SlideShare a Scribd company logo
1 
My First PPT 
This Is my first ppt.
2 
Overview 
TCP = Transmission Control Protocol 
• Connection-oriented protocol 
• Provides a reliable unicast end-to-end byte stream over an 
unreliable internetwork. 
TCP 
IP Internetwork 
Byte Stream 
Byte Stream 
TCP
3 
Connection-Oriented 
• Before any data transfer, TCP establishes a connection: 
• One TCP entity is waiting for a connection (“server”) 
• The other TCP entity (“client”) contacts the server 
• The actual procedure for setting up connections is more 
complex. 
• Each connection is 
CLIENT SERVER 
full duplex 
waiting for 
connection 
request 
Request a connection 
Accept a connection 
Disconnect Data Transer
4 
Reliable 
• Byte stream is broken up into chunks which are called seg-ments 
• Receiver sends acknowledgements (ACKs) for segments 
• TCP maintains a timer. If an ACK is not received in time, 
the segment is retransmitted 
•Detecting errors: 
• TCP has checksums for header and data. Segments with 
invalid checksums are discarded 
• Each byte that is transmitted has a sequence number
5 
Byte Stream Service 
• To the lower layers, TCP handles data in blocks, the 
segments. 
• To the higher layers TCP handles data as a sequence of 
bytes and does not identify boundaries between bytes 
• So: Higher layers do not know about the beginning and 
end of segments ! 
TCP 
Application 
1. write 100 bytes 
2. write 20 bytes 
queue of 
bytes to be 
transmitted TCP 
queue of 
bytes that 
have been 
received 
Application 
1. read 40 bytes 
2. read 40 bytes 
3. read 40 bytes 
Segments
6 
TCP Format 
• TCP segments have a 20 byte header with >= 0 bytes of data. 
IP header TCP header TCP data 
Sequence number (32 bits) 
TCP checksum urgent pointer 
DATA 
20 bytes 20 bytes 
0 15 16 31 
Source Port Number Destination Port Number 
Acknowledgement number (32 bits) 
header window size 
length 0 Flags 
Options (if any) 
20 bytes
7 
TCP header fields 
• Port Number: 
• A port number identifies the endpoint of a connection. 
• A pair <IP address, port number> identifies one 
endpoint of a connection. 
• Two pairs <client IP address, server port number> 
and <server IP address, server port number> identify 
a TCP connection. 
Applications 
Ports: 23 80 104 
TCP 
IP 
Applications 
7 80 16 Ports: 
TCP 
IP
8 
TCP header fields 
• Sequence Number (SeqNo): 
– Sequence number is 32 bits long. 
– So the range of SeqNo is 
0 <= SeqNo <= 232 -1 » 4.3 Gbyte 
– Each sequence number identifies a byte in the byte 
stream 
– Initial Sequence Number (ISN) of a connection is set 
during connection establishment 
Q: What are possible requirements for ISN ?
9 
TCP header fields 
• Acknowledgement Number (AckNo): 
– Acknowledgements are piggybacked, I.e 
a segment from A -> B can contain an 
acknowledgement for a data sent in the B -> A direction 
Q: Why is piggybacking good ? 
– A hosts uses the AckNo field to send acknowledgements. 
(If a host sends an AckNo in a segment it sets the “ACK flag”) 
– The AckNo contains the next SeqNo that a hosts wants to 
receive 
Example: The acknowledgement for a segment with 
sequence numbers 0-1500 is AckNo=1501
10 
TCP header fields 
• Acknowledge Number (cont’d) 
– TCP uses the sliding window flow protocol (see CS 457) to 
regulate the flow of traffic from sender to receiver 
– TCP uses the following variation of sliding window: 
– no NACKs (Negative ACKnowledgement) 
– only cumulative ACKs 
• Example: 
Assume: Sender sends two segments with “1..1500” and 
“1501..3000”, but receiver only gets the second segment. 
In this case, the receiver cannot acknowledge the second 
packet. It can only send AckNo=1
11 
TCP header fields 
• Header Length ( 4bits): 
– Length of header in 32-bit words 
– Note that TCP header has variable length (with minimum 
20 bytes)
12 
TCP header fields 
• Flag bits: 
– URG: Urgent pointer is valid 
– If the bit is set, the following bytes contain an urgent message in 
the range: 
SeqNo <= urgent message <= SeqNo+urgent pointer 
– ACK: Acknowledgement Number is valid 
– PSH: PUSH Flag 
– Notification from sender to the receiver that the receiver should 
pass all data that it has to the application. 
– Normally set by sender when the sender’s buffer is empty
13 
TCP header fields 
• Flag bits: 
– RST: Reset the connection 
– The flag causes the receiver to reset the connection 
– Receiver of a RST terminates the connection and indicates 
higher layer application about the reset 
– SYN: Synchronize sequence numbers 
– Sent in the first packet when initiating a connection 
– FIN: Sender is finished with sending 
– Used for closing a connection 
– Both sides of a connection must send a FIN
14 
TCP header fields 
• Window Size: 
– Each side of the connection advertises the window size 
– Window size is the maximum number of bytes that a 
receiver can accept. 
– Maximum window size is 216-1= 65535 bytes 
• TCP Checksum: 
– TCP checksum covers over both TCP header and TCP 
data (also covers some parts of the IP header) 
• Urgent Pointer: 
– Only valid if URG flag is set
15 
TCP header fields 
• Options: 
End of 
Options kind=0 
1 byte 
NOP 
(no operation) kind=1 
1 byte 
Maximum 
Segment Size kind=2 
1 byte 
len=4 
1 byte 
maximum 
segment size 
2 bytes 
Window Scale 
Factor kind=3 
1 byte 
len=3 
1 byte 
shift count 
1 byte 
Timestamp kind=8 
1 byte 
len=10 
1 byte 
timestamp value 
4 bytes 
timestamp echo reply 
4 bytes

