The transport layer provides logical communication between application processes running on different hosts. It implements protocols like TCP and UDP that provide services such as multiplexing, reliable data transfer, and flow control. TCP is connection-oriented and provides reliable, ordered delivery of streams of bytes. UDP is connectionless and offers low-latency communications at the cost of reliability. The transport layer addresses ensure end-to-end delivery of data packets from source to destination applications.
Network layer - design Issues ,Store-and-Forward Packet Switching, Services Provided to the Transport Layer, Which service is the best , Implementation of Service , Implementation of Connectionless Service , Implementation of Connection-Oriented Service
Network layer - design Issues ,Store-and-Forward Packet Switching, Services Provided to the Transport Layer, Which service is the best , Implementation of Service , Implementation of Connectionless Service , Implementation of Connection-Oriented Service
Message and Stream Oriented CommunicationDilum Bandara
Message and Stream Oriented Communication in distributed systems. Persistent vs. Transient Communication. Event queues, Pub/sub networks, MPI, Stream-based communication, Multicast communication
The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking. This layer is the protocol layer that transfers data between adjacent network nodes in a wide area network (WAN) or between nodes on the same local area network (LAN) segment.
Message and Stream Oriented CommunicationDilum Bandara
Message and Stream Oriented Communication in distributed systems. Persistent vs. Transient Communication. Event queues, Pub/sub networks, MPI, Stream-based communication, Multicast communication
The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking. This layer is the protocol layer that transfers data between adjacent network nodes in a wide area network (WAN) or between nodes on the same local area network (LAN) segment.
A document about TCP/IP and OSI would typically cover two major networking models: the TCP/IP model and the OSI model. These models are both conceptual frameworks that describe the layers of communication protocols that are necessary for data to be transmitted over a network.
The TCP/IP model is a four-layer model that is used by the Internet. It includes the Application layer, Transport layer, Internet layer, and Network Access layer. Each layer has a specific function, such as providing application-level services, ensuring reliable data transmission, routing packets over the Internet, and controlling the physical transmission of data over the network.
The OSI model, on the other hand, is a seven-layer model that was developed by the International Organization for Standardization (ISO). It includes the Application layer, Presentation layer, Session layer, Transport layer, Network layer, Data Link layer, and Physical layer. Each layer in this model also has a specific function, such as formatting data for presentation, managing communication sessions between network nodes, and managing physical connections between network devices.
In a document about TCP/IP and OSI, you might find information on the similarities and differences between the two models, the advantages and disadvantages of each model, and examples of how each model is used in real-world networking scenarios. You might also find information on specific protocols that are used within each model, such as TCP, UDP, IP, and Ethernet, and how these protocols work together to facilitate communication between network devices.
Introduction and transport layer services, Multiplexing and Demultiplexing, Connection less transport (UDP), Principles of reliable data transfer, Connection oriented transport (TCP), Congestion control.
Introduction and transport layer services, Multiplexing and Demultiplexing, Connection less transport (UDP), Principles of reliable data transfer, Connection oriented transport (TCP), Congestion control.
Introduction and transport layer services, Multiplexing and Demultiplexing, Connection less transport (UDP), Principles of reliable data transfer, Connection oriented transport (TCP), Congestion control.
IV B.Tech I Sem CSE&IT JNTUK R10 regulation students have Mobile computing paper. This slides especially contains UNIT - 5 total material required for end exams
Various types of Antennas and their working
Isotropic Antenna and SWR measurement
Block Diagram of Transmitter using AM and FM
Block Diagram of Receiver using AM and FM
Real Time Systems – Issues in Real Time Computing – Structure of a real time system – Process – Task – Threads.
Classification of Tasks – Task Periodicity – Periodic Tasks- Sporadic Tasks – Aperiodic Tasks – Task Scheduling –
Classification of Scheduling Algorithms – Event Driven Scheduling – Rate monotonic scheduling – Earliest deadline first scheduling.
Inter Process Communication:- Shared data problem, Use of Semaphore(s), Priority Inversion Problem and Deadlock Situations -
Introduction to Reliability Evaluation Techniques –
Reliability Models for Hardware Redundancy –
Permanent faults only - Transient faults.
Introduction to clock synchronization –
A Non-Fault-Tolerant Synchronization Algorithm –
Fault-Tolerant Synchronization in Hardware –
Completely connected zero propagation time system –
Sparse interconnection zero propagation time system –
Fault tolerant analysis with Signal Propagation delays.
