Chapter 2. Transport Layer Protocols

Size: px
Start display at page:

Download "Chapter 2. Transport Layer Protocols"

Transcription

1 Chapter 2 Transport Layer Protocols

2 Chapter 2 Transport Layer Protocols The Internet has been continuously progressing ever since its inception as ARPANET. It has grown from a network of some hundreds of hosts to millions of hosts supporting an ever-increasing number and variety of applications and services. TCP/IP reference model is widely used in the networking. In the chapter, there is brief discussion of OSI model and transport layer. Research prime area is to focus upon transport layer. The chapter contains description and working mechanism of various transport layer protocols- TCP, UDP, TLS, WTCP, WTLS, WAP, WAP DP, SCTP, RSVP, DCCP, XTP, CSP, RUDP, RRP, etc. 2.1 Introduction of OSI model and Layers The Open Systems Interconnect (OSI) model [84], consists seven layers viz. application, presentation, session, transport, network, data link and physical as per the hierarchy as shown in Fig 2.1 The lowest layer known as the Physical Layer, carries out the transmission and reception of unstructured raw bit stream. The next highest level called Data Link Layer, looks after the untroubled transfer of data-frames from one node to another. Network layer, which is placed above Data Link layer and below Transport layer, performs an important job of decision making regarding the choice of path of data while adhering to network conditions, priority of service and other factors. Layer 5 i.e. Session Layer, allows session establishment between processes running on various stations. Presentation layer, works as a translator for the network, thereby formatting and reformatting the data, to be presented to the application layer, between the sending station and the receiving station. Topmost layer or Application Layer, caters several functions such as remote file access, remote printer access, network management, directory services, electronic messaging, etc. and acts a window to users and application processes to access network services. 32

3 In between session layer and network layer of the OSI model is the Transport layer. It carries out end-to-end communication services, thereby ascertaining the error-free and in-sequence delivery of messages without losses. It performs message segmentationbreaking the messages into smaller units and forwarding it to network layer, message acknowledgment for end-to-end message delivery, message traffic control- to avoid buffering and session multiplexing for combining several messages into one stream and reliability. As a rule, the transport layer has a capacity of restoring large messages but network layer restricts it because of which it has to break the message into small segments/ units. Also, it is to be noted that the transport layer provides various levels of reliable delivery service for the application layer depending on the application layer requirements. Request for Comments (RFC) for Communication Layers, is 1122 [85] and updated by 1349, 4379, 5884, 6093, 6298, 6633, and Figure 2.1: OSI Model 33

4 2.2 Transport Layer Protocols With the growing complexity of Internet and wide-scale usage of computers, several applications are run on to computers at the same time. Computers send and receive several messages on a continuous basis. The sending and receiving computers, each carry out the delivery of messages not only from one computer to the next but also from process on one computer to another. Each computer runs analogous stacks, with data being passed down the sender s stack (i.e. from the sending application) to up the receiver s stack (i.e. to the receiving application). The transport layer manages the process-to-process delivery of the entire message. Hence, for the purpose, transport layer header have included two special kind of addresses viz. a service-point address in the OSI model and port address in the Internet with TCP/IP protocol suite. It runs in end systems: sender side breaks message from application layer into segments and passes to network layer whereas receiver side reassembles segments into messages and passes to application layer. It is to be noted, network layer performs logical communication between hosts, whereas transport layer enhances quality of service, which network layer caters, in order to match the application needs and facilitates logical communication between processes. A transport layer protocol could be connectionless as well as connection-oriented. In connectionless, each segment is considered as independent packets first and then transported to transport layer at destination machine. And in Connection-oriented, each segment is transferred after the establishment of connection between transport layers of source and destination. Transport layer is the heart of whole protocol hierarchy. Its function is to facilitate reliable, cost-effective and congestion control delivery of data from source to destination apart from other functions of multiplexing, addressing and framing Transmission Control Protocol Transmission Control Protocol (TCP) [86], is one of the main protocols, which performs the function of delivering stream of bytes from one program to another or from one computer to another in a reliable manner. It establishes full virtual connection between two points. IP address and TCP port number define the endpoints. Its main work is to control the network congestion, which might usually occur during 34

5 the transfer, that occurs as various packets take various routes to reach the destination. It thus ensures reliable delivery of packets between applications. It makes use of the technique of positive acknowledgement and retransmission i.e. it guarantees the entire received bytes to be sent in the same order without specific change. The technique works in such a manner that the sender while sending packets automatically switches on the timer and keeps a record of each packet send. The receiver on the other hand, sends an acknowledgement after receiving the message. If in case, timer expires before the acknowledgement of message than in such case the timer once again sends the message. To carry out a reliable service, TCP uses numbering system (determines bytes, sequence and acknowledgement numbers) as well as control mechanisms (flow, error and congestion controls). It is the main protocol of Internet Protocol suite, complementing the Internet protocol and thus the suite is commonly known as TCP/IP suite. TCP and IP provide the basic structure of Internet. In a network, IP facilitates packet delivery without considering reliable packet delivery. On the other hand, TCP promotes reliable packet delivery, thereby compensating for the deficiency of IP protocol. So, in general whichever application desires to send chunk of data it simply issues request to TCP and TCP handles the IP details. The Transmission Control Protocol is used in applications such as World Wide Web, , file administration, etc. Transmission control protocol is described in RFC User Datagram Protocol David P. Reed designed User Datagram protocol (UDP) [87] in It is one of the main protocol in Internet Protocol suite. It serves the application layer and network layer like TCP protocol i.e. it transfers messages usually known as datagrams from one application having port number to another. However, there is no guarantee of the message being sent to reach the destination. It might get lost or corrupted or duplicated on the way, as it is incapable of establishing a proper connection as TCP does and hence it is also referred as connectionless protocol because of less reliability. Also it doesn t employ ACK, flow and congestion control like TCP and hence is one of the reason for no guarantee of message reaching the destination in the same 35

