0% found this document useful (0 votes)
28 views40 pages

Transport Layer Functionality and Protocols: Tunis Business School Fall 2018

This document discusses the transport layer and protocols TCP and UDP. It will cover the role of transport layer protocols and services, how TCP provides reliability through mechanisms like segmentation, connection establishment, acknowledgments and windowing. It will also analyze how TCP handles congestion and flow control. Additionally, it will examine the operation of UDP and differences from TCP such as lack of connections and reliability.

Uploaded by

alia triki
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views40 pages

Transport Layer Functionality and Protocols: Tunis Business School Fall 2018

This document discusses the transport layer and protocols TCP and UDP. It will cover the role of transport layer protocols and services, how TCP provides reliability through mechanisms like segmentation, connection establishment, acknowledgments and windowing. It will also analyze how TCP handles congestion and flow control. Additionally, it will examine the operation of UDP and differences from TCP such as lack of connections and reliability.

Uploaded by

alia triki
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 40

Chapter4

Transport Layer Functionality and Protocols

IT 310
Dr-Eng. Manel Abdelkader, Dr-Eng. Abir Touati

Tunis Business School


Fall 2018
1 IT310 - M.Abdelkader, A. Touati 25/01/2019
What will we Learn from chapter 4?

 The role of Transport Layer protocols and


services.

 How to analyze the application and operation


of TCP mechanisms that support:
 reliability
 reassembly and manage data loss

 How to analyze the operation of UDP

2 IT310 - M.Abdelkader, A. Touati 25/01/2019


Transport Layer Role and Services

3 IT310 - M.Abdelkader, A. Touati 25/01/2019


Transport Layer Role and Services

4 IT310 - M.Abdelkader, A. Touati 25/01/2019


Transport Layer Role and Services

5 IT310 - M.Abdelkader, A. Touati 25/01/2019


Transport Layer Role and Services

6 IT310 - M.Abdelkader, A. Touati 25/01/2019


Transport Control Protocol (TCP)

7 IT310 - M.Abdelkader, A. Touati 25/01/2019


TCP Charactersrics

TCP is a transport layer protocol which has the


following main characteristics:

1. Session multiplexing
2. Segmentation
3. Connection-oriented
4. Reliability
5. Flow Control

8 IT310 - M.Abdelkader, A. Touati 25/01/2019


Application and Operation of TCP Mechanisms

9 IT310 - M.Abdelkader, A. Touati 25/01/2019


1. Session multiplexing

10 IT310 - M.Abdelkader, A. Touati 25/01/2019


Port Numbers

F T S D T S R
T E M N F N I
Application P L T S T M P
Layer N P P P
E
T

21 23 25 53 69 161 520 Port


Numbers
TCP UDP
Transport
Layer
11 IT310 - M.Abdelkader, A. Touati 25/01/2019
Ports Distribution
 Three sets of ports are defined by the IANA:

 Well-known ports: 1-1023 are assigned by IANA to


applications that are fundamental to Internet.

 Registered ports: 1024 – 49151 are listed by IANA for


proprietary applications.

 Dynamically assigned ports: 49152- 65535are


dynamically assigned for the duration of a specific
session.

12 IT310 - M.Abdelkader, A. Touati 25/01/2019


Ports in use

13 IT310 - M.Abdelkader, A. Touati 25/01/2019


2. Segmentation

14 IT310 - M.Abdelkader, A. Touati 25/01/2019


3- Connection-Oriented Protocol

 TCP establishes a virtual circuit between the


sending and receiving applications, before starting
sending data.

 Three main phases characterize TCP:

1. Connection Establishment
2. Data Transfer
3. Connection Termination

15 IT310 - M.Abdelkader, A. Touati 25/01/2019


TCP Three-Way Handshake/Open Connection
Host A Host B

Send SYN
1 (seq = 0 ctl = SYN)
SYN Received

16 IT310 - M.Abdelkader, A. Touati 25/01/2019


TCP Three-Way Handshake/Open Connection

Host A Host B

1 Send SYN
(seq = 0 ctl = SYN) SYN Received

2
Send SYN, ACK
(seq = 0 ack = 1
ctl = syn,ack)
SYN Received

17 IT310 - M.Abdelkader, A. Touati 25/01/2019


TCP Three-Way Handshake/Open Connection

Host A Host B

Send SYN
1 (seq = 0 ctl = SYN)
SYN Received

2
Send SYN, ACK
SYN Received (seq = 0 ack = 1
ctl = syn,ack)
3 Established,
(seq = 1 ack = 1
ctl = ack) Send ACK

18 IT310 - M.Abdelkader, A. Touati 25/01/2019


Data Segments Transfer
Sender Receiver
Send 1
Receive 1

Send 2
Receive 2
Send 3
Receive 3
Send 4
Receive 4

19 IT310 - M.Abdelkader, A. Touati 25/01/2019


Session termination

20 IT310 - M.Abdelkader, A. Touati 25/01/2019


4. - Reliability

 TCP reliability has three objectives:

 Recognition and correction of data loss,


 Recognition and correction of duplicate or out-of-order
data,
 Avoidance of congestion in the network

 Acknowledgement is TCP basic mechanism.