Sources of Power Dissipation
Dynamic Power Dissipation
Static Power Dissipation
Power Reduction Techniques
Algorithmic Power Minimization
Architectural Power Minimization
Logic and Circuit Level Power Minimization
Control Logic Power Minimization
System Level Power Management.
Public switched Telephone networks – Switching system principles–PABX switching– ISDN, Cellular mobile communication systems – GSM, GPRS, DECT, UMTS, IMT2000, Limited range Cordless Phones and Facsimile, Wifi and Bluetooth.
Home Appliances: Basic principle and block diagram of microwave oven; washing machine hardware and software, components of air conditioning and refrigeration systems, Proximity Sensors and accelerometer sensors in home appliances.
Television Standards and systems: Components of a TV system –interlacing – composite video signal. Colour TV – Luminance and Chrominance signal; Monochrome and Colour Picture Tubes – Colour TV systems–NTSC, PAL, SECAM-Components of a Remote Control and TV camera tubes, HDTV, LED and LCD TVs, DTH TV.
More from Sri Manakula Vinayagar Engineering College (20)
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...NelTorrente
In this research, it concludes that while the readiness of teachers in Caloocan City to implement the MATATAG Curriculum is generally positive, targeted efforts in professional development, resource distribution, support networks, and comprehensive preparation can address the existing gaps and ensure successful curriculum implementation.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Delivering Micro-Credentials in Technical and Vocational Education and TrainingAG2 Design
Explore how micro-credentials are transforming Technical and Vocational Education and Training (TVET) with this comprehensive slide deck. Discover what micro-credentials are, their importance in TVET, the advantages they offer, and the insights from industry experts. Additionally, learn about the top software applications available for creating and managing micro-credentials. This presentation also includes valuable resources and a discussion on the future of these specialised certifications.
For more detailed information on delivering micro-credentials in TVET, visit this https://tvettrainer.com/delivering-micro-credentials-in-tvet/
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
2. Introduction
• The transport layer is a 4th layer from the top.
• The main role of the transport layer is to provides a logical
communication between application processes running on different
hosts.
• Although the application processes on different hosts are not
physically connected, application processes use the logical
communication provided by the transport layer to send the
messages to each other.
• The transport layer protocols are implemented in the end systems
but not in the network routers.
3. Cont..
• A computer network provides more than one protocol to the
network applications. For example, TCP and UDP are two transport
layer protocols that provide a different set of services to the
network layer.
• All transport layer protocols provide multiplexing/demultiplexing
service. It also provides other services such as reliable data transfer,
bandwidth guarantees, and delay guarantees.
• Each of the applications in the application layer has the ability to
send a message by using TCP or UDP. Both TCP and UDP will then
communicate with the internet protocol in the internet layer. The
applications can read and write to the transport layer.
4. The transport layer is an end-to-end layer – this means that
nodes within the subnet do not participate in transport layer
protocols – only the end hosts.
As with other layers, transport layer protocols send data as a
sequence of packets (segments).
Cont..
5. OSI Transport Layer
Connection control
User application 1 ...
Encryption/
decryption
compression/
expansion
Choice of
syntax
Session
control
Session to transport
mapping
Session
management
Session
synch.
Layer and flow
control
Error
recovery
Multiplexing
Routing Addressing
Error
control
Flow
control
Data link
establishment
Synch Framing
Access to transm.
media
Physical and electrical
interface
Activation/ deactivation
of con.
Application layer
Presentation layer
Session layer
Transport layer
Network layer
Link layer
Physical layer
8. Services provided by the Transport Layer
• The services provided by the transport layer are similar to those of
the data link layer.
• The data link layer provides the services within a single network
while the transport layer provides the services across an
internetwork made up of many networks.
• The data link layer controls the physical layer while the transport
layer controls all the lower layers.
• The services provided by the transport layer protocols can be
divided into five categories:
1. End-to-end delivery
2. Addressing
3. Reliable delivery
4. Flow control
5. Multiplexing
9.
10. 1. End-to-end delivery
• The transport layer transmits the entire message
to the destination.
• Therefore, it ensures the end-to-end delivery of an
entire message from a source to the destination
via different routers.
11. 2. Addressing
• According to the layered model, the transport layer interacts with
the functions of the session layer.
• Many protocols combine session, presentation, and application layer
protocols into a single layer known as the application layer.
• In these cases, delivery to the session layer means the delivery to
the application layer. Data generated by an application on one
machine must be transmitted to the correct application on another
machine. In this case, addressing is provided by the transport layer.
