Message Transport With The User Datagram Protocol

Size: px
Start display at page:

Download "Message Transport With The User Datagram Protocol"

Transcription

1 Message Transport With The User Datagram Protocol

2 User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

3 UDP Characteristics En-to-en Connectionless communication Message-oriente interface Best-effort semantics Arbitrary interaction Operating system inepenence No congestion or flow control Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

4 En-To-En Communication UDP provies communication among applications Sening UDP Accepts outgoing message from application Places message in a User Datagram Encapsulates User Datagram in an IP atagram an sens Receiving UDP Accepts incoming User Datagram from IP Extracts message an elivers to receiving application Note: message is unchange by the network Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

5 Connectionless Communication An application using UDP can Sen a message to any receiver (universal) Sen at any time (asynchronous) Stop sening at any time (unterminate) That is, a sener oes not Inform the network before sening (ie, oes not establish a communication channel) Inform the other enpoint before sening Inform the network or other enpoint that no more messages will be sent Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

6 Message-Oriente Interface UDP Accepts an elivers messages (blocks of ata) Does not require all messages to be the same size, but oes efine a maximum message size Places each outgoing User Datagram in a single IP atagram for transmission Always elivers a complete message to receiving application Sening application must ivie outgoing ata into messages; UDP sens what it is given (or reports an error if the message is too large) Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

7 UDP Message Size UDP allows up to 64K octet messages As a practical limit, the size of a User Datagram is limite by payloa area in IP atagram Maximum IP payloa is 64K octets minus size of IP heaer Therefore, the maximum UDP payloa is 64K octets minus size of IP an UDP heaers (usually 64K octets minus 28) Application can choose any message size up to the maximum UDP payloa Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

8 Large An Small Messages What happens if an application sens a 10K octet message? Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

9 Large An Small Messages What happens if an application sens a 10K octet message? The message fits into an IP atagram, but Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

10 Large An Small Messages What happens if an application sens a 10K octet message? The message fits into an IP atagram, but network frames have a smaller MTU (typically 1500 octets) Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

11 Large An Small Messages What happens if an application sens a 10K octet message? The message fits into an IP atagram, but network frames have a smaller MTU (typically 1500 octets) So, the result of sening a large message is Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

12 Large An Small Messages What happens if an application sens a 10K octet message? The message fits into an IP atagram, but network frames have a smaller MTU (typically 1500 octets) So, the result of sening a large message is IP Fragmentation! Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

13 Large An Small Messages What happens if an application sens a 10K octet message? The message fits into an IP atagram, but network frames have a smaller MTU (typically 1500 octets) So, the result of sening a large message is IP Fragmentation! What happens if an application chooses a small message size, such as 20 octets? Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

14 Large An Small Messages What happens if an application sens a 10K octet message? The message fits into an IP atagram, but network frames have a smaller MTU (typically 1500 octets) So, the result of sening a large message is IP Fragmentation! What happens if an application chooses a small message size, such as 20 octets? Inefficiency! Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

15 Choosing An Optimal Message Size Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

16 Choosing An Optimal Message Size What size messages shoul an application sen? Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

17 Choosing An Optimal Message Size What size messages shoul an application sen? Optimal UDP message size is S = M H M is the path MTU (ie, minimum MTU on the path) H is the size of IP an UDP heaers Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

18 Choosing An Optimal Message Size What size messages shoul an application sen? Optimal UDP message size is S = M H M is the path MTU (ie, minimum MTU on the path) H is the size of IP an UDP heaers Fining M requires an application to Violate layering an obtain forwaring information from IP Note: for IPv4, only the local MTU is known Bottom line: it may be ifficult/ impossible for an application to compute S Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

19 UDP Semantics UDP uses IP for elivery Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

20 UDP Semantics UDP uses IP for elivery an offers the same semantics! Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

21 UDP Semantics UDP uses IP for elivery an offers the same semantics! UDP packet can be Lost Duplicate Delaye Delivere out of orer Delivere with ata bits altere Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

22 UDP Semantics UDP uses IP for elivery an offers the same semantics! UDP packet can be Lost Duplicate Delaye Delivere out of orer Delivere with ata bits altere Note 1: UDP oes not introuce such errors; the errors arise from the unerlying networks Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

23 UDP Semantics UDP uses IP for elivery an offers the same semantics! UDP packet can be Lost Duplicate Delaye Delivere out of orer Delivere with ata bits altere Note 1: UDP oes not introuce such errors; the errors arise from the unerlying networks Note 2: UDP oes inclue an optional checksum to protect the ata (but the checksum may be isable) Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

24 Using Best-Effort Semantics Questions Do best-effort semantics make any sense for applications? Why woul a programmer choose UDP? Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

25 Using Best-Effort Semantics Questions Do best-effort semantics make any sense for applications? Why woul a programmer choose UDP? Answers Retransmitting a lost message oes not make sense for real-time auio an vieo applications because a retransmitte packet arrives too late to be use Aitional real-time protocols can be ae to UDP to hanle out-of-orer elivery (we will cover later in the course) Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

26 Arbitrary Interaction UDP permits arbitrary interaction among applications 1-to-1 1-to-many Many-to-1 Many-to-many Application programmer chooses interaction type Ability to sen a single message to multiple recipients can be valuable Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

