SlideShare a Scribd company logo
Transport Layer Interface
(TLI)
Dr.Parminder Singh
Associate Professor
Department of IT
Chandigarh Engineering College, Landran
SOCKET TYPES
• There are three types of Sockets are:
1. Stream Socket
2. Datagram Socket
3. Raw Socket
• After understand the concept of socket and its types then
will be discussing the brief introduction TLI and Its uses.
STREAM SOCKET
• Has worked on Transport Layer and make end to end connection. This socket is a Connection-
oriented service which means that receiver give acknowledgment to the Sender.
• It is full duplex nature which can be transmitted in both directions.
• It is Reliable, which means that error-free data delivery is guaranteed in right order and
without duplication.
• It is Byte stream, no boundaries are imposed on the data. The data being transmitted can be of
virtually unlimited size.
• Flow control, which guarantees that the sender does not send data faster than the network and
the receiver is able to manage.
• The example of Stream Socket is TCP protocol which has used in TCP/IP Protocol Stack
DATAGRAM SOCKET
• Has worked on Transport Layer and make end to end connection. This socket is a
Connection-less service which means that receiver does not give acknowledgment
to the Sender.
• It does not provide Reliability, which means that that data may be duplicated, out
of order, corrupted or never sent.
• No flow control feature, this means user (receiver) has to manage the buffer.
• Messages have a maximum size. If you want to send more data than the amount
you can send in a single datagram, you must send more independent datagrams.
• The example of Datagram Socket is UDP protocol which has used in TCP/IP
Protocol Stack
RAW SOCKET
• This socket has used in Network Layer and support IP and ICMP protocols.
• It provides Connectionless service.
• It doesnot provide any Reliability.
• We send maximum data to remote network using Raw Socket.
• PING is an example of an application that uses raw sockets.
COMPARISON OF DIFFERENT SOCKET
TYPES
Feature
Stream Datagram Raw
Reliable Yes No No
Performance Connection oriented but
overhead there.
Good Best
Data Size Large amount of Data (1500
Bytes)
64 Bytes 65535
Protocol Used TCP UDP IP,ICMP
TRANSPORT INTERFACE
• The transport provider is the entity that provides the services of the Transport
Interface, and the transport user is the entity that requires these services
• The transport user accesses the services of the transport provider by issuing the
appropriate service requests. One example is a request to transfer data over a
connection. Similarly, the transport provider notifies the user of various events,
such as the arrival of data on a connection.
• The Network Services Library includes a set of functions that support the services
of the Transport Interface for user processes.
OVERVIEW OF TLI OR TRANSPORT
LAYER INTERFACE
• TLI or Transport Layer Interface provides an interface to the networking system.
• TLI is media- and protocol-independent
• An Alternative to the socket interface which is defined for System V UNIX
System.
• Transport Layer Interface work like any networking protocol and also supported
kernel.
• It is a subset of the X/Open Transport Interface (XTI), and is implemented within
the STREAMS framework.
• It allows applications to run across any transport protocol that supports the
interface.
TLI FUNCTION
• TLI is an interface (set of functions) that hides the actual stream interface to the
networking system from the user.
• TLI functions support both connection-oriented (TCP) and connectionless
protocols (UDP).
FUNCTIONS OF TLI
We are using three types of functions:
• M_DATA: User data processed through I/O
• M_PROTO: This is a protocol control information that have used to apply on
every layer of TCP/IP protocol. This is basically used to control the bits stream
and provide layer interface.
• M_PCPPROTO: This function is used to figure-out the higher priority protocols.
This is also used for prioritize the messages which means higher priority messages
(like remote messages, TELNET,SSH) always to send first than lower priority
messages (like ordinary messages).
ROLES OF TLI
• Another role TLI is used select the network and mapping of network Name to
address (it converts network naming to address conversion like DNS).
Role of Function Description
getnetpath() It describes the routines that manipulate the NETPATH variable,
allowing you to specify which networks in the netconfig file to try.
netconfig() It describes the network configuration database file.
netdir() describes the Name-to-Address Mapping library functions.
TLI ROUTINES
Routines Description
t_alloc() Allocates Transport Interface data structures
t_error() Prints a Transport Interface error message
t_getstate() Returns the state of a transport endpoint
t_open() Establishes a transport endpoint connected to a chosen transport provider
t_optmgmt() Negotiates protocol-specific options with the transport provider
t_sync() Synchronizes a transport endpoint with the transport provider
t_unbind() Unbinds a transport address from a transport endpoint
t_bind() Binds a transport address to a transport endpoint
t_close() Closes a transport endpoint
TLI SERVICES
The three service types defined by the Transport Interface are as follows:
• T_COTS: The transport provider supports connection-mode service but does not
provide the optional orderly release facility.
• T_COTS_ORD: The transport provider supports connection-mode service with
the optional orderly release facility.
• T_CLTS: The transport provider supports connectionless-mode service. Only one
such service can be associated with the transport provider identified by t_open().
REFERENCES
[1] W. R. Stevens, B. Fenner & A. M. Rudoff, Unix Network Programming, Vol. I, 3rd Ed., Pearson
Education.
[2] W. R. Stevens , Unix Network Programming, Vol. II, 2nd Ed., Pearson Education.
[3] Comer and Stevens, Internetworking with TCP/IP, Vol. I, II and III, PHI.
[4] Christian Benvenuti, Understanding Linux Network Internals, O‘Reilly.
[5] W. R. Stevens , Advanced Programming in Unix Environment, Pearson Education.
[6]Brian “Beej” Hall,"Beej’s Guide to Network Programming Using Internet Sockets",2005.
[7] Xi Liu,"Socket Programming",Computer Networks, Spring 2008.
[8] Dave Hollinger,Socket Programming",Computer Network Systems.
[9] http://retrogeeks.org/sgi_bookshelves/SGI_Developer/books/IRIX_NetPG/sgi_html/ch09.html