• The transport layer provides the user address which is specified as a
station or port. The port variable represents a particular TS user of a
specified station known as a Transport Service access point (TSAP).
Each station has only one transport entity.
12. The transport layer protocols need to know which upper-layer
protocols are communicating.
13. 3. Reliable delivery
• The transport layer provides reliability services by
retransmitting the lost and damaged packets.
• The reliable delivery has four aspects:
i. Error control
ii. Sequence control
iii. Loss control
iv. Duplication control
14.
15. i. Error Control
• The primary role of reliability is Error Control. In reality, no
transmission will be 100 percent error-free delivery. Therefore,
transport layer protocols are designed to provide error-free
transmission.
• The data link layer also provides the error handling mechanism, but it
ensures only node-to-node error-free delivery. However, node-to-
node reliability does not ensure the end-to-end reliability.
• The data link layer checks for the error between each network. If an
error is introduced inside one of the routers, then this error will not
be caught by the data link layer. It only detects those errors that have
been introduced between the beginning and end of the link.
Therefore, the transport layer performs the checking for the errors
end-to-end to ensure that the packet has arrived correctly.
16.
17. • The second aspect of the reliability is sequence control which is
implemented at the transport layer.
• On the sending end, the transport layer is responsible for ensuring
that the packets received from the upper layers can be used by the
lower layers.
• On the receiving end, it ensures that the various segments of a
transmission can be correctly reassembled.
ii. Sequence Control
18. • Loss Control is a third aspect of reliability.
• The transport layer ensures that all the fragments of a transmission
arrive at the destination or not.
• On the sending end, all the fragments of transmission are given
sequence numbers by a transport layer. These sequence numbers
allow the receivers transport layer to identify the missing segment.
iii. Loss Control
19. • Duplication Control is the fourth aspect of reliability.
• The transport layer guarantees that no duplicate data arrive at the
destination.
• Sequence numbers are used to identify the lost packets; similarly, it
allows the receiver to identify and discard duplicate segments.
iv. Duplication Control
20. 4. Flow Control
• Flow control is used to prevent the sender from overwhelming the
receiver.
• If the receiver is overloaded with too much data, then the receiver
discards the packets and asking for the retransmission of packets.
• This increases network congestion and thus, reducing the system
performance.
• The transport layer is responsible for flow control. It uses the sliding
window protocol that makes the data transmission more efficient
as well as it controls the flow of data so that the receiver does not
become overwhelmed. Sliding window protocol is byte oriented
rather than frame oriented.
21. 5. Multiplexing
• The transport layer uses the multiplexing to improve transmission
efficiency.
• Multiplexing can occur in two ways:
– Upward multiplexing
– Downward multiplexing
• Upward multiplexing: Upward multiplexing means multiple
transport layer connections use the same network connection. To
make more cost-effective, the transport layer sends several
transmissions bound for the same destination along the same
path; this is achieved through upward multiplexing.
22. Cont..
• Upward multiplexing: Upward multiplexing means multiple
transport layer connections use the same network connection.
• To make more cost-effective, the transport layer sends several
transmissions bound for the same destination along the same
path; this is achieved through upward multiplexing.
• Downward multiplexing: Downward multiplexing means one
transport layer connection uses the multiple network connections.
• Downward multiplexing allows the transport layer to split a
connection among several paths to improve the throughput. This
type of multiplexing is used when networks have a low or slow
capacity.
23.
24.
25. Congestion Control
• If the transport entities on many machines send too
many packets into the network too quickly, the network
will become congested, with performance degraded as
packets are delayed and lost.
• Congestion occurs at routers, so it is detected at the
network layer.
• The network and transport layers share the responsibility
for handling congestion.
26. Cont..
• However, the most effective way to control congestion is to reduce
the load that the transport layer is placing on the network.
Two layers are the responsible for congestion control:
• Transport layer, controls the offered load [here]
• Network layer, experiences congestion [previous]
– Desirable bandwidth allocation
– Regulating the sending rate
– Wireless issues
27. 1. Desirable Bandwidth Allocation
(a) Good throughput
(b) Delay as a function of offered load
28. Cont..
• Before we describe how to regulate traffic, we must
understand what we are trying to achieve by running a
congestion control algorithm.
• A good BW allocation will deliver good performance and
avoids congestion in the NW,
• it will be fair across competing transport entities, and it
will quickly track changes in traffic demands.
32. 3.Wireless Link
• Wireless networks lose packets all the time due to transmission
errors.