27 Efficient Implementation Of Interaction Key point: UDP can use IP broacast or multicast to eliver messages Provies efficient elivery to a set of hosts Example: UDP packet sent to IPv4 estination aress is elivere to all hosts on the local network (IPv6 has an all noes multicast aress) No nee for sener to transmit iniviual copies Allows application to fin a server without knowing the computer on which the server runs Broacast is a significant avantage of UDP over TCP for some applications Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

28 Operating System Inepenence Goal is to allow applications on heterogeneous computers to interact Must avoi OS-specific ientifiers, such as Process IDs Task names Instea, create application ientifiers that are not erive from any OS Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

29 UDP Application Ientifiers 16-bit integer known as UDP protocol port number Each application using UDP must obtain a port number Sening UDP Places a port number in UDP heaer to ientify estination application on receiving host Also inclues port number of sening application Receiving UDP Uses value in heaer to select appropriate application UDP protocol port numbers are universal across all computers, an o not epen on the operating system Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

30 Ientifying An Application Both sening an receiving applications nee a port number Assignment of port numbers epens on the type of application Application that offers a stanarize service (server) Uses a well-known port number for the service Value is less than 1024 Example: TFTP service uses UDP port 69 Other applications (client) Request a port number from the local operating system Value is greater than Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

31 Steps Taken To Contact A Service Request an unuse local port number from the local operating system Obtain the IP aress of the local computer from the operating system Look up the port number of the service to be contacte Obtain the omain name of a computer that runs the service an map to an IP aress Form a UDP atagram with a source port fiel set to the local port number an the estination port fiel set to the port number of the service Request that the UDP atagram be encapsulate in an IP atagram an sent using the source an estination IP aresses obtaine above Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

32 Examples Of Well-Known UDP Ports Port Number Description 0 Reserve (never assigne) 7 Echo 9 Discar 11 Active Users 13 Daytime 15 Network Status Program 17 Quote of the Day 19 Character Generator 37 Time 42 Host Name Server 43 Who Is 53 Domain Name Server 67 BOOTP or DHCP Server 68 BOOTP or DHCP Client 69 Trivial File Transfer 88 Kerberos Security Service 111 Sun Remote Proceure Call 123 Network Time Protocol 161 Simple Network Management Protocol 162 SNMP Traps 514 System Log Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

33 UDP Datagram Format Extremely thin layer User Datagram is ivie into heaer an payloa Heaer contains only 8 octets: UDP SOURCE PORT UDP DESTINATION PORT UDP MESSAGE LENGTH UDP CHECKSUM PAYLOAD (MESSAGE DATA) Question: why is length neee? Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

34 UDP Checksum Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

35 UDP Checksum 16-bit 1s-complement checksum Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

36 UDP Checksum 16-bit 1s-complement checksum Covers entire UDP packet, incluing ata (recall: IP oes not checksum the payloa) Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

37 UDP Checksum 16-bit 1s-complement checksum Covers entire UDP packet, incluing ata (recall: IP oes not checksum the payloa) Is optional: value of zero means sener i not compute a checksum Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

38 UDP Checksum 16-bit 1s-complement checksum Covers entire UDP packet, incluing ata (recall: IP oes not checksum the payloa) Is optional: value of zero means sener i not compute a checksum Inclues extra pseuo heaer that contains IP aresses Example of IPv4 pseuo heaer: IP SOURCE ADDRESS IP DESTINATION ADDRESS ZERO PROTO UDP LENGTH Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

39 Purpose Of A Pseuo Heaer Receiver can verify that message arrive at correct computer as well as correct application on that computer Consequence for NAT: if it changes the IP source or estination aress, NAT must recompute UDP checksum Note: pseuo heaers provie another example of layering violations Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

40 UDP Encapsulation User Datagram travels in IP atagram Two levels of encapsulation occur UDP Hr UDP Payloa IP Heaer IP Payloa Frame Heaer Frame Payloa Note: the message the application places in the UDP Payloa fiel may also have heaer an payloa fiels Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

41 Transmission Control Protocol (Stream Transport)

42 Transmission Control Protocol (TCP) The primary transport-layer protocol use in the Internet Accounts for about 90% of all Internet traffic (some estimates are higher) Provies reliability Appeals to programmers Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

43 TCP Characteristics En-to-en communication Connection-oriente paraigm Point-to-point connections Complete reliability Full-uplex communication Stream interface Reliable connection startup Graceful connection shutown Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

44 En-To-En Communication TCP provies communication among pairs of applications Allows an application on one host to communicate with an application on another host Permits multiple applications on a given computer to communicate simultaneously without interference Uses protocol port numbers to istinguish among applications Note: TCP ports are completely inepenent of UDP ports Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

45 En-To-En Principle An Transport Protocols Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

46 En-To-En Principle An Transport Protocols Transport protocols operate in en systems, an view the unerlying Internet as a virtual network Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

47 En-To-En Principle An Transport Protocols Transport protocols operate in en systems, an view the unerlying Internet as a virtual network Host A appl TCP IP net iface communication system as viewe by TCP router IP The Internet net iface net 1 net 2 Host B appl TCP IP net iface Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

48 En-To-En Principle An Transport Protocols Transport protocols operate in en systems, an view the unerlying Internet as a virtual network Host A appl TCP IP net iface communication system as viewe by TCP router IP net iface net 1 net 2 Host B appl TCP IP net iface IP oes not rea or interpret TCP packets Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

49 En-To-En Principle An Transport Protocols Transport protocols operate in en systems, an view the unerlying Internet as a virtual network Host A appl TCP IP net iface communication system as viewe by TCP router IP net iface net 1 net 2 Host B appl TCP IP net iface IP oes not rea or interpret TCP packets When forwaring atagrams, router only processes layers 1 through 3 Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