More Related Content

What's hot

Presentation on Breadth First Search (BFS)
Presentation on Breadth First Search (BFS)Presentation on Breadth First Search (BFS)
Presentation on Breadth First Search (BFS)
Shuvongkor Barman
 
transport layer
transport layer transport layer
transport layer
usman19
 
Introduction to Tor
Introduction to TorIntroduction to Tor
Introduction to Tor
Jaskaran Narula
 
Security models
Security models Security models
Security models
LJ PROJECTS
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
Vivek Gandhi
 
Communication in client server system.pptx
Communication in client server system.pptxCommunication in client server system.pptx
Communication in client server system.pptx
MSivani
 
Concurrency control
Concurrency control Concurrency control
Concurrency control
Abdelrahman Almassry
 
Major and Minor Elements of Object Model
Major and Minor Elements of Object ModelMajor and Minor Elements of Object Model
Major and Minor Elements of Object Model
sohailsaif
 
IP security and VPN presentation
IP security and VPN presentation IP security and VPN presentation
IP security and VPN presentation
KishoreTs3
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
Aman Jaiswal
 
IP Security
IP SecurityIP Security
IP Security
Keshab Nath
 
Transaction Management - Deadlock Handling
Transaction Management - Deadlock HandlingTransaction Management - Deadlock Handling
Transaction Management - Deadlock Handling
kavitha muneeshwaran
 
Concurrency control
Concurrency controlConcurrency control
Concurrency control
Subhasish Pati
 
Divide and conquer
Divide and conquerDivide and conquer
Divide and conquer
Dr Shashikant Athawale
 
OSI Model
OSI ModelOSI Model
OSI Model
Mukesh Tekwani
 
Internetworking
InternetworkingInternetworking
Internetworking
Raghu nath
 
Database security
Database securityDatabase security
Database security
Software Engineering
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
Melvin Cabatuan
 
Issues in Data Link Layer
Issues in Data Link LayerIssues in Data Link Layer
Issues in Data Link Layer
selvakumar_b1985
 
Classes and Objects
Classes and Objects  Classes and Objects
Classes and Objects
yndaravind
 

What's hot (20)

Presentation on Breadth First Search (BFS)
Presentation on Breadth First Search (BFS)Presentation on Breadth First Search (BFS)
Presentation on Breadth First Search (BFS)
 
transport layer
transport layer transport layer
transport layer
 
Introduction to Tor
Introduction to TorIntroduction to Tor
Introduction to Tor
 
Security models
Security models Security models
Security models
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Communication in client server system.pptx
Communication in client server system.pptxCommunication in client server system.pptx
Communication in client server system.pptx
 
Concurrency control
Concurrency control Concurrency control
Concurrency control
 
Major and Minor Elements of Object Model
Major and Minor Elements of Object ModelMajor and Minor Elements of Object Model
Major and Minor Elements of Object Model
 
IP security and VPN presentation
IP security and VPN presentation IP security and VPN presentation
IP security and VPN presentation
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
IP Security
IP SecurityIP Security
IP Security
 
Transaction Management - Deadlock Handling
Transaction Management - Deadlock HandlingTransaction Management - Deadlock Handling
Transaction Management - Deadlock Handling
 
Concurrency control
Concurrency controlConcurrency control
Concurrency control
 
Divide and conquer
Divide and conquerDivide and conquer
Divide and conquer
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Database security
Database securityDatabase security
Database security
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Issues in Data Link Layer
Issues in Data Link LayerIssues in Data Link Layer
Issues in Data Link Layer
 