6 sequence or order as transmitted. UDP is comparatively simple, in the sense. In TCP, data is send usually in a stream with no distinction between two packets as they move in a stream. However in UDP, packets are sent individually i.e. one packet per one read call. The only overhead, which UDP adds to the packet is to establish process to process communication, rather than host to host communication of IP layer. Therefore, UDP is very suitable for small message communications or applications, which do not need strong reliability. These are mainly client/ server request/ reply or video conferencing. Some of the known applications of UDP are streaming media, real-time multiplayer games and voice over IP. Also voice and video-trafficking is sent usually using UDP. User Datagram Protocol is described in RFC Transport Layer Security Transport Layer Security (TLS) [88] is a protocol, which helps to secure data as it provides communication security over Internet i.e. it ensures privacy between communicating applications (when server and client communicates, it makes sure no other party is hampering the flow of communication). Secure Sockets layer (SSL) is the predecessor of TLS and the difference between them is so minor, hence usually they are lumped together as TLS/SSL. The Transport Layer Security is composed of two layers viz. TLS Record Protocol and TLS Handshake Protocol. TLS Record Protocol is used for the purpose of ensuring security with the use of Data Encryption Standard. On the other hand, Handshake Protocol provides encryption algorithm and cryptographic keys to client and server for the facilitation of secured communication between them, thus there is no forgery of message or no eavesdrop by the third party. Although no single security measure could secure the data from being getting hampered but implementing security protocols like TLS could reduce the chance of such threats. TLS has a wide range of applications, which includes its implementation in HTTP, FTP, SMTP, NNTP and XMPP. Also, it is being implemented with Transport Layer Protocol (TCP), User Datagram Protocol (UDP) and Datagram Congestion Control Protocol (DCCP). Electronic commerce and asset management also makes an application of TLS. It is widely used in various open source software projects. Secure 36

7 Sockets Layer (SSL) [89] Version 2.0 is described in RFC 6176 with updates in RFC 2246, 4346, 5246 and the TLS Protocol Version 1.0 is described in RFC Stream Control Transmission Protocol Stream Control Transmission Protocol (SCTP) [90], a transport layer protocol, is an improvement of TCP and UDP. It uses the key features of both TCP (i.e. reliability, sequential transmission of message with congestion control) and UDP (i.e. message oriented). However, SCTP has two additional features: Multi-homing and Multistreaming. These two features of SCTP could be explained as follows: Multi-homing enables system, which has multiple interfaces to avoid time-delays, which usually occur in telecommunication network. It is also used to carry out transmission of message. On the other hand, Multiple-streaming in SCTP could be understood as the facilitation of multiple streams through connection on contrary to TCP, where one single data stream is allowed per connection. SCTP s multi-streaming is also used with infrastructures, which connect multiple means of communications simultaneously. SCTP facilitates the operation of message transfer by keeping message and control information into separate chunks (i.e. data chunk and control chunk), where each chunk carries data of only one user, identified by chunk header. These chunks are bundled into packets. Stream Control Transmission Protocol is described in RFC 4960, while obsoletes RFC are 2960, 3309 and updated RFC are 6096, 6335, Resource Reservation Protocol Resource Reservation Protocol (RSVP) [91], is a transport layer protocol also a part of Internet Integrated Service (IIS) model. It is designed to reserve resources across network. It primarily lays out principles, to direct channels and the paths on the Internet to be secured for multicast and bandwidth messages. RSVP ensures besteffort service, real-time service and controlled link-sharing. It is similar to vivid control protocols in some manner viz. ICMP/IGMP. It is described in RFC

8 Either hosts use it for requesting Quality of Service from network or routers use it to deliver Quality of Service requests along the flows. RSVP services generally result in resources being reserved in each node along the path. The twin key concepts of RSVP model are flowspec (QoS specific information is called a flowspec) and filterspec ( defines the set of packets to be affected by a flowspec). RSVP also comprises two messages of which the first is path message, which is sent from sender host along the data path and stores the path state in each node along the path. The second one is reserved message, which is sent from the receiver to the sender host along the reserve data path. Resource Reservation Protocol (RSVP) is described in RFC 2205 and updated by RFC 2750, 3936, 4495, 5946, 6437, Datagram Congestion Control Protocol Datagram Congestion Control Protocol (DCCP) [92], is a message-oriented transport layer protocol. It serves the purpose of establishing, maintaining as well as tearingdown of an unreliable packet flow and congestion control of the packet flow. It is suitable for applications, which carry out the transfer of large amount of data as well as those, which benefits from control over trade-off between timeliness and reliability. DCCP is useful for applications with time constraints on the delivery of data. Such applications include streaming media, multiplayer online games and Internet telephony. It implements reliable connection setup, tear-down, Explicit Congestion Notification (ECN), congestion control and feature negotiation. DCCP provides a way to gain access to congestion control mechanisms without having to implement them at the application layer. It allows flow-based semantics like in Transmission Control Protocol (TCP), but does not provide reliable in-order delivery. RFC 4340 describes Datagram Congestion Control Protocol (DCCP) and 5595, 5596, 6335, 6773 updates it. 38

