
 
Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling trans...
Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling trans...Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling trans...
Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling trans...
 
VIPRION 2400 and vCMP
VIPRION 2400 and vCMPVIPRION 2400 and vCMP
VIPRION 2400 and vCMP
 
Best Practice TLS for IBM Domino
Best Practice TLS for IBM DominoBest Practice TLS for IBM Domino
Best Practice TLS for IBM Domino
 
IPv6 ACL
IPv6 ACLIPv6 ACL
IPv6 ACL
 
The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)
 

Similar to CCNA RS_ITN - Chapter 7

محمد مشاري
محمد مشاريمحمد مشاري
محمد مشاري
maherrrrz
 
Exploration network chapter4
Exploration network chapter4Exploration network chapter4
Exploration network chapter4
r82093403
 
CCNA Exploration 1 - Chapter 4
CCNA Exploration 1 - Chapter 4CCNA Exploration 1 - Chapter 4
CCNA Exploration 1 - Chapter 4
Irsandi Hasan
 

Similar to CCNA RS_ITN - Chapter 7 (20)

محمد مشاري
محمد مشاريمحمد مشاري
محمد مشاري
 
Chapter 07 - Transport Layer
Chapter 07 - Transport LayerChapter 07 - Transport Layer
Chapter 07 - Transport Layer
 
Chapter 7 : Transport layer
Chapter 7 : Transport layerChapter 7 : Transport layer
Chapter 7 : Transport layer
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
Exploration network chapter4
Exploration network chapter4Exploration network chapter4
Exploration network chapter4
 
CCNA Exploration 1 - Chapter 4
CCNA Exploration 1 - Chapter 4CCNA Exploration 1 - Chapter 4
CCNA Exploration 1 - Chapter 4
 
OSI Transport Layer
OSI Transport LayerOSI Transport Layer
OSI Transport Layer
 
It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9
 
cisco-nti-Day18
cisco-nti-Day18cisco-nti-Day18
cisco-nti-Day18
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application Layer
 
Chapter 10 : Application layer
Chapter 10 : Application layerChapter 10 : Application layer
Chapter 10 : Application layer
 
Lecture Notes- Network Services - Copy.pptx
Lecture Notes- Network Services - Copy.pptxLecture Notes- Network Services - Copy.pptx
Lecture Notes- Network Services - Copy.pptx
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and Communications
 
Chapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsChapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communications
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
 
Vo ip sip
Vo ip sipVo ip sip
Vo ip sip
 
Cloud Presentation.pdf
Cloud Presentation.pdfCloud Presentation.pdf
Cloud Presentation.pdf
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
 
CCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayCCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame Relay
 

More from Irsandi Hasan

More from Irsandi Hasan (17)