More Related Content

What's hot

Tcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication headerTcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication header
Faizan Shaikh
 
Chapter 01 - Overview
Chapter 01 - OverviewChapter 01 - Overview
Chapter 01 - Overviewphanleson
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
Sparsh Samir
 
Tcp Analysis Through wiresshark
Tcp Analysis Through wiressharkTcp Analysis Through wiresshark
Tcp Analysis Through wiresshark
Suman_kumari1
 
Tcp Immediate Data Transfer
Tcp Immediate Data TransferTcp Immediate Data Transfer
Tcp Immediate Data Transfer
Ram Dutt Shukla
 
Intake 38 11
Intake 38 11Intake 38 11
Intake 38 11
Mahmoud Ouf
 
Framing
FramingFraming
Computer network (Lecture 2)
Computer network (Lecture 2)Computer network (Lecture 2)
Computer network (Lecture 2)Vishwajit Nandi
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
ntpc08
 
Basic Programming concepts - Programming with C++
Basic Programming concepts - Programming with C++Basic Programming concepts - Programming with C++
Basic Programming concepts - Programming with C++
Mohamed El Desouki
 
Week5 lec3-bscs1
Week5 lec3-bscs1Week5 lec3-bscs1
Week5 lec3-bscs1
syedhaiderraza
 
Vulnerabilities in IP Protocols
Vulnerabilities in IP ProtocolsVulnerabilities in IP Protocols
Vulnerabilities in IP Protocols
babak danyal
 
Part 6 : Internet applications
Part 6 : Internet applicationsPart 6 : Internet applications
Part 6 : Internet applications
Olivier Bonaventure
 
Working of TCP
Working of TCP Working of TCP
Working of TCP
Sandesh Bakadra
 
08 module interconnecting cisco router
08 module interconnecting cisco router08 module interconnecting cisco router
08 module interconnecting cisco routerAsif
 
Ftp tftp
Ftp tftpFtp tftp
Ftp tftp
Prabhat gangwar
 
Chap2. ipv4-arp-icmp
Chap2. ipv4-arp-icmpChap2. ipv4-arp-icmp
Chap2. ipv4-arp-icmp
東原 李
 