9 2.2.7 Multipath TCP Multipath TCP (MPTCP) [93], is an on-going effort of the IETF's Multipath TCP working group, which allows a TCP connection to use multiple paths to maximize resource usage and increase redundancy. TCP/IP communication is currently restricted to a single path per connection, yet multiple paths often exist between peers. The simultaneous use of these multiple paths for a TCP/IP session would improve resource usage within the network and, thus, improve user experience through higher throughput and improved resilience to network failure. Multipath TCP provides the ability to simultaneously use multiple paths between peers. The protocol offers the same kind of service to applications as TCP (i.e., reliable byte stream), and it provides the components necessary to establish and use multiple TCP flows across potentially disjoint paths. Multipath TCP (MPTCP) is a set of extensions to regular TCP to provide a Multipath TCP [2] service, which enables a transport connection to operate across multiple paths simultaneously. In January 2013, the IETF published the Multipath specification as an Experimental standard in RFC Licklider Transmission Protocol Licklider Transmission Protocol (LTP) [94], is a point to point protocol for the use in deep space links. LTP is designed to run directly over a data link layer (such as e.g. AOS), but it could also run on the User Datagram Protocol (UDP). LTP is commonly seen as the standard underlying convergence layer protocol for the Bundle Protocol (RFC 5050), supporting a wide selection of networks. The Licklider Transmission Protocol (LTP), designed to provide retransmission-based reliability over links, is characterized by extremely long message round-trip times (RTTs) and/or frequent interruptions in connectivity. Communication across interplanetary space is the widely prominent example of such sort of environment, 39

10 LTP is principally aimed at supporting "long- haul" reliable transmission in interplanetary space, but it has applications in other environments as well. Since, no mechanisms for flow control or congestion control are included in the design of LTP, the protocol is not intended or appropriate for ubiquitous deployment in the global Internet. Licklider Transmission Protocol is described in RFC 5325 and Wireless Transmission Control Protocol Wireless Transmission Control Protocol (WTCP) is a proxy based modification of TCP, which is being used in wireless networks to improve the performance of TCP. It is being created to provide an easy and standard means for transmitting messages (alphanumeric and binary data) to and from the wireless network gateway over a wired network. In other words, it transfers data, both one-way and two-way, to appropriate receiving devices. WTCP is usually placed in an intermediate gateway between source host and mobile host in such a manner that the hosts aren t even aware about the existence of WTCP. The working of WTCP between two hosts is explained in the following manner; when any mobile hosts send message through TCP, it is received by WTCP at the base station and it forwards it over the network to the awaiting source host. On the reception of message, the source hosts sends an acknowledgement back to the base station host through the network, which is then forwarded to the mobile host. So, in general WTCP exactly performs the same role as TCP does, but instead of replacing it completely, WTCP works with TCP in order to enhance the performance by handling high bit error rates. Hence, it is to be inferred, WTCP doesn t replaces TCP on the hosts. On the contrary, it is placed on a proxy between two communicating hosts. It significantly improves the throughput because of its unique features. So, in order to increase the out-turn of data transmission, Wireless Transmission Control Protocol (WTCP) is used as it is capable of handling vulnerable problems occurring over wireless networks. It has the feature of fast acknowledgement, ondemand retransmission and time-out mechanisms. However, WTCP is fairly new protocol and it is not widely yet accepted. 40

11 Wireless Application Protocol According to Wireless Application Protocol (WAP) Forum, it is a worldwide standard for providing Internet communications and advanced telephony services on digital mobile phones, pagers, personal digital assistants and wireless terminals. It is the result of the joint effort of companies like Ericsson, Motorola, Nokia and Unwired Planet (commonly known as WAP group, which created a forum later on whose membership is opened to all) to create a standard for facilitating advanced services within wireless network. WAP is composed of four layers viz. Wireless Application Environment (WAE), Wireless Session Layer (WSL), Wireless Transport Layer Security (WTLS) and Wireless Transport Layer (WTP). Prior to the introduction of WAP, the mobile service providers had greater difficulty to provide interactive data services such as by mobile phones, trafficking of stockmarket prices, sports results, news headlines, music downloads, etc. In fact one could say, internet was Internet (i.e. Only computers used to carry out the net surfing work) and mobile phone was mobile phone (i.e. no application of Internet facility). But the problem has been counteracted with the emergence of WAP, which enabled availability of massive information, communication and data resources of the Internet on mobile phones. It is also referred to as a technical standard for accessing information over a mobile network. It is to be noted, just like a standard internet site is used for browsing purpose, to access WAP enable website, one need a micro browser called WAP Browser for mobile devices and mobile networks WAP Datagram Protocol Wireless Datagram Protocol (WDP), a protocol in WAP architecture, defines transmission layer protocol for an internet model and enables WAP to be bearerindependent. In other words, it adapts the transport layer of the underlying bearer service, it offers to the upper layer and invisible interface independent of the underlying network technology used, and presents consisting data format to the higher layer of the WAP protocol stack. As WDP allows only its transport layer to deal with physical network-dependent issues, using mediating gateways it could acquire global 41