Classes and Objects
Classes and Objects  Classes and Objects
Classes and Objects
 

Similar to Transport layer interface

Mobile computing unit-5
Mobile computing unit-5Mobile computing unit-5
Mobile computing unit-5
Ramesh Babu
 
Cn
CnCn
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network Fundamental
Karthikeyan Dhayalan
 
Unit 5.Transport Layer.pptx
Unit 5.Transport Layer.pptxUnit 5.Transport Layer.pptx
Unit 5.Transport Layer.pptx
1136NayanSonawane
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
AnaniaKapala
 
Transport layer
Transport layer Transport layer
Transport layer
Mukesh Chinta
 
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & AnomaliesREMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
Rhydham Joshi
 
Transport layer.pptx
Transport layer.pptxTransport layer.pptx
Transport layer.pptx
MohammedAnas871930
 
Week10 transport
Week10 transportWeek10 transport
Week10 transport
kapilpahwabnb
 
Lecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptxLecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptx
Ronoh Kennedy
 
TCP Vs UDP
TCP Vs UDP TCP Vs UDP
TCP Vs UDP
Ahmed Elnaggar
 
Introduction to TCP IP.pptx
Introduction to TCP IP.pptxIntroduction to TCP IP.pptx
Introduction to TCP IP.pptx
seyioginni
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
N.Jagadish Kumar
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunications
AnyapuPranav
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
Mukesh Tekwani
 
TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP Protocols
Danial Mirza
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdf
mashiur
 
Transport layer
Transport layerTransport layer
cns-unit-4-onlinenotepad.io.pdf
cns-unit-4-onlinenotepad.io.pdfcns-unit-4-onlinenotepad.io.pdf
cns-unit-4-onlinenotepad.io.pdf
ssuser37a73f
 
DLL Protocol.pptx
DLL Protocol.pptxDLL Protocol.pptx
DLL Protocol.pptx
ubaidullah75790
 

Similar to Transport layer interface (20)

Mobile computing unit-5
Mobile computing unit-5Mobile computing unit-5
Mobile computing unit-5
 
Cn
CnCn
Cn
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network Fundamental
 
Unit 5.Transport Layer.pptx
Unit 5.Transport Layer.pptxUnit 5.Transport Layer.pptx
Unit 5.Transport Layer.pptx
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
 
Transport layer
Transport layer Transport layer
Transport layer
 
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & AnomaliesREMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
 
Transport layer.pptx
Transport layer.pptxTransport layer.pptx
Transport layer.pptx
 
Week10 transport
Week10 transportWeek10 transport
Week10 transport
 
Lecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptxLecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptx
 
TCP Vs UDP
TCP Vs UDP TCP Vs UDP
TCP Vs UDP
 
Introduction to TCP IP.pptx
Introduction to TCP IP.pptxIntroduction to TCP IP.pptx
Introduction to TCP IP.pptx
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunications
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP Protocols
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdf
 
Transport layer
Transport layerTransport layer
Transport layer
 
cns-unit-4-onlinenotepad.io.pdf
cns-unit-4-onlinenotepad.io.pdfcns-unit-4-onlinenotepad.io.pdf
cns-unit-4-onlinenotepad.io.pdf
 
DLL Protocol.pptx
DLL Protocol.pptxDLL Protocol.pptx
DLL Protocol.pptx
 

Recently uploaded

An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
IJECEIAES
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
AjmalKhan50578
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
bijceesjournal
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
integral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdfintegral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdf
gaafergoudaay7aga
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 

Recently uploaded (20)

An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
integral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdfintegral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdf
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 