50 TCP Protocol Port Numbers 16-bit integers use to ientify applications Each application nees a port number TCP well-known port assignments are inepenent of UDP assignments However, to help humans, the same value chosen if service available via either transport Examples Both UDP an TCP assign port 53 to the Domain Name System (DNS) Both UDP an TCP assign port 7 to the echo service Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

51 Protocol Ports, The Four-Tuple, An Flows Key concept: because a TCP connection correspons to a pair of enpoints, the connection is ientifie by four items IP source aress TCP source port IP estination aress TCP estination port Commonly calle the four-tuple Explains how an application such as a web server can communicate with multiple clients at the same time Interestingly, more than four values must be extracte from a frame to ientify a TCP flow Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

52 TCP s Connection-Oriente Paraigm Analogous to a telephone call Pair of applications must Establish a TCP connection before communicating Terminate the connection when finishe Important insights A TCP connection is virtual because only the two enpoints know a connection is in place TCP oes not have keep-alive messages: no packets are exchange unless applications are sening ata Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

53 Limite Interaction A TCP connection only provies communication between a pair of applications Known as a point-to-point communication TCP connection oes not support Reception from an arbitrary set seners Multi-point connections with more than two enpoints Broacast or multicast elivery Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

54 The TCP Reliability Guarantee TCP provies full reliability Compensates for Loss Duplication Delivery out of orer Does so without overloaing the unerlying networks an routers TCP makes the following guarantee Data will be elivere or sener will (eventually) be notifie Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

55 TCP Reliability Uses timeout-an-retransmission Receiver returns an acknowlegement (ACK) to sener when ata arrives Sener waits for acknowlegement an retransmits ata if no acknowlegement arrives Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

56 Illustration Of TCP Retransmission Events at Host 1 Events at Host 2 sen message 1 receive ack 1 sen message 2 receive ack 2 sen message 3 receive message 1 sen ack 1 receive message 2 sen ack 2 retransmission timer expires retransmit message 3 packet lost receive message 3 sen ack 3 Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

57 Why TCP Retransmission Is Har TCP esigne for Internet Roun-trip elays iffer among connections Roun-trip elays vary over time Waiting too long introuces unnecessary elay Not waiting long enough sens unnecessary copies Key to TCP s success: aaptive retransmission Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

58 How Ba Is The Internet? In the ol ays: elays in secons, high variability Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

59 How Ba Is The Internet? In the ol ays: elays in secons, high variability Now: Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

60 How Ba Is The Internet? In the ol ays: elays in secons, high variability Now: elays in secons, high variability Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

61 How Ba Is The Internet? In the ol ays: elays in secons, high variability Now: elays in secons, high variability Example roun-trip measurements from Irelan to California, 2009 Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

62 Aaptive Retransmission Continually estimate roun-trip time of each connection Set retransmission timer from roun-trip estimate Illustration of timeout on two connections: est 1 est 2 timeout est 1 est 2 timeout packet lost packet lost Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

63 Review Of Sliing Winow Transport protocols use sliing winow mechanism Iea is to sen multiple packets before waiting for an acknowlegment Winow size is relatively small (tens of packets, not millions) Motivation is to increase throughput Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

64 Illustration Of TCP s Sliing Winow winow initial position still unsent alreay acknowlege winow winow intermeiate position winow moves as acknowlegements arrive final position Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

65 How Sliing Winow Improves Data Rate sen packet host 1 host 2 sen packet sen packet sen packet one sen ack sen ack sen ack sen ack stop-an-go Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

66 How Sliing Winow Improves Data Rate host 1 host 2 host 1 host 2 sen packet sen packet sen packet sen ack sen ack sen four packets one sen four acks sen packet sen ack one sen ack stop-an-go sliing winow Winow size of K improves ata rate by a factor of K Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

67 TCP Flow Control An TCP Winow Flow control mechanism coorinates ata being sent with receiver s spee Buffer size use instea of ata rate Receiver tells sener size of initial buffer Each acknowlegement specifies space remaining in buffer Known as winow avertisement Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

68 Illustration Of TCP Flow Control Sener Events Receiver Events avertise winow=2500 sen ata octets sen ata octets sen ata octets receive ack for 1000 receive ack for 2000 receive ack for 2500 ack up to 1000, winow=1500 ack up to 2000, winow=500 ack up to 2500, winow=0 application reas 2000 octets ack up to 2500, winow=2000 sen ata octets sen ata octets receive ack for 3500 receive ack for 4500 ack up to 3500, winow=1000 ack up to 4500, winow=0 application reas 1000 octets ack up to 4500, winow=1000 receive ack for 4500 Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

69 TCP Congestion Control An Slow Start TCP uses loss or changes in elay to infer congestion in the network When congestion is etecte, sening TCP temporarily reuces the size of the winow When a packet is lost, TCP temporarily reuces the effective winow to one half its current value Later, TCP slowly increases the winow again Congestion avoiance also use when a connection starts Temporarily use a winow size of one segment Double the winow size when ACK arrives Known as slow start Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

70 Full-Duplex Communication TCP connection between A an B provies two inepenent ata streams, one from A to B an the other from B to A Each sie Has a receive buffer Avertises a winow size for incoming ata Uses sequence numbers to number outgoing ata bytes Implements timeout-an-retransmission for ata it sens Application can choose to shut own communication in one irection Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