12 interoperability. It resembles to UDP and carries out movement of information from receiver to the sender Wireless Transport Layer Security Wireless Transport Layer Security (WTLS) is a security protocol and is derived from TLS (successor of SSL), with an aim to address problematic issues such as limited processing power, memory capacity, low bandwidth in the wireless network. It makes use of modern cryptographic algorithms and allows negotiations of cryptographic suites between client and server just like TLS, thereby ensuring adequate authentication, data integrity and privacy protection mechanisms between applications communicating using Wireless Application Protocol (WAP). Many organisations such as defence, banks or health organisations, etc. require high level of security for its data. In order to carry out wireless transmission of data between these organisations and their destination, such organisations demand highly secured encryption so as to protect communication form attack or forgery during transmission. WTLS is designed to support wireless networks. It is done through facilitation of secured messages in high latency and low bandwidth environment. WTLS has both advantage as well as disadvantage. On the one hand, it offers the necessary support for the limited memory and processing capabilities of WAP-enabled devices, which are failed to be address by SSL and TLS; and on the other hand, it sometimes allows weak encryption algorithm, thereby harnessing the security of user. Inspite of the security problems, it is considered to be correct security solution. So, with a little development and certain improvement, WTLS intends to provide a correct security solution Multipurpose Transaction Protocol Multipurpose Transaction Protocol software is a proprietary transport protocol (OSI Layer 4) developed and marketed by Data Expedition, Inc. (DEI). DEI claims that MTP offers superior performance and reliability when compared to the Transmission Control Protocol (TCP) transport protocol. Taking cues from the high-volume, 42

13 request-response pattern of modern network applications, Core MTP follows a simplified transaction data model. Each core network operation consists of small request datagrams exchanged for a potentially huge collection of response datagrams. Combined with a more robust packet design, the aforesaid model eliminates overhead like three-way handshakes and time-wait states. These core transactions might then be modularly combined to create more sophisticated data models, with only the minimum overhead appropriate to the task. For many MTP users, thus it translates into seven times faster data transfers over high-speed WANs, and ten times improved reliability on no matter which network, when compared to even modern TCP implementations. Thus, it holds viable even for data, which is already compressed and completely unique, where compression and caching would break down. Also importantly, the results are scalable; the adaptive nature of the protocol means no setup tuning or special equipment is needed Xpress Transport Protocol (XTP) Xpress Transport Protocol (XTP) is a transport layer protocol for high-speed networks. XTP Forum promotes the protocol and developed it to replace TCP. XTP is a reliable, real-time, lightweight protocol. XTP provides protocol options for error control, flow control, and rate control. Instead of separate protocols for each kind of communication, XTP controls packet exchange patterns to produce various models, e.g. reliable datagrams, transactions, unreliable streams, and reliable multicast connections. Long latency is one of the major problems in satellite communications. Coupling it with possible environmental variables and sometimes asymmetrical bandwidth conditions, the quality of service in satellite communications is sometimes lacking. XTP addresses these issues in a variety of ways such as a Selective Retransmission algorithm, which deals with loss recovery. XTP does not employ congestion avoidance algorithms. Current transport layer protocols, such as DoD's Transmission Control Protocol (TCP) and ISO's Transport Protocol (TP) are not being designed for the next generation of high speed, interconnected reliable networks viz. FDDI and the gigabit/second wide 43

14 area networks. Unlike the other previous transport layer protocols, XTP is designed to be implemented in hardware as a VLSI chip set. By streamlining the protocol, combining the transport and network layers and utilizing the increased speed and parallelization possible with a VLSI implementation, XTP is able to provide the endto-end data transmission rates demanded in high speed networks without compromising reliability and functionality. XTP provides the reliable transmission of data in an inter-networked environment, with real-time processing of the XTP protocol i.e., the processing time for incoming or outgoing packets is no greater than the transmission time. XTP contains error, flow and rate control mechanisms similar to those found in other more modern transport layer protocols in addition to multicast capability. Timer management is minimized in XTP there is only one timer at the receiver, used in closing the context. XTP has a 32 bit flow window. XTP's state machine is specifically designed for parallel execution. Address translation, context creation, flow control, error control, rate control and host system interfacing can execute in parallel Cubesat Space Protocol (CSP) Cubesat Space Protocol (CSP) is a small network-layer delivery protocol designed for Cubesats. A group of students from Aalborg University in 2008 developed the idea, and further developed for the AAUSAT3 Cubesat mission, successfully launched in The protocol is a 32-bit header containing both network and transport layer information. Its implementation is designed for, but not limited to, embedded systems such as the 8-bit AVR microprocessor and the 32-bit ARM and AVR from Atmel. The implementation is written in C and is currently ported to run on FreeRTOS and POSIX and pthreads-based operating systems such as Linux. Support for Mac OS X and Microsoft Windows will be available in version 1.1. It supports transparent forwarding of packets over e.g. space link. CSP supports for both connectionless operation (similar to UDP), and connection oriented operation (RFC 908 and 1151). 44