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
 
CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 

CCNA RS_ITN - Chapter 7

  • 1. Chapter 7: Transport Layer Introduction to Networking © 2008 Cisco Systems, Inc. All Presentation_ID rights reserved. Cisco Confidential 1
  • 2. Chapter 7 7.1 Transport Layer Protocols 7.2 TCP and UDP 7.3 Summary Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
  • 3. Chapter 7: Objectives  Describe the purpose of the transport layer in managing the transportation of data in end-to-end communication.  Describe characteristics of the TCP and UDP protocols, including port numbers and their uses.  Explain how TCP session establishment and termination processes facilitate reliable communication.  Explain how TCP protocol data units are transmitted and acknowledged to guarantee delivery.  Explain the UDP client processes to establish communication with a server.  Determine whether high-reliability TCP transmissions, or non-guaranteed UDP transmissions, are best suited for common applications. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
  • 4. Role of the Transport Layer Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
  • 5. Transportation of Data Role of the Transport Layer The Transport Layer is responsible for establishing a temporary communication session between two applications and delivering data between them. TCP/IP uses two protocols to achieve this:  Transmission Control Protocol (TCP)  User Datagram Protocol (UDP) Primary Responsibilities of Transport layer Protocols  Tracking the individual communication between applications on the source and destination hosts  Segmenting data for manageability and reassembling segmented data into streams of application data at the destination  Identifying the proper application for each communication stream Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
  • 6. Transportation of Data Conversation Multiplexing Segmenting the data  Enables many different communications, from many different users, to be interleaved (multiplexed) on the same network, at the same time.  Provides the means to both send and receive data when running multiple applications.  Header added to each segment to identify it. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
  • 7. Transportation of Data Transport Layer Reliability Different applications have different transport reliability requirements TCP/IP provides two transport layer protocols, TCP and UDP Transmission Control Protocol (TCP)  Provides reliable delivery ensuring that all of the data arrives at the destination.  Uses acknowledged delivery and other processes to ensure delivery  Makes larger demands on the network – more overhead User Datagram Protocol (UDP)  Provides just the basic functions for delivery – no reliability  Less overhead TCP or UDP  There is a trade-off between the value of reliability and the burden it places on the network.  Application developers choose the transport protocol based on the requirements of their applications. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
  • 8. Introducing TCP and UDP Introducing TCP Transmission Control Protocol (TCP)  RFC 793  Connection-oriented – creating a session between source and destination  Reliable delivery – retransmitting lost or corrupt data  Ordered data reconstruction – numbering and sequencing of segments  Flow control - regulating the amount of data transmitted  Stateful protocol – keeping track of the session Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
  • 9. Introducing TCP and UDP Introducing UDP User Datagram Protocol (UDP)  RFC 768  Connectionless  Unreliable delivery  No ordered data reconstruction  No flow control  Stateless protocol Applications that use UDP:  Domain Name System (DNS)  Video Streaming  Voice over IP (VoIP) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
  • 10. Introducing TCP and UDP Separating Multiple Communications Port Numbers are used by TCP and UDP to differentiate between applications. . Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
  • 11. Introducing TCP and UDP TCP and UDP Port Addressing Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
  • 12. Introducing TCP and UDP TCP and UDP Port Addressing Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
  • 13. Introducing TCP and UDP TCP and UDP Port Addressing Netstat  Used to examine TCP connections that are open and running on a networked host Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
  • 14. TCP Communication TCP Server Processes Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
  • 15. TCP Communication TCP Connection, Establishment and Termination Three-Way Handshake  Establishes that the destination device is present on the network.  Verifies that the destination device has an active service and is accepting requests on the destination port number that the initiating client intends to use for the session.  Informs the destination device that the source client intends to establish a communication session on that port number. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
  • 16. TCP Communication NEED New Graphic for this and next two slides TCP Three-Way Handshake – Step 1  Step 1: The initiating client requests a client-to-server communication session with the server. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
  • 17. TCP Communication TCP Three-Way Handshake – Step 2  Step 2: The server acknowledges the client-to-server communication session and requests a server-to-client communication session. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
  • 18. TCP Communication TCP Three-Way Handshake – Step 3  Step 3: The initiating client acknowledges the server-to-client communication session. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
  • 19. TCP Communication TCP Session Termination Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
  • 20. Reliability and Flow Control TCP Reliability – Ordered Delivery Sequence numbers used to reassemble segments into original order Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
  • 21. TCP Reliability – Acknowledgement and Window Size The sequence number and acknowledgement number are used together to confirm receipt. Window Size - The amount of data that a source can transmit before an acknowledgement must be received. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
  • 22. TCP Reliability and Flow Control Window Size and Acknowledgements Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
  • 23. Reliability and Flow Control TCP Flow Control – Congestion Avoidance Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
  • 24. Reliability and Flow Control TCP Reliability - Acknowledgements Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
  • 25. UDP Communication UDP Low Overhead vs. Reliability UDP  Simple protocol that provides the basic transport layer functions  Used by applications that can tolerate small loss of data  Used by applications that cannot tolerate delay Used by  Domain Name System (DNS)  Simple Network Management Protocol (SNMP)  Dynamic Host Configuration Protocol (DHCP)  Trivial File Transfer Protocol (TFTP)  IP telephony or Voice over IP (VoIP)  Online games Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
  • 26. UDP Communication Datagram Reassembly Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
  • 27. UDP Communication UDP Server and Client Processes  UDP-based server applications are assigned well-known or registered port numbers.  UDP client process randomly selects port number from range of dynamic port numbers as the source port. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
  • 28. TCP or UDP Applications that use TCP Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
  • 29. TCP or UDP Applications that use UDP Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
  • 30. Chapter 7: Summary  The role of the Transport layer is to provide three main functions: multiplexing, segmentation and reassembly, and error checking.  These functions are necessary in order to address issues in quality of service and security on networks.  Knowing how TCP and UDP operate and which popular applications use each protocol will allow the implementation of quality of service and build more reliable networks.  Ports provide a “tunnel” for data to get from the Transport layer to the appropriate application at the destination. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
  • 31. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31