21 IT310 - M.Abdelkader, A. Touati 25/01/2019


TCP Simple Acknowledgment
Sender Receiver
Send 1
Receive 1
RTT
Send ACK 2
Receive ACK 2

Send 2
Receive 2
Send ACK 3
Receive ACK 3
Send 3
Receive 3

Receive ACK 4 Send ACK 4

 Window Size = 1
Round Trip Time

 R.T.T: Round Trip Time is the time between


sending data and receiveing acknowledgement.

 If RTT is significant, the overall transmission rate


may slow to an unacceptable level

 A mechanism called windowing increases


network efficiency

23 IT310 - M.Abdelkader, A. Touati 25/01/2019


Flow Control: Windowing

Windowing enables a receiving computer to advertise how much data


it is able to receive before transmitting an acknowledgement.

24 IT310 - M.Abdelkader, A. Touati 25/01/2019


TCP- Flow Control

25 IT310 - M.Abdelkader, A. Touati 25/01/2019


TCP- Flow Control
Sender Window
size =3
Receiver
Window Size = 3
Send 1 Window Size = 3

Window Size = 3
Send 2
Window Size = 3
Send 3
ACK 3 Packet 3 Is
Window Size = 2 Dropped
Window Size = 2
Send 3
Window Size = 2
Send 4
ACK 5
Window Size = 2
TCP – Flow Control

Go-Back-N vs Selective Repeat


27 IT310 - M.Abdelkader, A. Touati 25/01/2019
Key Differences Between Go-Back-N and Selective Repeat
1. Go-Back-N protocol is design to retransmit all the frames that are arrived
after the damaged or a lost frame. On the other hand, Selective Repeat
protocol retransmits only that frame that is damaged or lost.

2. If the error rate is high i.e. more frames are being damaged and then
retransmitting all the frames that arrived after a damaged frame waste the
lots of bandwidth. On the other hand, selective repeat protocol re-transmits
only damaged frame hence, minimum bandwidth is wasted.
3. In Go-Back-N receiver discards all the frames after the damaged frame
hence, it don’t need to store any frames. Selective repeat protocol does not
discard the frames arrived after the damaged frame instead it stores those
frames till the damaged frame arrives successfully and is sorted in a proper
sequence.

4. Generally the Go-Back-N is more is use due to its less complex nature
instead of Selective Repeat protocol.
28 IT310 - M.Abdelkader, A. Touati 25/01/2019
TCP – Congestion and Flow Control

29 IT310 - M.Abdelkader, A. Touati 25/01/2019


TCP – Congestion
 Network congestion may occur when a sender overflows the network with
too many packets. At the time of congestion, the network cannot handle this
traffic properly, which results in a degraded quality of service (QoS). The typical
symptoms of a congestion are: excessive packet delay, packet loss and
retransmission.

 Congestion control ensures that the sender does not overflow the network.
Comparing to the flow control technique where the flow control mechanism
ensures that the source host does not overflow the destination host, congestion
control is more global. It ensures that the capability of the routers along the path
does not become overflowed.

30 IT310 - M.Abdelkader, A. Touati 25/01/2019


TCP- Ordered Data

31 IT310 - M.Abdelkader, A. Touati 25/01/2019


User Datagram Protocol (UDP)

32 IT310 - M.Abdelkader, A. Touati 25/01/2019


UDP Characteristics

 UDP provides applications with access to the


network without overhead of reliability
mechanisms.
 Is a connectionless protocol.
 Provides limited error checking.
 Provides Best-effort delivery.
 Has no-data recovery features.

33 IT310 - M.Abdelkader, A. Touati 25/01/2019


UDP Segment Format

Bit
1 0 Bit 15 Bit 16 Bit 31

Source Port (16) Destination Port (16)


8
Bytes
Length (16) Checksum (16)

• No sequence orData
acknowledgment
(if Any) fields
UDP Protocol

35 IT310 - M.Abdelkader, A. Touati 25/01/2019


UDP Protocol

36 IT310 - M.Abdelkader, A. Touati 25/01/2019


UDP Protocol

37 IT310 - M.Abdelkader, A. Touati 25/01/2019


UDP Protocol

38 IT310 - M.Abdelkader, A. Touati 25/01/2019


Reliable vs Best-Effort Comparison

Reliable Best-Effort

Connection Type Connection-Oriented Connectionless

Protocol TCP UDP

Sequencing Yes No

Uses  E-mail  Voice streaming


 File sharing  Video streaming
 Downloading

39 IT310 - M.Abdelkader, A. Touati 25/01/2019


What did I Learn from chapter 4?

 Explain the role of Transport Layer protocols


and services.

 Analyze the application and operation of TCP


mechanisms that support:
 reliability
 reassembly and manage data loss

 Analyze the operation of UDP

40 IT310 - M.Abdelkader, A. Touati 25/01/2019

You might also like