Itn Module 14 Fol
Itn Module 14 Fol
The actual day/time is your regular lab day/time for that week.
This is not a take home assignment; it is completed in lab on the equipment.
3
Module Objective: Compare the operations of transport layer protocols in supporting end-to-
end communication.
Topic Title Topic Objective
Transportation of Data Explain the purpose of the transport layer in managing the transportation of data
in end-to-end communication.
Reliability and Flow Control Explain how TCP protocol data units are transmitted and acknowledged to
guarantee delivery.
UDP Communication Compare the operations of transport layer protocols in supporting end-to-end
communication.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
14.1 Transportation of Data
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Transportation of Data
Role of the Transport Layer
Discuss the role of the transport
layer.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Transportation of Data
Transport Layer Responsibilities
Discuss the responsibilities of the transport layer.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Transportation of Data
Transport Layer Protocols
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Transportation of Data
Transmission Control Protocol (TCP)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Transportation of Data
User Datagram Protocol (UDP)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Transportation of Data
The Right Transport Layer Protocol for the Right Application
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
14.2 TCP Overview
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
TCP Overview
TCP Features
Discuss the features of TCP
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
TCP Overview
TCP Header
Discuss the information and purpose of common fields in the TCP header
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
TCP Overview
Applications that use TCP
Do these applications need TCP? Is UDP with less overhead sufficient?
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
14.3 UDP Overview
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
UDP Overview
UDP Features
Discuss UDP features
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
UDP Overview
UDP Header
Compare and discuss the fields in the UDP header to the TCP header
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
UDP Overview
Applications that use UDP
Why can some of these applications use UDP instead of TCP?
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
14.4 Port Numbers
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Port Numbers
Multiple Separate Communications
Both protocols use port numbers or port addresses, but for the same reason?
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Port numbers
Socket Pairs
Describe a socket address
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Port Numbers
Port Number & Socket Addresses
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Port Numbers
Port Number Groups
Port Group Number Range Description
•These port numbers are reserved for common or popular services and
applications such as web browsers, email clients, and remote access
Well-known
0 to 1,023 clients.
Ports
•Defined well-known ports for common server applications enables clients
to easily identify the associated service required.
•These port numbers are assigned by IANA to a requesting entity to use
with specific processes or applications.
•These processes are primarily individual applications that a user has
Registered
1,024 to 49,151 chosen to install, rather than common applications that would receive a
Ports
well-known port number.
•For example, Cisco has registered port 1812 for its RADIUS server
authentication process.
•These ports are also known as ephemeral ports.
Private and/or •The client’s OS usually assign port numbers dynamically when a
Dynamic 49,152 to 65,535 connection to a service is initiated.
Ports •The dynamic port is then used to identify the client application during
communication.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Port Numbers
Port Number Groups (Cont.)
Well-Known Port Numbers
Port Number Protocol Application
20 TCP File Transfer Protocol (FTP) - Data
21 TCP File Transfer Protocol (FTP) - Control
22 TCP Secure Shell (SSH)
23 TCP Telnet
25 TCP Simple Mail Transfer Protocol (SMTP)
53 UDP, TCP Domain Name Service (DNS)
67 UDP Dynamic Host Configuration Protocol (DHCP) - Server
68 UDP Dynamic Host Configuration Protocol - Client
69 UDP Trivial File Transfer Protocol (TFTP)
80 TCP Hypertext Transfer Protocol (HTTP)
110 TCP Post Office Protocol version 3 (POP3)
143 TCP Internet Message Access Protocol (IMAP)
161 UDP Simple Network Management Protocol (SNMP)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
443 TCP Hypertext Transfer Protocol Secure (HTTPS)
14.5 TCP Communication
Process
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
TCP Communication Process
TCP Server Processes
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
TCP Communication Process
TCP Session Establishment
TCP is a connection-oriented protocol, describe the 3-way handshake
System A System B
SEQ# = 76 received
ACK# = ?
FLAGS = SYN
Src Port = 53,000
Dst Port = 80
SEQ# = 1492
ACK# = ?
received
FLAGS = SYN/ACK
Src Port = ?
Dst Port = ?
SEQ# = 77
ACK# = ?
FLAGS = ACK
Src Port = ? received
Dst Port = ? © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
TCP Communication Process
TCP Session Establishment
TCP is a connection-oriented protocol, describe the 3-way handshake
System A System B
SEQ# = 14 received
ACK# = ?
FLAGS = SYN
Src Port = 43,638
Dst Port = 25
SEQ# = 88
ACK# = ?
received
FLAGS = SYN/ACK
Src Port = ?
Dst Port = ?
SEQ# = 15
ACK# = ?
FLAGS = ACK
Src Port = ? received
Dst Port = ? © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
TCP Communication Process
Session Termination
TCP is a connection-oriented protocol, describe the session termination process
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
14.6 Reliability and Flow
Control
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Reliability and Flow Control
TCP Reliability- Guaranteed and Ordered Delivery
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Reliability and Flow Control
TCP Reliability- Sequence Numbers and Acknowledgments
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Reliability and Flow Control
TCP Reliability – Data Loss and Retransmission
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Reliability and Flow Control
TCP Reliability – Data Loss and Retransmission (Cont.)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Reliability and Flow Control
TCP Reliability – Data Loss and Retransmission (Cont.)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Reliability and Flow Control
TCP Flow Control – Window Size and Acknowledgments
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Reliability and Flow Control
TCP Flow Control – Congestion Avoidance
When congestion occurs on a
network, it results in packets being
discarded by the overloaded router.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
14.7 UDP Communication
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
UDP Communication
UDP Low Overhead versus Reliability
UDP does not establish a connection. UDP provides low overhead data transport because
it has a small datagram header and no network management traffic.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
UDP Communication
UDP Datagram Reassembly
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
UDP Communication
UDP Server Processes and Requests
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
UDP Communication
UDP Client Processes
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
14.8 Module Practice and Quiz
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
Module Practice and Quiz
What did I learn in this module?
• The transport layer is the link between the application layer and the lower layers that are
responsible for network transmission.
• The transport layer includes TCP and UDP.
• TCP establishes sessions, ensures reliability, provides same-order delivery, and supports flow
control.
• UDP is a simple protocol that provides the basic transport layer functions.
• UDP reconstructs data in the order it is received, lost segments are not resent, no session
establishment, and UPD does not inform the sender of resource availability.
• The TCP and UDP transport layer protocols use port numbers to manage multiple simultaneous
conversations.
• Each application process running on a server is configured to use a port number.
• The port number is either automatically assigned or configured manually by a system administrator.
• For the original message to be understood by the recipient, all the data must be received and the
data in these segments must be reassembled into the original order.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
Module Practice and Quiz
What did I learn in this module (Cont.)?
• Sequence numbers are assigned in the header of each packet.
• Flow control helps maintain the reliability of TCP transmission by adjusting the rate of data
flow between source and destination.
• A source might be transmitting 1,460 bytes of data within each TCP segment. This is the
typical MSS that a destination device can receive.
• The process of the destination sending acknowledgments as it processes bytes received and
the continual adjustment of the source’s send window is known as sliding windows.
• To avoid and control congestion, TCP employs several congestion handling mechanisms.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
INFO-1280
Assigned Reading
50
The actual day/time is your regular lab day/time for that week.
This is not a take home assignment; it is completed in lab on the equipment.
52