71 Full-Duplex Communication (continue) Each TCP packet contains fiels for both forwar an reverse ata streams Sequence number for ata being sent in the forwar irection Acknowlegement number for ata that has been receive Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

72 Stream Interface After connection is establishe, TCP accepts a stream of ata bytes from the sening application an transfers them Sening application can choose amount of ata to pass on each request Surprise: TCP ecies how to group bytes into packets Known as stream interface Consequence Data may be passe to a receiving application in chunks that iffer from the chunks that the sening application generate Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

73 Connection Startup An Shutown Difficult problem Packets can be Lost Duplicate Delaye Delivere out-of-orer Either en can crash an reboot Nee to know that both sies have agree to start/ terminate the connection Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

74 Reliable Connection Startup TCP guarantees reliable connection startup that avois replay problems Performe with 3-way hanshake Events at Host 1 Events at Host 2 sen SYN receive SYN + ACK sen ACK receive SYN sen SYN + ACK receive ACK Each sie chooses starting sequence number at ranom Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

75 Graceful Connection Shutown Analogous to 3-way hanshake for startup Guarantees no ambiguity about connection termination Events at Host 1 Events at Host 2 sen FIN + ACK receive FIN + ACK sen ACK receive FIN + ACK sen FIN + ACK receive ACK Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

76 TCP Segment Format TCP packet is calle a segment Segment is encapsulate in IP for transmission Single format use for SYNs, FINs, ACKs, an ata SOURCE PORT DESTINATION PORT SEQUENCE NUMBER ACKNOWLEDGEMENT NUMBER HLEN NOT USED CODE BITS WINDOW CHECKSUM URGENT POINTER OPTIONS (if any) BEGINNING OF DATA Computer Networks an Internets -- Moule Spring, 2014 Copyright 2014 All rights reserve

MODULE V. Internetworking: Concepts, Addressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, And End-To-End Services

MODULE V. Internetworking: Concepts, Addressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, And End-To-End Services MODULE V Internetworking: Concepts, Aressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, An En-To-En Services Computer Networks an Internets -- Moule 5 1 Spring, 2014 Copyright

More information

Topics. Computer Networks and Internets -- Module 5 2 Spring, Copyright All rights reserved.

Topics. Computer Networks and Internets -- Module 5 2 Spring, Copyright All rights reserved. Topics Internet concept an architecture Internet aressing Internet Protocol packets (atagrams) Datagram forwaring Aress resolution Error reporting mechanism Configuration Network aress translation Computer

More information

MODULE VII. Emerging Technologies

MODULE VII. Emerging Technologies MODULE VII Emerging Technologies Computer Networks an Internets -- Moule 7 1 Spring, 2014 Copyright 2014. All rights reserve. Topics Software Define Networking The Internet Of Things Other trens in networking

More information

User Datagram Protocol (UDP):

User Datagram Protocol (UDP): SFWR 4C03: Computer Networks and Computer Security Feb 2-5 2004 Lecturer: Kartik Krishnan Lectures 13-15 User Datagram Protocol (UDP): UDP is a connectionless transport layer protocol: each output operation

More information

Network Address Translation (NAT)

Network Address Translation (NAT) Network Aress Translation (NAT) NAT Motivation IPv4 was running out of aresses ISPs only want to limit a customer to one IP aress at any time, but customers want multiple evices to be online Engineers

More information

Internet and Intranet Protocols and Applications

Internet and Intranet Protocols and Applications Internet and Intranet Protocols and Applications Lecture 1b: The Transport Layer in the Internet January 17, 2006 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu 01/17/06

More information

Transport Layer Protocols TCP

Transport Layer Protocols TCP Transport Layer Protocols TCP Gail Hopkins Introduction Features of TCP Packet loss and retransmission Adaptive retransmission Flow control Three way handshake Congestion control 1 Common Networking Issues

More information

Lecture 3: The Transport Layer: UDP and TCP

Lecture 3: The Transport Layer: UDP and TCP Lecture 3: The Transport Layer: UDP and TCP Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 3-1 The Transport Layer Provides efficient and robust end-to-end

More information

User Datagram Protocol

User Datagram Protocol Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram

More information

Networking Technologies and Applications

Networking Technologies and Applications Networking Technologies and Applications Rolland Vida BME TMIT Transport Protocols UDP User Datagram Protocol TCP Transport Control Protocol and many others UDP One of the core transport protocols Used

More information

MODULE II. Network Programming And Applications

MODULE II. Network Programming And Applications MODULE II Network Programming An Applications Computer Networks an Internets -- Moule 2 1 Spring, 2014 Copyright 2014. All rights reserve. Topics Internet services an communication paraigms Client-server

More information

Application Protocol Examples

Application Protocol Examples Application Protocol Examples Web browsing Email File transfer Remote login an remote esktop Domain Name System (name lookup) Computer Networks an Internets -- Moule 2 50 Spring, 2014 Copyright 2014. All

More information

Introduction to Networks and the Internet

Introduction to Networks and the Internet Introduction to Networks and the Internet CMPE 80N Announcements Project 2. Reference page. Library presentation. Internet History video. Spring 2003 Week 7 1 2 Today Internetworking (cont d). Fragmentation.