Meeting 6 : ftp
Meeting 6 : ftpMeeting 6 : ftp
Meeting 6 : ftp
Syaiful Ahdan
 

What's hot (20)

Tcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication headerTcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication header
 
Chapter 01 - Overview
Chapter 01 - OverviewChapter 01 - Overview
Chapter 01 - Overview
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
 
Tcp Analysis Through wiresshark
Tcp Analysis Through wiressharkTcp Analysis Through wiresshark
Tcp Analysis Through wiresshark
 
Tcp Immediate Data Transfer
Tcp Immediate Data TransferTcp Immediate Data Transfer
Tcp Immediate Data Transfer
 
Intake 38 11
Intake 38 11Intake 38 11
Intake 38 11
 
Framing
FramingFraming
Framing
 
Computer network (Lecture 2)
Computer network (Lecture 2)Computer network (Lecture 2)
Computer network (Lecture 2)
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
Basic Programming concepts - Programming with C++
Basic Programming concepts - Programming with C++Basic Programming concepts - Programming with C++
Basic Programming concepts - Programming with C++
 
Week5 lec3-bscs1
Week5 lec3-bscs1Week5 lec3-bscs1
Week5 lec3-bscs1
 
Vulnerabilities in IP Protocols
Vulnerabilities in IP ProtocolsVulnerabilities in IP Protocols
Vulnerabilities in IP Protocols
 
Part 6 : Internet applications
Part 6 : Internet applicationsPart 6 : Internet applications
Part 6 : Internet applications
 
Working of TCP
Working of TCP Working of TCP
Working of TCP
 
Np unit iii
Np unit iiiNp unit iii
Np unit iii
 
08 module interconnecting cisco router
08 module interconnecting cisco router08 module interconnecting cisco router
08 module interconnecting cisco router
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
Ftp tftp
Ftp tftpFtp tftp
Ftp tftp
 
Chap2. ipv4-arp-icmp
Chap2. ipv4-arp-icmpChap2. ipv4-arp-icmp
Chap2. ipv4-arp-icmp
 
Meeting 6 : ftp
Meeting 6 : ftpMeeting 6 : ftp
Meeting 6 : ftp
 

Similar to Olumide pidan b

Transmission control protocol ...............................
Transmission control protocol ...............................Transmission control protocol ...............................
Transmission control protocol ...............................
SwatiHans10
 
tcp-ippresentation-150614172243-lva1-app6892.pptx
tcp-ippresentation-150614172243-lva1-app6892.pptxtcp-ippresentation-150614172243-lva1-app6892.pptx
tcp-ippresentation-150614172243-lva1-app6892.pptx
AlphaKoiSylvester
 
13_TCP_Attack.pptx
13_TCP_Attack.pptx13_TCP_Attack.pptx
13_TCP_Attack.pptx
AlmaOraevi
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP Presentation
Harish Chand
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3
Roman Brovko
 
Transmission Control Protocol_ Computer Networks
Transmission Control Protocol_ Computer NetworksTransmission Control Protocol_ Computer Networks
Transmission Control Protocol_ Computer Networks
Manimaran A
 
TCP_NISCHAYBAHL.pptx
TCP_NISCHAYBAHL.pptxTCP_NISCHAYBAHL.pptx
TCP_NISCHAYBAHL.pptx
NischayBahl1
 
Osi model
Osi modelOsi model
Osi model
Anuj Kumar
 
5-LEC- 5.pptxTransport Layer. Transport Layer Protocols
5-LEC- 5.pptxTransport Layer.  Transport Layer Protocols5-LEC- 5.pptxTransport Layer.  Transport Layer Protocols
5-LEC- 5.pptxTransport Layer. Transport Layer Protocols
ZahouAmel1
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
Online
 
lecturer3.pptx
lecturer3.pptxlecturer3.pptx
lecturer3.pptx
MdFarabiHasan
 
1.1.2 - Concept of Network and TCP_IP Model (2).pptx
1.1.2 - Concept of Network and TCP_IP Model (2).pptx1.1.2 - Concept of Network and TCP_IP Model (2).pptx
1.1.2 - Concept of Network and TCP_IP Model (2).pptx
VINAYTANWAR18
 