15 Reliable User Datagram Protocol (RUDP) In computer networking, the Reliable User Datagram Protocol (RUDP) is a packet based transport layer protocol designed at Bell Labs for the Plan 9 operating system. It aims to provide a solution, where UDP is too primitive because guaranteed-order packet delivery is desirable, but TCP adds too much complexity/overhead. In order for to gain higher Quality of Service, RUDP is implemented, which is similar to TCP with less overhead. RUDP is rested upon RFCs 1151 and Reliable Data Protocol. RUDP is layered on the UDP/IP Protocols and provides reliable in-order delivery (up to a maximum count of retransmissions) for virtual connections. A reliable transport protocol is needed to transport the telephony signalling across IP networks. The reliable transport is able to provide architecture for a variety of applications (i.e. signalling protocols) requiring transport over IP. Existing IP protocols have been scrutinized and it has been concluded that RUDP is designed to allow characteristics of each connection to be individually configured, thus many protocols with independent transport requirements could be implemented simultaneously on the same platform. RUDP has a very flexible design, which makes it suitable for a variety of transport uses TCP Westwood TCP Westwood (TCPW) is a sender-side-only modification to TCP New Reno, which is intended to better handle the large bandwidth-delay product paths (large pipes), with potential packet loss because of transmission or other errors (leaky pipes), and with dynamic load (dynamic pipes). TCPW fully complies with the end-to-end TCP design principle. The key innovative idea is to continuously measure, at the TCP sender side, the bandwidth used by the connection via monitoring the rate of returning ACKs. The estimate is then used to compute congestion window and slow start threshold after a congestion episode, i.e. after three duplicate acknowledgements or after a time-out. The rationale of such a strategy is plain: In contrast with TCP Reno, which blindly halves the congestion 45

16 window after three duplicate ACKs, TCP Westwood attempts to select a slow start threshold and a congestion window, which are consistent with the effective bandwidth used at the time congestion is experienced. The proposed mechanism is particularly effective over wireless links, where sporadic losses out of radio channel problems are often misinterpreted as a symptom of congestion by current TCP schemes and thus, lead to an unnecessary window reduction TCP Vegas TCP Vegas is a TCP congestion avoidance algorithm, which emphasizes packet delay, rather than packet loss, as a signal to help to determine the rate at which to send packets. TCP Vegas detects congestion at an incipient stage resting on increasing Round-Trip Time (RTT) values of the packets in the connection. The algorithm depends heavily on accurate calculation of the Base RTT value. TCP Vegas is one of a series of efforts at TCP tuning, which adapt congestion control and system behaviours to new challenges faced by an increase in available bandwidth in Internet components on networks like Internet. There are five techniques, which Vegas employs to increase throughput and decrease losses. The first two of these techniques are mere extensions, which result in a more timely decision to retransmit a dropped segment. The third technique is an adjustment to TCP s congestion window resizing algorithm; it is required because of Vegas more accurate time-out mechanism. The fourth technique is designed to better space transmissions. The fifth technique is widely novel. It gives TCP the ability to anticipate congestion, and adjust its transmission rate accordingly The Internet Link protocol The Internet Link protocol or IL is a connection-based transport layer protocol, designed at Bell Labs originally as part of the Plan 9 operating system. It is assigned the Internet Protocol number 40. It is similar to TCP but much simpler. Its main features are reliable datagram service, in-sequence delivery, Internetworking using IP, low complexity, high performance, and adaptive time-outs. 46

17 IL is a lightweight protocol encapsulated by IP. It is connection-based and provides reliable transmission of sequenced messages. No provision is made for flow control since the protocol is designed to transport RPC messages between client and server, a structure with inherent flow limitations. A small window for outstanding messages prevents too many incoming messages from being buffered; messages outside the window are discarded and hence to be retransmitted. Connection set-up uses a twoway handshake to generate initial sequence numbers at each end of the connection; subsequent data messages increment the sequence numbers to allow the receiver to resequence out of order messages. In contrast to other protocols, IL avoids blind retransmission. Thus, it helps performance in congested networks, where blind retransmission could cause further congestion. Like TCP, IL has adaptive time-outs, so the protocol performs well both on the Internet and on local Ethernets. A round-trip timer is used to calculate acknowledge and retransmission times, which matches the network speed. 47

18 Chapter 3 Security and Priority issues of Quality of Service at Transport Layer

Part VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD

Part VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD Part VI Appendixes Appendix A OSI Model and Internet Protocols Appendix B About the CD OSI Model and Internet Protocols APPENDIX A In this appendix, you will Learn about the OSI model Review the network

More information

Wireless Access Protocol(WAP) architecture

Wireless Access Protocol(WAP) architecture Wireless Access Protocol(WAP) architecture While the evolution of cellular networks has resulted in many mobile services, such services are primarily for voice. Mobile phone users do have the desire to

More information

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print, ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

Chapter 12 Network Protocols

Chapter 12 Network Protocols Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

4.0.1 CHAPTER INTRODUCTION

4.0.1 CHAPTER INTRODUCTION 4.0.1 CHAPTER INTRODUCTION Data networks and the Internet support the human network by supplying seamless, reliable communication between people - both locally and around the globe. On a single device,

More information

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Transport Layer Network Fundamentals Chapter 4 Version 4.0 1 Transport Layer Role and Services Transport layer is responsible for overall end-to-end transfer of application data 2 Transport Layer Role

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks Verkkomedian perusteet Fundamentals of Media T-110.250 19.2.2002 Antti Ylä-Jääski 19.2.2002 / AYJ lide 1 Goals and topics protocols Discuss how packet-switching networks differ from circuit switching networks.