More information

Protocol Configuration

Protocol Configuration Configuration Protocol Configuration Many items must be set before protocols can be use IP aress of each network interface Aress mask for each network Initial values in the forwaring table Process is known

More information

Connection-oriented (virtual circuit) Reliable Transfer Buffered Transfer Unstructured Stream Full Duplex Point-to-point Connection End-to-end service

Connection-oriented (virtual circuit) Reliable Transfer Buffered Transfer Unstructured Stream Full Duplex Point-to-point Connection End-to-end service 최양희서울대학교컴퓨터공학부 Connection-oriented (virtual circuit) Reliable Transfer Buffered Transfer Unstructured Stream Full Duplex Point-to-point Connection End-to-end service 1 2004 Yanghee Choi 2 Addressing: application

More information

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16 Guide To TCP/IP, Second Edition Chapter 5 Transport Layer TCP/IP Protocols Objectives Understand the key features and functions of the User Datagram Protocol (UDP) Explain the mechanisms that drive segmentation,

More information

7. TCP 최양희서울대학교컴퓨터공학부

7. TCP 최양희서울대학교컴퓨터공학부 7. TCP 최양희서울대학교컴퓨터공학부 1 TCP Basics Connection-oriented (virtual circuit) Reliable Transfer Buffered Transfer Unstructured Stream Full Duplex Point-to-point Connection End-to-end service 2009 Yanghee Choi

More information

UDP: Datagram Transport Service

UDP: Datagram Transport Service UDP: Datagram Transport Service 1 Topics Covered Introduction Transport Protocols and End-to-End Communication The User Datagram Protocol The Connectionless Paradigm Message-Oriented Interface UDP Communication

More information

Applied Networks & Security

Applied Networks & Security Applied Networks & Security TCP/IP Protocol Suite http://condor.depaul.edu/~jkristof/it263/ John Kristoff jtk@depaul.edu IT 263 Spring 2006/2007 John Kristoff - DePaul University 1 ARP overview datalink

More information

05 Transmission Control Protocol (TCP)

05 Transmission Control Protocol (TCP) SE 4C03 Winter 2003 05 Transmission Control Protocol (TCP) Instructor: W. M. Farmer Revised: 06 February 2003 1 Interprocess Communication Problem: How can a process on one host access a service provided

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 4: Transport Layer Literature: Forouzan: ch 11-12 2004 Image Coding Group, Linköpings Universitet Lecture 4: Outline Transport layer responsibilities UDP TCP 2 Transport layer in OSI model Figure

More information

UDP and TCP. Introduction. So far we have studied some data link layer protocols such as PPP which are responsible for getting data

UDP and TCP. Introduction. So far we have studied some data link layer protocols such as PPP which are responsible for getting data ELEX 4550 : Wide Area Networks 2015 Winter Session UDP and TCP is lecture describes the two most common transport-layer protocols used by IP networks: the User Datagram Protocol (UDP) and the Transmission

More information

Supporting Fully Adaptive Routing in InfiniBand Networks

Supporting Fully Adaptive Routing in InfiniBand Networks XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

4.0.1 CHAPTER INTRODUCTION

4.0.1 CHAPTER INTRODUCTION 4.0.1 CHAPTER INTRODUCTION Data networks and the Internet support the human network by supplying seamless, reliable communication between people - both locally and around the globe. On a single device,

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 4: Transport Layer Literature: Forouzan: ch 11-12 2004 Image Coding Group, Linköpings Universitet Lecture 4: Outline Transport layer responsibilities UDP TCP 2 Transport layer in OSI model Figure

More information

Chapter 24. Transport-Layer Protocols

Chapter 24. Transport-Layer Protocols Chapter 24. Transport-Layer Protocols 23.1 Introduction 23.2 User Datagram Protocol 23.3 Transmission Control Protocol 23.4 SCTP Computer Networks 24-1 Position of Transport-Layer Protocols UDP is an unreliable

More information

Unit 2.

Unit 2. Unit 2 Unit 2 Topics Covered: 1. PROCESS-TO-PROCESS DELIVERY 1. Client-Server 2. Addressing 2. IANA Ranges 3. Socket Addresses 4. Multiplexing and Demultiplexing 5. Connectionless Versus Connection-Oriented

More information

Programming Assignment 3: Transmission Control Protocol

Programming Assignment 3: Transmission Control Protocol CS 640 Introduction to Computer Networks Spring 2005 http://www.cs.wisc.edu/ suman/courses/640/s05 Programming Assignment 3: Transmission Control Protocol Assigned: March 28,2005 Due: April 15, 2005, 11:59pm

More information

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6. Transport Layer 6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6.1 Internet Transport Layer Architecture The

More information

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance International Journal of Moern Communication Technologies & Research (IJMCTR) Impact of FTP Application file size an TCP Variants on MANET Protocols Performance Abelmuti Ahme Abbasher Ali, Dr.Amin Babkir

More information

IP Address Assignment

IP Address Assignment IP Address Assignment An IP address does not identify a specific computer. Instead, each IP address identifies a connection between a computer and a network. A computer with multiple network connections

More information

Lecture 20 Overview. Last Lecture. This Lecture. Next Lecture. Transport Control Protocol (1) Transport Control Protocol (2) Source: chapters 23, 24

Lecture 20 Overview. Last Lecture. This Lecture. Next Lecture. Transport Control Protocol (1) Transport Control Protocol (2) Source: chapters 23, 24 Lecture 20 Overview Last Lecture Transport Control Protocol (1) This Lecture Transport Control Protocol (2) Source: chapters 23, 24 Next Lecture Internet Applications Source: chapter 26 COSC244 & TELE202