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Hamidreza Bolhasani
 
Unit-4 (1).pptx
Unit-4 (1).pptxUnit-4 (1).pptx
Unit-4 (1).pptx
poonamsngr
 
User Datagram Protocol
User Datagram ProtocolUser Datagram Protocol
User Datagram Protocol
Purushottam Kamble
 
4. tcp header.ppt
4. tcp header.ppt4. tcp header.ppt
4. tcp header.ppt
SurajKumar732187
 
TCP /IP
TCP /IPTCP /IP
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
Waqas Ahmed Nawaz
 

Similar to Olumide pidan b (20)

Transmission control protocol ...............................
Transmission control protocol ...............................Transmission control protocol ...............................
Transmission control protocol ...............................
 
tcp-ippresentation-150614172243-lva1-app6892.pptx
tcp-ippresentation-150614172243-lva1-app6892.pptxtcp-ippresentation-150614172243-lva1-app6892.pptx
tcp-ippresentation-150614172243-lva1-app6892.pptx
 
13_TCP_Attack.pptx
13_TCP_Attack.pptx13_TCP_Attack.pptx
13_TCP_Attack.pptx
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP Presentation
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3
 
Transmission Control Protocol_ Computer Networks
Transmission Control Protocol_ Computer NetworksTransmission Control Protocol_ Computer Networks
Transmission Control Protocol_ Computer Networks
 
TCP_NISCHAYBAHL.pptx
TCP_NISCHAYBAHL.pptxTCP_NISCHAYBAHL.pptx
TCP_NISCHAYBAHL.pptx
 
Osi model
Osi modelOsi model
Osi model
 
5-LEC- 5.pptxTransport Layer. Transport Layer Protocols
5-LEC- 5.pptxTransport Layer.  Transport Layer Protocols5-LEC- 5.pptxTransport Layer.  Transport Layer Protocols
5-LEC- 5.pptxTransport Layer. Transport Layer Protocols
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
lecturer3.pptx
lecturer3.pptxlecturer3.pptx
lecturer3.pptx
 
1.1.2 - Concept of Network and TCP_IP Model (2).pptx
1.1.2 - Concept of Network and TCP_IP Model (2).pptx1.1.2 - Concept of Network and TCP_IP Model (2).pptx
1.1.2 - Concept of Network and TCP_IP Model (2).pptx
 
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)
 
Lecture set 7
Lecture set 7Lecture set 7
Lecture set 7
 
Unit-4 (1).pptx
Unit-4 (1).pptxUnit-4 (1).pptx
Unit-4 (1).pptx
 
User Datagram Protocol
User Datagram ProtocolUser Datagram Protocol
User Datagram Protocol
 
4. tcp header.ppt
4. tcp header.ppt4. tcp header.ppt
4. tcp header.ppt
 
TCP /IP
TCP /IPTCP /IP
TCP /IP
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
 
Mod4
Mod4Mod4
Mod4
 

More from Amit Ranjan

Purva season b
Purva season bPurva season b
Purva season b
Amit Ranjan
 
Purva season a
Purva season aPurva season a
Purva season a
Amit Ranjan
 
Sanjeev ghai irs
Sanjeev ghai irsSanjeev ghai irs
Sanjeev ghai irs
Amit Ranjan
 
Sanjeev ghei
Sanjeev gheiSanjeev ghei
Sanjeev ghei
Amit Ranjan
 
Eschol tech solutions a
Eschol tech solutions aEschol tech solutions a
Eschol tech solutions a
Amit Ranjan
 
Olumide pidan c
Olumide pidan cOlumide pidan c
Olumide pidan c
Amit Ranjan
 
Olumide pidan a
Olumide pidan aOlumide pidan a
Olumide pidan a
Amit Ranjan
 
Olumide adeola pidan c
Olumide adeola pidan cOlumide adeola pidan c
Olumide adeola pidan c
Amit Ranjan
 
Olumide adeola pidan b
Olumide adeola pidan bOlumide adeola pidan b
Olumide adeola pidan b
Amit Ranjan
 