• Congestion control algorithm should observe are losses due to
insufficient bandwidth, not losses due to transmission errors.
• 802.11 uses a stop and- wait protocol to deliver each frame
33. The Internet Transport Protocols:
UDP (User Datagram Protocol)
• Introduction to UDP
• Remote Procedure Call
• Real-Time Transport
35. UDP
• UDP stands for User Datagram Protocol.
• UDP is a simple protocol and it provides non sequenced transport
functionality.
• UDP is a connectionless protocol.
• This type of protocol is used when reliability and security are less
important than speed and size.
• UDP is an end-to-end transport level protocol that adds
transport-level addresses, checksum error control, and length
information to the data from the upper layer.
• The packet produced by the UDP protocol is known as a user
datagram.
36. User Datagram Format
• The user datagram has a 16-byte header which is shown below:
Where,
• Source port address: It defines the address of the application process that has
delivered a message. The source port address is of 16 bits address.
• Destination port address: It defines the address of the application process that
will receive the message. The destination port address is of a 16-bit address.
• Total length: It defines the total length of the user datagram in bytes. It is a 16-
bit field.
• Checksum: The checksum is a 16-bit field which is used in error detection.
37. Disadvantages of UDP protocol
• UDP provides basic functions needed for the end-to-end delivery
of a transmission.
• It does not provide any sequencing or reordering functions and
does not specify the damaged packet when reporting an error.
• UDP can discover that an error has occurred, but it does not
specify which packet has been lost as it does not contain an ID or
sequencing number of a particular data segment.
38. Frame for UDP
• Optional checksum field for extra reliability: checksums
header, data and IP header.
The UDP header.
39. Remote Procedure Call (RPC)
Remote Procedure Call (RPC) is a powerful technique for
constructing distributed, client-server based applications.
The two processes may be on the same system, or they may be on
different systems with a network connecting them.
42. Real-Time Transport Protocol
• Real Time Transport Protocol, is a data transfer protocol designed
specifically to exchange real-time sensitive, audio-visual data on IP-
based networks.
• RTP is often used in Voice-over-IP telephony (VoIP telephony).
• At transport level, Real Time Transport Protocol typically uses
connectionless UDP (User Datagram Protocol).
• RTP allows data to be exchanged in Unicast as well as Multicast
communication.
• In order to handle and meet the necessary Quality of Service
parameters (QoS parameters) during the transfer, RTP partners
with (RTCP).
45. Transport Layer protocols
• The transport layer is represented by two protocols: TCP and
UDP.
• The IP protocol in the network layer delivers a datagram from
a source host to the destination host.
• Nowadays, the operating system supports multiuser and
multiprocessing environments, an executing program is called
a process.
• The transport layer protocols define some connections to
individual ports known as protocol ports.
46. • An IP protocol is a host-to-host protocol used to deliver a
packet from source host to the destination host while
transport layer protocols are port-to-port protocols that work
on the top of the IP protocols to deliver the packet from the
originating port to the IP services, and from IP services to the
destination port.
• Each port is defined by a positive integer address, and it is of
16 bits.
47.
48. UDP
• UDP stands for User Datagram Protocol.
• UDP is a simple protocol and it provides nonsequenced transport
functionality.
• UDP is a connectionless protocol.
• This type of protocol is used when reliability and security are less
important than speed and size.
• UDP is an end-to-end transport level protocol that adds transport-
level addresses, checksum error control, and length information to
the data from the upper layer.
• The packet produced by the UDP protocol is known as a user
datagram.
49. UDP format
Where,
Source port address: It defines the address of the application process that has delivered a
message. The source port address is of 16 bits address.
Destination port address: It defines the address of the application process that will receive
the message. The destination port address is of a 16-bit address.
Total length: It defines the total length of the user datagram in bytes. It is a 16-bit field.
Checksum: The checksum is a 16-bit field which is used in error detection.
50. Disadvantages of UDP protocol
• UDP provides basic functions needed for the end-to-end
delivery of a transmission.
• It does not provide any sequencing or reordering functions
and does not specify the damaged packet when reporting an
error.
• UDP can discover that an error has occurred, but it does not
specify which packet has been lost as it does not contain an ID
or sequencing number of a particular data segment.
51. TCP
• TCP stands for Transmission Control Protocol.
• It provides full transport layer services to applications.
• It is a connection-oriented protocol means the connection
established between both the ends of the transmission. For
creating the connection, TCP generates a virtual circuit between
sender and receiver for the duration of a transmission.