More information

Computer Networks and Data Systems

Computer Networks and Data Systems Computer Networks and Data Systems Transport Layer TDC463 Winter 2011/12 John Kristoff - DePaul University 1 Why a transport layer? IP gives us end-to-end connectivity doesn't it? Why, or why not, more

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

Kent State University

Kent State University CS 4/54201 Computer Communication Network Kent State University Dept. of Computer Science www.mcs.kent.edu/~javed/class-net06f/ 1 A Course on Networking and Computer Communication LECT-10, S-2 IP- Internet

More information

CSC 634: Networks Programming

CSC 634: Networks Programming CSC 634: Networks Programming Lecture 03: Review of Basic Networking Concepts (TCP/UDP) Instructor: Haidar M. Harmanani Recap 7-Layer OSI Model 7 6 5 4 3 2 1 Application Presentation (kinds of compression)

More information

9th Slide Set Computer Networks

9th Slide Set Computer Networks Prof. Dr. Christian Baun 9th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 1/49 9th Slide Set Computer Networks Prof. Dr. Christian Baun Frankfurt University of Applied Sciences

More information

Sequence Number. Acknowledgment Number. Data

Sequence Number. Acknowledgment Number. Data CS 455 TCP, Page 1 Transport Layer, Part II Transmission Control Protocol These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make

More information

Different Layers Lecture 20

Different Layers Lecture 20 Different Layers Lecture 20 10/15/2003 Jian Ren 1 The Network Layer 10/15/2003 Jian Ren 2 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host,

More information

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

Transmission Control Protocol. ITS 413 Internet Technologies and Applications Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion

More information

CS 640 Introduction to Computer Networks Spring 2009

CS 640 Introduction to Computer Networks Spring 2009 CS 640 Introduction to Computer Networks Spring 2009 http://pages.cs.wisc.edu/~suman/courses/wiki/doku.php?id=640-spring2009 Programming Assignment 3: Transmission Control Protocol Assigned: March 26,

More information

CMPE 80N: Introduction to Networking and the Internet

CMPE 80N: Introduction to Networking and the Internet CMPE 80N: Introduction to Networking and the Internet Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 11 CMPE 80N Fall'10 1 Announcements Forum #2 due on 11.05. CMPE 80N Fall'10 2 Last

More information

TSIN02 - Internetworking

TSIN02 - Internetworking TSIN02 - Internetworking Literature: Lecture 4: Transport Layer Forouzan: ch 11-12 Transport layer responsibilities UDP TCP 2004 Image Coding Group, Linköpings Universitet 2 Transport layer in OSI model

More information

Multiple unconnected networks

Multiple unconnected networks TCP/IP Life in the Early 1970s Multiple unconnected networks ARPAnet Data-over-cable Packet satellite (Aloha) Packet radio ARPAnet satellite net Differences Across Packet-Switched Networks Addressing Maximum

More information

Lecture 8. Network Layer (cont d) Network Layer 1-1

Lecture 8. Network Layer (cont d) Network Layer 1-1 Lecture 8 Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets Network

More information

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer CCNA Exploration Network Fundamentals Chapter 04 OSI Transport Layer Updated: 05/05/2008 1 4.1 Roles of the Transport Layer 2 4.1 Roles of the Transport Layer The OSI Transport layer accept data from the

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Networking Transport Layer Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) TCP/IP Model 2 Transport Layer Problem solved:

More information

IS370 Data Communications and Computer Networks. Chapter 5 : Transport Layer

IS370 Data Communications and Computer Networks. Chapter 5 : Transport Layer IS370 Data Communications and Computer Networks Chapter 5 : Transport Layer Instructor : Mr Mourad Benchikh Introduction Transport layer is responsible on process-to-process delivery of the entire message.

More information

Introduction. IP Datagrams. Internet Service Paradigm. Routers and Routing Tables. Datagram Forwarding. Example Internet and Conceptual Routing Table

Introduction. IP Datagrams. Internet Service Paradigm. Routers and Routing Tables. Datagram Forwarding. Example Internet and Conceptual Routing Table Introduction Datagram Forwarding Gail Hopkins Service paradigm IP datagrams Routing Encapsulation Fragmentation Reassembly Internet Service Paradigm IP Datagrams supports both connectionless and connection-oriented

More information

Transport Layer. -UDP (User Datagram Protocol) -TCP (Transport Control Protocol)

Transport Layer. -UDP (User Datagram Protocol) -TCP (Transport Control Protocol) Transport Layer -UDP (User Datagram Protocol) -TCP (Transport Control Protocol) 1 Transport Services The transport layer has the duty to set up logical connections between two applications running on remote

More information

Position of IP and other network-layer protocols in TCP/IP protocol suite

Position of IP and other network-layer protocols in TCP/IP protocol suite Position of IP and other network-layer protocols in TCP/IP protocol suite IPv4 is an unreliable datagram protocol a best-effort delivery service. The term best-effort means that IPv4 packets can be corrupted,

More information

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Lecture 3. The Network Layer (cont d) Network Layer 1-1 Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets

More information

Internetwork Protocols

Internetwork Protocols Internetwork Protocols Background to IP IP, and related protocols Internetworking Terms (1) Communications Network Facility that provides data transfer service An internet Collection of communications