Olumide adeola pidan a
Olumide adeola pidan aOlumide adeola pidan a
Olumide adeola pidan a
Amit Ranjan
 
Sanjeev ghei
Sanjeev ghei Sanjeev ghei
Sanjeev ghei
Amit Ranjan
 
Sanjeev ghai irs
Sanjeev ghai irsSanjeev ghai irs
Sanjeev ghai irs
Amit Ranjan
 
Amrapali
AmrapaliAmrapali
Amrapali
Amit Ranjan
 
Amrapali Group
Amrapali GroupAmrapali Group
Amrapali Group
Amit Ranjan
 

More from Amit Ranjan (14)

Purva season b
Purva season bPurva season b
Purva season b
 
Purva season a
Purva season aPurva season a
Purva season a
 
Sanjeev ghai irs
Sanjeev ghai irsSanjeev ghai irs
Sanjeev ghai irs
 
Sanjeev ghei
Sanjeev gheiSanjeev ghei
Sanjeev ghei
 
Eschol tech solutions a
Eschol tech solutions aEschol tech solutions a
Eschol tech solutions a
 
Olumide pidan c
Olumide pidan cOlumide pidan c
Olumide pidan c
 
Olumide pidan a
Olumide pidan aOlumide pidan a
Olumide pidan a
 
Olumide adeola pidan c
Olumide adeola pidan cOlumide adeola pidan c
Olumide adeola pidan c
 
Olumide adeola pidan b
Olumide adeola pidan bOlumide adeola pidan b
Olumide adeola pidan b
 
Olumide adeola pidan a
Olumide adeola pidan aOlumide adeola pidan a
Olumide adeola pidan a
 
Sanjeev ghei
Sanjeev ghei Sanjeev ghei
Sanjeev ghei
 
Sanjeev ghai irs
Sanjeev ghai irsSanjeev ghai irs
Sanjeev ghai irs
 
Amrapali
AmrapaliAmrapali
Amrapali
 
Amrapali Group
Amrapali GroupAmrapali Group
Amrapali Group
 

Recently uploaded

一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
taqyed
 
2137ad Merindol Colony Interiors where refugee try to build a seemengly norm...
2137ad  Merindol Colony Interiors where refugee try to build a seemengly norm...2137ad  Merindol Colony Interiors where refugee try to build a seemengly norm...
2137ad Merindol Colony Interiors where refugee try to build a seemengly norm...
luforfor
 
一比一原版(GU毕业证)格里菲斯大学毕业证成绩单
一比一原版(GU毕业证)格里菲斯大学毕业证成绩单一比一原版(GU毕业证)格里菲斯大学毕业证成绩单
一比一原版(GU毕业证)格里菲斯大学毕业证成绩单
zvaywau
 
thGAP - BAbyss in Moderno!! Transgenic Human Germline Alternatives Project
thGAP - BAbyss in Moderno!!  Transgenic Human Germline Alternatives ProjectthGAP - BAbyss in Moderno!!  Transgenic Human Germline Alternatives Project
thGAP - BAbyss in Moderno!! Transgenic Human Germline Alternatives Project
Marc Dusseiller Dusjagr
 
ART FORMS OF KERALA: TRADITIONAL AND OTHERS
ART FORMS OF KERALA: TRADITIONAL AND OTHERSART FORMS OF KERALA: TRADITIONAL AND OTHERS
ART FORMS OF KERALA: TRADITIONAL AND OTHERS
Sandhya J.Nair
 
Memory Rental Store - The Chase (Storyboard)
Memory Rental Store - The Chase (Storyboard)Memory Rental Store - The Chase (Storyboard)
Memory Rental Store - The Chase (Storyboard)
SuryaKalyan3
 
一比一原版(DU毕业证)迪肯大学毕业证成绩单
一比一原版(DU毕业证)迪肯大学毕业证成绩单一比一原版(DU毕业证)迪肯大学毕业证成绩单
一比一原版(DU毕业证)迪肯大学毕业证成绩单
zvaywau
 