Transport layer interface

  • 1. Transport Layer Interface (TLI) Dr.Parminder Singh Associate Professor Department of IT Chandigarh Engineering College, Landran
  • 2. SOCKET TYPES • There are three types of Sockets are: 1. Stream Socket 2. Datagram Socket 3. Raw Socket • After understand the concept of socket and its types then will be discussing the brief introduction TLI and Its uses.
  • 3. STREAM SOCKET • Has worked on Transport Layer and make end to end connection. This socket is a Connection- oriented service which means that receiver give acknowledgment to the Sender. • It is full duplex nature which can be transmitted in both directions. • It is Reliable, which means that error-free data delivery is guaranteed in right order and without duplication. • It is Byte stream, no boundaries are imposed on the data. The data being transmitted can be of virtually unlimited size. • Flow control, which guarantees that the sender does not send data faster than the network and the receiver is able to manage. • The example of Stream Socket is TCP protocol which has used in TCP/IP Protocol Stack
  • 4. DATAGRAM SOCKET • Has worked on Transport Layer and make end to end connection. This socket is a Connection-less service which means that receiver does not give acknowledgment to the Sender. • It does not provide Reliability, which means that that data may be duplicated, out of order, corrupted or never sent. • No flow control feature, this means user (receiver) has to manage the buffer. • Messages have a maximum size. If you want to send more data than the amount you can send in a single datagram, you must send more independent datagrams. • The example of Datagram Socket is UDP protocol which has used in TCP/IP Protocol Stack
  • 5. RAW SOCKET • This socket has used in Network Layer and support IP and ICMP protocols. • It provides Connectionless service. • It doesnot provide any Reliability. • We send maximum data to remote network using Raw Socket. • PING is an example of an application that uses raw sockets.
  • 6. COMPARISON OF DIFFERENT SOCKET TYPES Feature Stream Datagram Raw Reliable Yes No No Performance Connection oriented but overhead there. Good Best Data Size Large amount of Data (1500 Bytes) 64 Bytes 65535 Protocol Used TCP UDP IP,ICMP
  • 7. TRANSPORT INTERFACE • The transport provider is the entity that provides the services of the Transport Interface, and the transport user is the entity that requires these services • The transport user accesses the services of the transport provider by issuing the appropriate service requests. One example is a request to transfer data over a connection. Similarly, the transport provider notifies the user of various events, such as the arrival of data on a connection. • The Network Services Library includes a set of functions that support the services of the Transport Interface for user processes.
  • 8. OVERVIEW OF TLI OR TRANSPORT LAYER INTERFACE • TLI or Transport Layer Interface provides an interface to the networking system. • TLI is media- and protocol-independent • An Alternative to the socket interface which is defined for System V UNIX System. • Transport Layer Interface work like any networking protocol and also supported kernel. • It is a subset of the X/Open Transport Interface (XTI), and is implemented within the STREAMS framework. • It allows applications to run across any transport protocol that supports the interface.
  • 9. TLI FUNCTION • TLI is an interface (set of functions) that hides the actual stream interface to the networking system from the user. • TLI functions support both connection-oriented (TCP) and connectionless protocols (UDP).
  • 10. FUNCTIONS OF TLI We are using three types of functions: • M_DATA: User data processed through I/O • M_PROTO: This is a protocol control information that have used to apply on every layer of TCP/IP protocol. This is basically used to control the bits stream and provide layer interface. • M_PCPPROTO: This function is used to figure-out the higher priority protocols. This is also used for prioritize the messages which means higher priority messages (like remote messages, TELNET,SSH) always to send first than lower priority messages (like ordinary messages).
  • 11. ROLES OF TLI • Another role TLI is used select the network and mapping of network Name to address (it converts network naming to address conversion like DNS). Role of Function Description getnetpath() It describes the routines that manipulate the NETPATH variable, allowing you to specify which networks in the netconfig file to try. netconfig() It describes the network configuration database file. netdir() describes the Name-to-Address Mapping library functions.
  • 12. TLI ROUTINES Routines Description t_alloc() Allocates Transport Interface data structures t_error() Prints a Transport Interface error message t_getstate() Returns the state of a transport endpoint t_open() Establishes a transport endpoint connected to a chosen transport provider t_optmgmt() Negotiates protocol-specific options with the transport provider t_sync() Synchronizes a transport endpoint with the transport provider t_unbind() Unbinds a transport address from a transport endpoint t_bind() Binds a transport address to a transport endpoint t_close() Closes a transport endpoint
  • 13. TLI SERVICES The three service types defined by the Transport Interface are as follows: • T_COTS: The transport provider supports connection-mode service but does not provide the optional orderly release facility. • T_COTS_ORD: The transport provider supports connection-mode service with the optional orderly release facility. • T_CLTS: The transport provider supports connectionless-mode service. Only one such service can be associated with the transport provider identified by t_open().
  • 14. REFERENCES [1] W. R. Stevens, B. Fenner & A. M. Rudoff, Unix Network Programming, Vol. I, 3rd Ed., Pearson Education. [2] W. R. Stevens , Unix Network Programming, Vol. II, 2nd Ed., Pearson Education. [3] Comer and Stevens, Internetworking with TCP/IP, Vol. I, II and III, PHI. [4] Christian Benvenuti, Understanding Linux Network Internals, O‘Reilly. [5] W. R. Stevens , Advanced Programming in Unix Environment, Pearson Education. [6]Brian “Beej” Hall,"Beej’s Guide to Network Programming Using Internet Sockets",2005. [7] Xi Liu,"Socket Programming",Computer Networks, Spring 2008. [8] Dave Hollinger,Socket Programming",Computer Network Systems. [9] http://retrogeeks.org/sgi_bookshelves/SGI_Developer/books/IRIX_NetPG/sgi_html/ch09.html