More information

Computer Science 461 Midterm Exam March 14, :00-10:50am

Computer Science 461 Midterm Exam March 14, :00-10:50am NAME: Login name: Computer Science 461 Midterm Exam March 14, 2012 10:00-10:50am This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor

More information

Overview : Computer Networking. IEEE MAC Protocol: CSMA/CA Internet mobility TCP over noisy links

Overview : Computer Networking. IEEE MAC Protocol: CSMA/CA Internet mobility TCP over noisy links Overview 15-441 15-441: Computer Networking 15-641 Lecture 24: Wireless Eric Anerson Fall 2014 www.cs.cmu.eu/~prs/15-441-f14 Internet mobility TCP over noisy links Link layer challenges an WiFi Cellular

More information

TCP and Congestion Control (Day 1) Yoshifumi Nishida Sony Computer Science Labs, Inc. Today's Lecture

TCP and Congestion Control (Day 1) Yoshifumi Nishida Sony Computer Science Labs, Inc. Today's Lecture TCP and Congestion Control (Day 1) Yoshifumi Nishida nishida@csl.sony.co.jp Sony Computer Science Labs, Inc 1 Today's Lecture Part1: TCP concept Part2: TCP detailed mechanisms Part3: Tools for TCP 2 1

More information

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control Chapter 6 What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control OSI Model Hybrid Model Software outside the operating system Software inside

More information

TCP/IP. Chapter 5: Transport Layer TCP/IP Protocols

TCP/IP. Chapter 5: Transport Layer TCP/IP Protocols TCP/IP Chapter 5: Transport Layer TCP/IP Protocols 1 Objectives Understand the key features and functions of the User Datagram Protocol Explain the mechanisms that drive segmentation, reassembly, and retransmission

More information

Transport Layer. The transport layer is responsible for the delivery of a message from one process to another. RSManiaol

Transport Layer. The transport layer is responsible for the delivery of a message from one process to another. RSManiaol Transport Layer Transport Layer The transport layer is responsible for the delivery of a message from one process to another Types of Data Deliveries Client/Server Paradigm An application program on the

More information

Introduction to Networking. Operating Systems In Depth XXVII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved.

Introduction to Networking. Operating Systems In Depth XXVII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved. Introduction to Networking Operating Systems In Depth XXVII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved. Distributed File Systems Operating Systems In Depth XXVII 2 Copyright 2017 Thomas W.

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 4: Outline Literature: Lecture 4: Transport Layer Forouzan: ch 11-12 RFC? Transport layer introduction UDP TCP 2004 Image Coding Group, Linköpings Universitet 2 The Transport Layer Transport layer

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Network Layer: Internet Protocol

Network Layer: Internet Protocol Network Layer: Internet Protocol Motivation Heterogeneity Scale Intering IP is the glue that connects heterogeneous s giving the illusion of a homogenous one. Salient Features Each host is identified by

More information

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS 1. General (5p) a) The so-called hourglass model (sometimes referred to as a wine-glass ) has been used

More information

ECE697AA Lecture 3. Today s lecture

ECE697AA Lecture 3. Today s lecture ECE697AA Lecture 3 Transport Layer: TCP and UDP Tilman Wolf Department of Electrical and Computer Engineering 09/09/08 Today s lecture Transport layer User datagram protocol (UDP) Reliable data transfer

More information

CSCI-GA Operating Systems. Networking. Hubertus Franke

CSCI-GA Operating Systems. Networking. Hubertus Franke CSCI-GA.2250-001 Operating Systems Networking Hubertus Franke frankeh@cs.nyu.edu Source: Ganesh Sittampalam NYU TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute

More information

Transport Layer. <protocol, local-addr,local-port,foreign-addr,foreign-port> ϒ Client uses ephemeral ports /10 Joseph Cordina 2005

Transport Layer. <protocol, local-addr,local-port,foreign-addr,foreign-port> ϒ Client uses ephemeral ports /10 Joseph Cordina 2005 Transport Layer For a connection on a host (single IP address), there exist many entry points through which there may be many-to-many connections. These are called ports. A port is a 16-bit number used

More information

TCP/IP Networking. Part 4: Network and Transport Layer Protocols

TCP/IP Networking. Part 4: Network and Transport Layer Protocols TCP/IP Networking Part 4: Network and Transport Layer Protocols Orientation Application Application protocol Application TCP TCP protocol TCP IP IP protocol IP IP protocol IP IP protocol IP Network Access

More information

TCP/IP Protocol Suite 1

TCP/IP Protocol Suite 1 TCP/IP Protocol Suite 1 Stream Control Transmission Protocol (SCTP) TCP/IP Protocol Suite 2 OBJECTIVES: To introduce SCTP as a new transport-layer protocol. To discuss SCTP services and compare them with

More information

Connectionless and Connection-Oriented Protocols OSI Layer 4 Common feature: Multiplexing Using. The Transmission Control Protocol (TCP)

Connectionless and Connection-Oriented Protocols OSI Layer 4 Common feature: Multiplexing Using. The Transmission Control Protocol (TCP) Lecture (07) OSI layer 4 protocols TCP/UDP protocols By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU Fall2014, Computer Networks II Introduction Most data-link protocols notice errors then discard frames

More information

Announcements Computer Networking. Outline. Transport Protocols. Transport introduction. Error recovery & flow control. Mid-semester grades