IrishWritersCtrsPersonalEssaysMay29.pptx
IrishWritersCtrsPersonalEssaysMay29.pptxIrishWritersCtrsPersonalEssaysMay29.pptx
IrishWritersCtrsPersonalEssaysMay29.pptx
Aine Greaney Ellrott
 
Memory Rental Store - The Ending(Storyboard)
Memory Rental Store - The Ending(Storyboard)Memory Rental Store - The Ending(Storyboard)
Memory Rental Store - The Ending(Storyboard)
SuryaKalyan3
 
Caffeinated Pitch Bible- developed by Claire Wilson
Caffeinated Pitch Bible- developed by Claire WilsonCaffeinated Pitch Bible- developed by Claire Wilson
Caffeinated Pitch Bible- developed by Claire Wilson
ClaireWilson398082
 
Sundabet | Slot gacor dan terpercaya mudah menang
Sundabet | Slot gacor dan terpercaya mudah menangSundabet | Slot gacor dan terpercaya mudah menang
Sundabet | Slot gacor dan terpercaya mudah menang
Sundabet | Situs Slot gacor dan terpercaya
 
Inter-Dimensional Girl Boards Segment (Act 3)
Inter-Dimensional Girl Boards Segment (Act 3)Inter-Dimensional Girl Boards Segment (Act 3)
Inter-Dimensional Girl Boards Segment (Act 3)
CristianMestre
 
一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理
一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理
一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理
beduwt
 
The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎
The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎
The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎
iraqartsandculture
 
ashokathegreat project class 12 presentation
ashokathegreat project class 12 presentationashokathegreat project class 12 presentation
ashokathegreat project class 12 presentation
aditiyad2020
 
The Legacy of Breton In A New Age by Master Terrance Lindall
The Legacy of Breton In A New Age by Master Terrance LindallThe Legacy of Breton In A New Age by Master Terrance Lindall
The Legacy of Breton In A New Age by Master Terrance Lindall
BBaez1
 
acting board rough title here lolaaaaaaa
acting board rough title here lolaaaaaaaacting board rough title here lolaaaaaaa
acting board rough title here lolaaaaaaa
angelicafronda7
 
Codes n Conventionss copy (2).pptx new new
Codes n Conventionss copy (2).pptx new newCodes n Conventionss copy (2).pptx new new
Codes n Conventionss copy (2).pptx new new
ZackSpencer3
 
2137ad - Characters that live in Merindol and are at the center of main stories
2137ad - Characters that live in Merindol and are at the center of main stories2137ad - Characters that live in Merindol and are at the center of main stories
2137ad - Characters that live in Merindol and are at the center of main stories
luforfor
 

Recently uploaded (20)

一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
 
2137ad Merindol Colony Interiors where refugee try to build a seemengly norm...
2137ad  Merindol Colony Interiors where refugee try to build a seemengly norm...2137ad  Merindol Colony Interiors where refugee try to build a seemengly norm...
2137ad Merindol Colony Interiors where refugee try to build a seemengly norm...
 
一比一原版(GU毕业证)格里菲斯大学毕业证成绩单
一比一原版(GU毕业证)格里菲斯大学毕业证成绩单一比一原版(GU毕业证)格里菲斯大学毕业证成绩单
一比一原版(GU毕业证)格里菲斯大学毕业证成绩单
 
thGAP - BAbyss in Moderno!! Transgenic Human Germline Alternatives Project
thGAP - BAbyss in Moderno!!  Transgenic Human Germline Alternatives ProjectthGAP - BAbyss in Moderno!!  Transgenic Human Germline Alternatives Project
thGAP - BAbyss in Moderno!! Transgenic Human Germline Alternatives Project
 
ART FORMS OF KERALA: TRADITIONAL AND OTHERS
ART FORMS OF KERALA: TRADITIONAL AND OTHERSART FORMS OF KERALA: TRADITIONAL AND OTHERS
ART FORMS OF KERALA: TRADITIONAL AND OTHERS
 
Memory Rental Store - The Chase (Storyboard)
Memory Rental Store - The Chase (Storyboard)Memory Rental Store - The Chase (Storyboard)
Memory Rental Store - The Chase (Storyboard)
 