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Internetworking Models The OSI Reference Model

Internetworking Models The OSI Reference Model Internetworking Models When networks first came into being, computers could typically communicate only with computers from the same manufacturer. In the late 1970s, the Open Systems Interconnection (OSI)

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Introduction to Open System Interconnection Reference Model

Introduction to Open System Interconnection Reference Model Chapter 5 Introduction to OSI Reference Model 1 Chapter 5 Introduction to Open System Interconnection Reference Model Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding

More information

IP Mobility vs. Session Mobility

IP Mobility vs. Session Mobility IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when

More information

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16 Guide To TCP/IP, Second Edition Chapter 5 Transport Layer TCP/IP Protocols Objectives Understand the key features and functions of the User Datagram Protocol (UDP) Explain the mechanisms that drive segmentation,

More information

Network Model: Each layer has a specific function.

Network Model: Each layer has a specific function. OBJECTIVES: To discuss the OSI model and its layer architecture and to show the interface between the layers. To briefly discuss the functions of each layer in the OSI model. To introduce the TCP/IP protocol.

More information

UNIT 2 TRANSPORT LAYER

UNIT 2 TRANSPORT LAYER Network, Transport and Application UNIT 2 TRANSPORT LAYER Structure Page No. 2.0 Introduction 34 2.1 Objective 34 2.2 Addressing 35 2.3 Reliable delivery 35 2.4 Flow control 38 2.5 Connection Management

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/8/14 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

b) Diverse forms of physical connection - all sorts of wired connections, wireless connections, fiber optics, etc.

b) Diverse forms of physical connection - all sorts of wired connections, wireless connections, fiber optics, etc. Objectives CPS221 Lecture: Layered Network Architecture last revised 6/22/10 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms Overview Chapter 13 TRANSPORT Motivation Simple analysis Various TCP mechanisms Distributed Computing Group Mobile Computing Winter 2005 / 2006 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany Mobile Communications Chapter 9: Mobile Transport Layer Motivation, TCP-mechanisms Classical approaches (Indirect

More information

Transport layer issues

Transport layer issues Transport layer issues Dmitrij Lagutin, dlagutin@cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks, 28.3.2007 Contents Issues in designing a transport layer protocol for ad hoc

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

Data & Computer Communication

Data & Computer Communication Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

Peer entities. Protocol Layering. Protocols. Example

Peer entities. Protocol Layering. Protocols. Example Peer entities Protocol Layering An Engineering Approach to Computer Networking Customer A and B are peers Postal worker A and B are peers Protocols A protocol is a set of rules and formats that govern

More information

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication

More information

Introduction to Protocols

Introduction to Protocols Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These

More information

Chapter 2 Network Models 2.1

Chapter 2 Network Models 2.1 Chapter 2 Network Models 2.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Network Models n Network Architecture: n A) Hardware: at the core of any network;

More information

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks

More information

Does current Internet Transport work over Wireless? Reviewing the status of IETF work in this area

Does current Internet Transport work over Wireless? Reviewing the status of IETF work in this area Does current Internet Transport work over Wireless? Reviewing the status of IETF work in this area Sally Floyd March 2, 2000 IAB Workshop on Wireless Internetworking 1 Observations: Transport protocols

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Networking and Internetworking 1

Networking and Internetworking 1 Networking and Internetworking 1 Today l Networks and distributed systems l Internet architecture xkcd Networking issues for distributed systems Early networks were designed to meet relatively simple requirements

More information

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet

More information

CS 640 Introduction to Computer Networks Spring 2009

CS 640 Introduction to Computer Networks Spring 2009 CS 640 Introduction to Computer Networks Spring 2009 http://pages.cs.wisc.edu/~suman/courses/wiki/doku.php?id=640-spring2009 Programming Assignment 3: Transmission Control Protocol Assigned: March 26,

More information

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control Chapter 6 What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control OSI Model Hybrid Model Software outside the operating system Software inside

More information

Transport Layer. Gursharan Singh Tatla. Upendra Sharma. 1

Transport Layer. Gursharan Singh Tatla.   Upendra Sharma. 1 Transport Layer Gursharan Singh Tatla mailme@gursharansingh.in Upendra Sharma 1 Introduction The transport layer is the fourth layer from the bottom in the OSI reference model. It is responsible for message

More information

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

ETSF05/ETSF10 Internet Protocols Network Layer Protocols ETSF05/ETSF10 Internet Protocols Network Layer Protocols 2016 Jens Andersson Agenda Internetworking IPv4/IPv6 Framentation/Reassembly ICMPv4/ICMPv6 IPv4 to IPv6 transition VPN/Ipsec NAT (Network Address