Announcements Computer Networking. Outline. Transport Protocols. Transport introduction. Error recovery & flow control. Mid-semester grades Announcements 15-441 Computer Networking Lecture 16 Transport Protocols Mid-semester grades Based on project1 + midterm + HW1 + HW2 42.5% of class If you got a D+,D, D- or F! must meet with Dave or me

More information

23-3 TCP. Topics discussed in this section: TCP Services TCP Features Segment A TCP Connection Flow Control Error Control 23.22

23-3 TCP. Topics discussed in this section: TCP Services TCP Features Segment A TCP Connection Flow Control Error Control 23.22 23-3 TCP 23.22 TCP is a connection-oriented protocol; it creates a virtual connection between two TCPs to send data. In addition, TCP uses flow and error control mechanisms at the transport level. Topics

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

Sequence Number. Acknowledgment Number. Checksum. Urgent Pointer plus Sequence Number indicates end of some URGENT data in the packet

Sequence Number. Acknowledgment Number. Checksum. Urgent Pointer plus Sequence Number indicates end of some URGENT data in the packet TCP Urgent Source Port Destination Port Sequence Number Acknowledgment Number HdrLen Reserved UA P RS F Checksum Window Size Urgent Pointer Urgent Pointer plus Sequence Number indicates end of some URGENT

More information

CS4700/CS5700 Fundamentals of Computer Networks

CS4700/CS5700 Fundamentals of Computer Networks CS4700/CS5700 Fundamentals of Computer Networks Lecture 14: TCP Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu Northeastern

More information

Transport Layer (TCP/UDP)

Transport Layer (TCP/UDP) Transport Layer (TCP/UDP) Where we are in the Course Moving on up to the Transport Layer! Application Transport Network Link Physical CSE 461 University of Washington 2 Recall Transport layer provides

More information

UNIT IV TRANSPORT LAYER

UNIT IV TRANSPORT LAYER Transport Layer UNIT IV TRANSPORT LAYER Congestion Control and Quality of Service Ref: Data Communication & Networking, 4 th edition, Forouzan IV-1 DATA TRAFFIC The main focus of congestion control and

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or

More information

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1 Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 23-1 PROCESS-TO-PROCESS DELIVERY 23.2 The transport

More information

What is TCP? Transport Layer Protocol

What is TCP? Transport Layer Protocol UNIT IV TRANSPORT LAYER Duties of transport layer Multiplexing Demultiplexing Sockets User Datagram Protocol (UDP) Transmission Control Protocol (TCP) Congestion Control Quality of services (QOS) Integrated

More information

Multicast Routing : Computer Networking. Example Applications. Overview

Multicast Routing : Computer Networking. Example Applications. Overview Multicast outing 5-744: Computer Networking Unicast: one source to one estination Multicast: one source to many estinations Two main functions: Efficient ata istribution Logical naming of a group L-0 Multicast

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Lecture (11) OSI layer 4 protocols TCP/UDP protocols

Lecture (11) OSI layer 4 protocols TCP/UDP protocols Lecture (11) OSI layer 4 protocols TCP/UDP protocols Dr. Ahmed M. ElShafee ١ Agenda Introduction Typical Features of OSI Layer 4 Connectionless and Connection Oriented Protocols OSI Layer 4 Common feature:

More information

Introduction to TCP/IP networking

Introduction to TCP/IP networking Introduction to TCP/IP networking TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute TCP : Transmission Control Protocol HTTP, FTP, ssh What is an internet? A set

More information

Process-to-Process Delivery:

Process-to-Process Delivery: CHAPTER 23 Process-to-Process Delivery: Solutions to Review Questions and Exercises Review Questions 1. Reliability is not of primary importance in applications such as echo, daytime, BOOTP, TFTP and SNMP.

More information

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2. Goals for Todayʼs Lecture. Role of Transport Layer

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2. Goals for Todayʼs Lecture. Role of Transport Layer Transport Protocols Reading: Sections 2.5, 5.1, and 5.2 CS 375: Computer Networks Thomas C. Bressoud 1 Goals for Todayʼs Lecture Principles underlying transport-layer services (De)multiplexing Detecting

More information

OSI Transport Layer. objectives

OSI Transport Layer. objectives LECTURE 5 OSI Transport Layer objectives 1. Roles of the Transport Layer 1. segmentation of data 2. error detection 3. Multiplexing of upper layer application using port numbers 2. The TCP protocol Communicating

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk Date: January 17 th 2006 at 14:00 18:00 SOLUTIONS 1. General (5p) a) Draw the layered

More information

TCP /IP Fundamentals Mr. Cantu

TCP /IP Fundamentals Mr. Cantu TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:

More information

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2 Transport Protocols Reading: Sections 2.5, 5.1, and 5.2 CE443 - Fall 1390 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides

More information

Transport Layer. Gursharan Singh Tatla. Upendra Sharma. 1

Transport Layer. Gursharan Singh Tatla.   Upendra Sharma. 1 Transport Layer Gursharan Singh Tatla mailme@gursharansingh.in Upendra Sharma 1 Introduction The transport layer is the fourth layer from the bottom in the OSI reference model. It is responsible for message

More information

ICS 351: Networking Protocols

ICS 351: Networking Protocols ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol

More information

TCP/IP-2. Transmission control protocol:

TCP/IP-2. Transmission control protocol: TCP/IP-2 Transmission control protocol: TCP and IP are the workhorses in the Internet. In this section we first discuss how TCP provides reliable, connectionoriented stream service over IP. To do so, TCP

More information