一比一原版(DU毕业证)迪肯大学毕业证成绩单
一比一原版(DU毕业证)迪肯大学毕业证成绩单一比一原版(DU毕业证)迪肯大学毕业证成绩单
一比一原版(DU毕业证)迪肯大学毕业证成绩单
 
IrishWritersCtrsPersonalEssaysMay29.pptx
IrishWritersCtrsPersonalEssaysMay29.pptxIrishWritersCtrsPersonalEssaysMay29.pptx
IrishWritersCtrsPersonalEssaysMay29.pptx
 
Memory Rental Store - The Ending(Storyboard)
Memory Rental Store - The Ending(Storyboard)Memory Rental Store - The Ending(Storyboard)
Memory Rental Store - The Ending(Storyboard)
 
Caffeinated Pitch Bible- developed by Claire Wilson
Caffeinated Pitch Bible- developed by Claire WilsonCaffeinated Pitch Bible- developed by Claire Wilson
Caffeinated Pitch Bible- developed by Claire Wilson
 
Sundabet | Slot gacor dan terpercaya mudah menang
Sundabet | Slot gacor dan terpercaya mudah menangSundabet | Slot gacor dan terpercaya mudah menang
Sundabet | Slot gacor dan terpercaya mudah menang
 
Inter-Dimensional Girl Boards Segment (Act 3)
Inter-Dimensional Girl Boards Segment (Act 3)Inter-Dimensional Girl Boards Segment (Act 3)
Inter-Dimensional Girl Boards Segment (Act 3)
 
一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理
一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理
一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理
 
The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎
The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎
The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎
 
ashokathegreat project class 12 presentation
ashokathegreat project class 12 presentationashokathegreat project class 12 presentation
ashokathegreat project class 12 presentation
 
European Cybersecurity Skills Framework Role Profiles.pdf
European Cybersecurity Skills Framework Role Profiles.pdfEuropean Cybersecurity Skills Framework Role Profiles.pdf
European Cybersecurity Skills Framework Role Profiles.pdf
 
The Legacy of Breton In A New Age by Master Terrance Lindall
The Legacy of Breton In A New Age by Master Terrance LindallThe Legacy of Breton In A New Age by Master Terrance Lindall
The Legacy of Breton In A New Age by Master Terrance Lindall
 
acting board rough title here lolaaaaaaa
acting board rough title here lolaaaaaaaacting board rough title here lolaaaaaaa
acting board rough title here lolaaaaaaa
 
Codes n Conventionss copy (2).pptx new new
Codes n Conventionss copy (2).pptx new newCodes n Conventionss copy (2).pptx new new
Codes n Conventionss copy (2).pptx new new
 
2137ad - Characters that live in Merindol and are at the center of main stories
2137ad - Characters that live in Merindol and are at the center of main stories2137ad - Characters that live in Merindol and are at the center of main stories
2137ad - Characters that live in Merindol and are at the center of main stories
 