More information

Chapter -4 OSI Reference Model

Chapter -4 OSI Reference Model Chapter -4 OSI Reference Model Objectives Concept of Reference Model. OSI Reference Model Concept. Layers of OSI Reference Model. 4.1 Introduction Layered Architecture, Peer-to- Peer Processes, Interfaces

More information

Page 1. Review: Internet Protocol Stack. Transport Layer Services EEC173B/ECS152C. Review: TCP. Transport Layer: Connectionless Service

Page 1. Review: Internet Protocol Stack. Transport Layer Services EEC173B/ECS152C. Review: TCP. Transport Layer: Connectionless Service EEC7B/ECS5C Review: Internet Protocol Stack Review: TCP Application Telnet FTP HTTP Transport Network Link Physical bits on wire TCP LAN IP UDP Packet radio Do you remember the various mechanisms we have

More information

User Datagram Protocol (UDP):

User Datagram Protocol (UDP): SFWR 4C03: Computer Networks and Computer Security Feb 2-5 2004 Lecturer: Kartik Krishnan Lectures 13-15 User Datagram Protocol (UDP): UDP is a connectionless transport layer protocol: each output operation

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany Mobile Communications Chapter 9: Mobile Transport Layer Motivation, TCP-mechanisms Classical approaches (Indirect

More information

NT1210 Introduction to Networking. Unit 10

NT1210 Introduction to Networking. Unit 10 NT1210 Introduction to Networking Unit 10 Chapter 10, TCP/IP Transport Objectives Identify the major needs and stakeholders for computer networks and network applications. Compare and contrast the OSI

More information

TCP/IP THE TCP/IP ARCHITECTURE

TCP/IP THE TCP/IP ARCHITECTURE TCP/IP-1 The Internet Protocol (IP) enables communications across a vast and heterogeneous collection of networks that are based on different technologies. Any host computer that is connected to the Internet

More information

Layered Architecture

Layered Architecture 1 Layered Architecture Required reading: Kurose 1.7 CSE 4213, Fall 2006 Instructor: N. Vlajic Protocols and Standards 2 Entity any device capable of sending and receiving information over the Internet

More information

Mobile Transport Layer

Mobile Transport Layer Mobile Transport Layer 1 Transport Layer HTTP (used by web services) typically uses TCP Reliable transport between TCP client and server required - Stream oriented, not transaction oriented - Network friendly:

More information

Networking Applications

Networking Applications Networking Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport 1 Outline Internet Layers Internet Data Packet transmission

More information

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6. Transport Layer 6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6.1 Internet Transport Layer Architecture The

More information

User Datagram Protocol

User Datagram Protocol Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram

More information

CMPE 80N: Introduction to Networking and the Internet

CMPE 80N: Introduction to Networking and the Internet CMPE 80N: Introduction to Networking and the Internet Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 11 CMPE 80N Fall'10 1 Announcements Forum #2 due on 11.05. CMPE 80N Fall'10 2 Last

More information

Outline 9.2. TCP for 2.5G/3G wireless

Outline 9.2. TCP for 2.5G/3G wireless Transport layer 9.1 Outline Motivation, TCP-mechanisms Classical approaches (Indirect TCP, Snooping TCP, Mobile TCP) PEPs in general Additional optimizations (Fast retransmit/recovery, Transmission freezing,

More information

CSE 4215/5431: Mobile Communications Winter Suprakash Datta

CSE 4215/5431: Mobile Communications Winter Suprakash Datta CSE 4215/5431: Mobile Communications Winter 2013 Suprakash Datta datta@cse.yorku.ca Office: CSEB 3043 Phone: 416-736-2100 ext 77875 Course page: http://www.cse.yorku.ca/course/4215 Some slides are adapted

More information

Chapter 12. Network Organization and Architecture. Chapter 12 Objectives Introduction Introduction

Chapter 12. Network Organization and Architecture. Chapter 12 Objectives Introduction Introduction Chapter 12 Objectives Chapter 12 Network Organization and Architecture Become familiar with the fundamentals of network architectures. Be able to describe the ISO/OSI reference model and the TCP/IP standard.

More information

1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology

1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology Review Questions for exam Preparation (22-07-2017) 1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology 2. What is the Internet? "network

More information

The Transmission Control Protocol (TCP)

The Transmission Control Protocol (TCP) The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, e-mail, WWW) Reliable Stream Transport (TCP) Unreliable Transport Service (UDP) Connectionless Packet Delivery Service (IP) Goals

More information

CS 428/528 Computer Networks Lecture 01. Yan Wang

CS 428/528 Computer Networks Lecture 01. Yan Wang 1 CS 428/528 Computer Lecture 01 Yan Wang 2 Motivation: Why bother? Explosive growth of networks 1989, 100,000 hosts on the Internet Distributed Applications and Systems E-mail, WWW, multimedia, distributed

More information

Page 1. Review: Internet Protocol Stack. Transport Layer Services. Design Issue EEC173B/ECS152C. Review: TCP

Page 1. Review: Internet Protocol Stack. Transport Layer Services. Design Issue EEC173B/ECS152C. Review: TCP EEC7B/ECS5C Review: Internet Protocol Stack Review: TCP Application Telnet FTP HTTP Transport Network Link Physical bits on wire TCP LAN IP UDP Packet radio Transport Layer Services Design Issue Underlying

