Week8 - Lecture2 Chapter - 3
Week8 - Lecture2 Chapter - 3
Week8_Lecture2 (Chapter3)
Transport Layer
log
ica
le
transport protocols actions in end
n d-
systems:
e nd
local or
tra
• sender: breaks application messages regional ISP
nsp
into segments, passes to network layer
ort
home network content
• receiver: reassembles segments into provider
network
messages, passes to application layer application
transport
datacenter
network
network
Sender:
application is passed an application- app. msg
application
layer message
transport
determines segment TTh htransport
app. msg
header fields values
network (IP)
creates segment network (IP)
link
passes segment to IP link
physical physical
Receiver:
application receives segment from IP application
checks header values
app. msg
transport extracts application-layer transport
message
network (IP) demultiplexes message up network (IP)
physical physical
Th app. msg
log
• congestion control
ica
le
• flow control
n d-
e nd
• connection setup local or
tra
regional ISP
UDP: User Datagram Protocol
nsp
ort
home network
• unreliable, unordered delivery content
provider
network
• no-frills extension of “best-effort” IP application
transport
datacenter
network
network
transport
Hn Ht HTTP msg
transport
application
application application
transport transport
(UDP) (UDP)
link link
physical physical
network (IP)
creates UDP segment network (IP)
link
passes segment to IP link
physical physical
network
UDP h SNMP(IP)
msg message network (IP)
demultiplexes message up
link to application via socket link
physical physical
data to/from
UDP segment format application layer
Transmitted: 5 6 11
Received: 4 6 11
receiver-computed
checksum
= sender-computed
checksum (as received)
sum 1011101110111100
Checksum 0100010001000011
1 complement of sum
Note: when adding numbers, a carryout from the most significant bit needs to be
added to the result
Check the correctness: add the check sum value with the sum of two integers. If
the result is 1 for all bits then accept otherwise reject it.
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1: Accept otherwise Reject Transport Layer: 3-34
Internet checksum: weak protection!
example: add two 16-bit integers
01
1110011001100110 10
1101010101010101
wraparound 11011101110111011 Even though
numbers have
sum 1011101110111100 changed (bit
flips), no change
checksum 0100010001000011 in checksum!
All material copyright 1996-2020 J.F Kurose and K.W. Ross, All Rights Reserved Transport Layer: 3-150
These slides are freely provided by the book authors and it represents a lot of work on their part. We would like to thank J.F Kurose and K.W. Ross.