Olumide pidan b

  • 1. 1 My First PPT This Is my first ppt.
  • 2. 2 Overview TCP = Transmission Control Protocol • Connection-oriented protocol • Provides a reliable unicast end-to-end byte stream over an unreliable internetwork. TCP IP Internetwork Byte Stream Byte Stream TCP
  • 3. 3 Connection-Oriented • Before any data transfer, TCP establishes a connection: • One TCP entity is waiting for a connection (“server”) • The other TCP entity (“client”) contacts the server • The actual procedure for setting up connections is more complex. • Each connection is CLIENT SERVER full duplex waiting for connection request Request a connection Accept a connection Disconnect Data Transer
  • 4. 4 Reliable • Byte stream is broken up into chunks which are called seg-ments • Receiver sends acknowledgements (ACKs) for segments • TCP maintains a timer. If an ACK is not received in time, the segment is retransmitted •Detecting errors: • TCP has checksums for header and data. Segments with invalid checksums are discarded • Each byte that is transmitted has a sequence number
  • 5. 5 Byte Stream Service • To the lower layers, TCP handles data in blocks, the segments. • To the higher layers TCP handles data as a sequence of bytes and does not identify boundaries between bytes • So: Higher layers do not know about the beginning and end of segments ! TCP Application 1. write 100 bytes 2. write 20 bytes queue of bytes to be transmitted TCP queue of bytes that have been received Application 1. read 40 bytes 2. read 40 bytes 3. read 40 bytes Segments
  • 6. 6 TCP Format • TCP segments have a 20 byte header with >= 0 bytes of data. IP header TCP header TCP data Sequence number (32 bits) TCP checksum urgent pointer DATA 20 bytes 20 bytes 0 15 16 31 Source Port Number Destination Port Number Acknowledgement number (32 bits) header window size length 0 Flags Options (if any) 20 bytes
  • 7. 7 TCP header fields • Port Number: • A port number identifies the endpoint of a connection. • A pair <IP address, port number> identifies one endpoint of a connection. • Two pairs <client IP address, server port number> and <server IP address, server port number> identify a TCP connection. Applications Ports: 23 80 104 TCP IP Applications 7 80 16 Ports: TCP IP
  • 8. 8 TCP header fields • Sequence Number (SeqNo): – Sequence number is 32 bits long. – So the range of SeqNo is 0 <= SeqNo <= 232 -1 » 4.3 Gbyte – Each sequence number identifies a byte in the byte stream – Initial Sequence Number (ISN) of a connection is set during connection establishment Q: What are possible requirements for ISN ?
  • 9. 9 TCP header fields • Acknowledgement Number (AckNo): – Acknowledgements are piggybacked, I.e a segment from A -> B can contain an acknowledgement for a data sent in the B -> A direction Q: Why is piggybacking good ? – A hosts uses the AckNo field to send acknowledgements. (If a host sends an AckNo in a segment it sets the “ACK flag”) – The AckNo contains the next SeqNo that a hosts wants to receive Example: The acknowledgement for a segment with sequence numbers 0-1500 is AckNo=1501
  • 10. 10 TCP header fields • Acknowledge Number (cont’d) – TCP uses the sliding window flow protocol (see CS 457) to regulate the flow of traffic from sender to receiver – TCP uses the following variation of sliding window: – no NACKs (Negative ACKnowledgement) – only cumulative ACKs • Example: Assume: Sender sends two segments with “1..1500” and “1501..3000”, but receiver only gets the second segment. In this case, the receiver cannot acknowledge the second packet. It can only send AckNo=1
  • 11. 11 TCP header fields • Header Length ( 4bits): – Length of header in 32-bit words – Note that TCP header has variable length (with minimum 20 bytes)
  • 12. 12 TCP header fields • Flag bits: – URG: Urgent pointer is valid – If the bit is set, the following bytes contain an urgent message in the range: SeqNo <= urgent message <= SeqNo+urgent pointer – ACK: Acknowledgement Number is valid – PSH: PUSH Flag – Notification from sender to the receiver that the receiver should pass all data that it has to the application. – Normally set by sender when the sender’s buffer is empty
  • 13. 13 TCP header fields • Flag bits: – RST: Reset the connection – The flag causes the receiver to reset the connection – Receiver of a RST terminates the connection and indicates higher layer application about the reset – SYN: Synchronize sequence numbers – Sent in the first packet when initiating a connection – FIN: Sender is finished with sending – Used for closing a connection – Both sides of a connection must send a FIN
  • 14. 14 TCP header fields • Window Size: – Each side of the connection advertises the window size – Window size is the maximum number of bytes that a receiver can accept. – Maximum window size is 216-1= 65535 bytes • TCP Checksum: – TCP checksum covers over both TCP header and TCP data (also covers some parts of the IP header) • Urgent Pointer: – Only valid if URG flag is set
  • 15. 15 TCP header fields • Options: End of Options kind=0 1 byte NOP (no operation) kind=1 1 byte Maximum Segment Size kind=2 1 byte len=4 1 byte maximum segment size 2 bytes Window Scale Factor kind=3 1 byte len=3 1 byte shift count 1 byte Timestamp kind=8 1 byte len=10 1 byte timestamp value 4 bytes timestamp echo reply 4 bytes