0% found this document useful (0 votes)
18 views6 pages

Transport

Uploaded by

Aye Bihari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
18 views6 pages

Transport

Uploaded by

Aye Bihari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 6
00000000 ‘The IPv4 pseudoheader included in the UDP checksum. UDP Checksum (A checksum to verify that the end to end data has not been corrupted by routers or bridges in the network or by the processing in an end system. The algorithm to compute the checksum is the Standard Internet Checksum algorithm. This allows the receiver to verify that it was the intended destination of the packet, because it covers the IP addresses, port numbers and protocol number, and it verifies that the packet is not truncated or padded, because it covers the size field. Therefore, this protects an application against receiving corrupted payload data in place of, or in addition to, the data that was sent. In the cases where this check is not required, the value of Ox0000 is placed in this field, in which case the data is not checked by the receiver. = Introduction to UDP 1 The Internet protocol suite supports a connectionless transport protocol, UDP (User Datagram Protocol). The UDP header. 32 Bits be Source port Destinanon port UDP length UDP checksum | UDP provides a way for applications to send encapsulated IP datagrams and send them without having to establish a connection. UDP is described in RFC 768. UDP transmits segments consisting of an 8-byte header followed by the payload. The two ports serve to identify the end points within the source and destination machines. When a UDP packet arrives, its payload is handed to the process attached to the destination port. The source port is primarily needed when a reply must be sent back to the source. The UDP length field includes the 8-byte header and the data. UDP - * The User Datagram Protocol (UDP) is a transport layer protocol defined for use with the IP network layer protocol. It is defined by RFC 768 written by John Postel. It provides a best-effort datagram service to an End System (IP host). * The service provided by UDP is an unreliable service that provides no guarantees for delivery and no protection from duplication. The simplicity of UDP reduces the overhead from using the protocol and the services may be adequate in many cases. * UDP provides a minimal, unreliable, best-effort, message-passing transport to applications and upper- layer protocols TCP Timer Management a Retransmission timer: When a segment is sent, a retransmission timer is started. if the segment is acknowledged before the timer expires, the timer is stopped. If, on the other hand, the timer goes off before the acknowledgement comes in, the segment is retransmitted (and the timer started again). Persistence timer is designed to prevent a deadlock situation where, the sender keeps waiting for a window update from the receiver, which is lost. When the persistence timer goes off, the sender transmits a probe to the receiver. The response to the probe gives the window size. Keepalive timer: When a connection has been idle for a long time, the keepalive timer may go off to cause one side to check whether the other side is still there. If it fails to respond, the connection is terminated. The TCP Segment Header TCP segment format 20 060 bytes, =| ——=—— a, Segment = a Source port adidress 16 bits ‘Sequence number Acknowledgment 32 bits a = “iat Urgent pointer 16 bits cn pe b. Header

You might also like