52. Features Of TCP protocol
• Stream data transfer: TCP protocol transfers the data in the form of contiguous
stream of bytes. TCP group the bytes in the form of TCP segments and then
passed it to the IP layer for transmission to the destination. TCP itself segments
the data and forward to the IP.
• Reliability: TCP assigns a sequence number to each byte transmitted and expects
a positive acknowledgement from the receiving TCP. If ACK is not received within
a timeout interval, then the data is retransmitted to the destination.
The receiving TCP uses the sequence number to reassemble the segments if they
arrive out of order or to eliminate the duplicate segments.
• Flow Control: When receiving TCP sends an acknowledgement back to the sender
indicating the number the bytes it can receive without overflowing its internal
buffer. The number of bytes is sent in ACK in the form of the highest sequence
number that it can receive without any problem. This mechanism is also referred
to as a window mechanism.
53. Features Of TCP protocol
• Multiplexing: Multiplexing is a process of accepting the data from different
applications and forwarding to the different applications on different computers.
At the receiving end, the data is forwarded to the correct application. This process
is known as demultiplexing. TCP transmits the packet to the correct application by
using the logical channels known as ports.
• Logical Connections: The combination of sockets, sequence numbers, and
window sizes, is called a logical connection. Each connection is identified by the
pair of sockets used by sending and receiving processes.
• Full Duplex: TCP provides Full Duplex service, i.e., the data flow in both the
directions at the same time. To achieve Full Duplex service, each TCP should have
sending and receiving buffers so that the segments can flow in both the
directions. TCP is a connection-oriented protocol. Suppose the process A wants to
send and receive the data from process B. The following steps occur:
– Establish a connection between two TCPs.
– Data is exchanged in both the directions.
– The Connection is terminated.
55. TCP Segment Format
• Where,
• Source port address: It is used to define the address of the application program in a source
computer. It is a 16-bit field.
• Destination port address: It is used to define the address of the application program in a
destination computer. It is a 16-bit field.
• Sequence number: A stream of data is divided into two or more TCP segments. The 32-bit
sequence number field represents the position of the data in an original data stream.
• Acknowledgement number: A 32-field acknowledgement number acknowledge the data
from other communicating devices. If ACK field is set to 1, then it specifies the sequence
number that the receiver is expecting to receive.
• Header Length (HLEN): It specifies the size of the TCP header in 32-bit words. The minimum
size of the header is 5 words, and the maximum size of the header is 15 words. Therefore,
the maximum size of the TCP header is 60 bytes, and the minimum size of the TCP header is
20 bytes.
• Reserved: It is a six-bit field which is reserved for future use.
• Control bits: Each bit of a control field functions individually and independently. A control bit
defines the use of a segment or serves as a validity check for other fields.
56. There are total six types of flags in
control field:
• URG: The URG field indicates that the data in a segment is urgent.
• ACK: When ACK field is set, then it validates the
acknowledgement number.
• PSH: The PSH field is used to inform the sender that higher
throughput is needed so if possible, data must be pushed with
higher throughput.
• RST: The reset bit is used to reset the TCP connection when there
is any confusion occurs in the sequence numbers.
• SYN: The SYN field is used to synchronize the sequence numbers
in three types of segments: connection request, connection
confirmation ( with the ACK bit set ), and confirmation
acknowledgement.
57. There are total six types of flags in
control field:
• FIN: The FIN field is used to inform the receiving TCP module that
the sender has finished sending data. It is used in connection
termination in three types of segments: termination request,
termination confirmation, and acknowledgement of termination
confirmation.
– Window Size: The window is a 16-bit field that defines the size of the window.
– Checksum: The checksum is a 16-bit field used in error detection.
– Urgent pointer: If URG flag is set to 1, then this 16-bit field is an offset from the
sequence number indicating that it is a last urgent data byte.
– Options and padding: It defines the optional fields that convey the additional
information to the receiver.
58. Differences b/w TCP & UDP
Basis for Comparison TCP UDP
Definition TCP establishes a virtual circuit
before transmitting the data.
UDP transmits the data
directly to the destination
computer without verifying
whether the receiver is ready
to receive or not.
Connection Type It is a Connection-Oriented
protocol
It is a Connectionless protocol
Speed slow high
Reliability It is a reliable protocol. It is an unreliable protocol.
Header size 20 bytes 8 bytes
acknowledgement It waits for the
acknowledgement of data and
has the ability to resend the lost
packets.
It neither takes the
acknowledgement, nor it
retransmits the damaged
frame.