More information

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer CCNA Exploration Network Fundamentals Chapter 04 OSI Transport Layer Updated: 05/05/2008 1 4.1 Roles of the Transport Layer 2 4.1 Roles of the Transport Layer The OSI Transport layer accept data from the

More information

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski Operating Systems 16. Networking Paul Krzyzanowski Rutgers University Spring 2015 1 Local Area Network (LAN) LAN = communications network Small area (building, set of buildings) Same, sometimes shared,

More information

Computer Communication & Networks / Data Communication & Computer Networks Week # 03

Computer Communication & Networks / Data Communication & Computer Networks Week # 03 Computer Communication & Networks / Data Communication & Computer Networks Week # 03 M.Nadeem Akhtar CS & IT Department The University of Lahore Email: nadeem.akhtar@cs.uol.edu.pk URL-https://sites.google.com/site/nadeemuolcsccn/home

More information

Introduction to computer networking

Introduction to computer networking edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing

More information

Programming Assignment 3: Transmission Control Protocol

Programming Assignment 3: Transmission Control Protocol CS 640 Introduction to Computer Networks Spring 2005 http://www.cs.wisc.edu/ suman/courses/640/s05 Programming Assignment 3: Transmission Control Protocol Assigned: March 28,2005 Due: April 15, 2005, 11:59pm

More information

SUBJECT: DATA COMMUNICATION AND NETWORK SEMESTER: V SEMESTER COURSE: BCA SUBJECT TEACHER: Dr.K.Chitra Assistant Professor, Department of Computer

SUBJECT: DATA COMMUNICATION AND NETWORK SEMESTER: V SEMESTER COURSE: BCA SUBJECT TEACHER: Dr.K.Chitra Assistant Professor, Department of Computer SUBJECT: DATA COMMUNICATION AND NETWORK SEMESTER: V SEMESTER COURSE: BCA SUBJECT TEACHER: Dr.K.Chitra Assistant Professor, Department of Computer Science Chapter - 2 Switching and Network Architecture

More information

Reference Models. 7.3 A Comparison of the OSI and TCP/IP Reference Models

Reference Models. 7.3 A Comparison of the OSI and TCP/IP Reference Models Reference Models Contains 7.1 The OSI Reference Model 7.1.1 The Physical Layer 7.1.2 The Data Link Layer 7.1.3 The Network Layer 7.1.4 The Transport Layer 7.1.5 The Session Layer 7.1.6 The Presentation

More information

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

Transmission Control Protocol. ITS 413 Internet Technologies and Applications Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion

More information

Data Communication & Computer Networks MCQ S

Data Communication & Computer Networks MCQ S Data Communication & Computer Networks MCQ S 1. The translates internet domain and host names to IP address. a) domain name system b) routing information protocol c) network time protocol d) internet relay

More information

CSCI-GA Operating Systems. Networking. Hubertus Franke

CSCI-GA Operating Systems. Networking. Hubertus Franke CSCI-GA.2250-001 Operating Systems Networking Hubertus Franke frankeh@cs.nyu.edu Source: Ganesh Sittampalam NYU TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute

More information

Cisco Cisco Certified Network Associate (CCNA)

Cisco Cisco Certified Network Associate (CCNA) Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data

More information

Transport Layer. -UDP (User Datagram Protocol) -TCP (Transport Control Protocol)

Transport Layer. -UDP (User Datagram Protocol) -TCP (Transport Control Protocol) Transport Layer -UDP (User Datagram Protocol) -TCP (Transport Control Protocol) 1 Transport Services The transport layer has the duty to set up logical connections between two applications running on remote

More information

M.SARAVANA KARTHIKEYAN

M.SARAVANA KARTHIKEYAN PERVASIVE COMPUTING Unit II Part A 1. What is XML? XML stands for EXtensible Markup Language XML is a markup language much like HTML XML was designed to carry data, not to display data XML tags are not

More information

Fast Retransmit. Problem: coarsegrain. timeouts lead to idle periods Fast retransmit: use duplicate ACKs to trigger retransmission

Fast Retransmit. Problem: coarsegrain. timeouts lead to idle periods Fast retransmit: use duplicate ACKs to trigger retransmission Fast Retransmit Problem: coarsegrain TCP timeouts lead to idle periods Fast retransmit: use duplicate ACKs to trigger retransmission Packet 1 Packet 2 Packet 3 Packet 4 Packet 5 Packet 6 Sender Receiver

More information

Lecture-4. TCP/IP-Overview:

Lecture-4. TCP/IP-Overview: Lecture-4 TCP/IP-Overview: The history goes back to ARPANET a research network sponsored by DoD US Govt. It eventually connected hundreds of universities and govt installations, using leased telephone

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Eighth Edition by William Stallings Chap2: 1 Need For Protocol Architecture data exchange can involve

More information

Schahin Rajab TCP or QUIC Which protocol is most promising for the future of the internet?

Schahin Rajab TCP or QUIC Which protocol is most promising for the future of the internet? Schahin Rajab sr2@kth.se 2016 04 20 TCP or QUIC Which protocol is most promising for the future of the internet? Table of contents 1 Introduction 3 2 Background 4 2.1 TCP 4 2.2 UDP 4 2.3 QUIC 4 2.4 HTTP

More information

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

CCNA 1 Chapter 7 v5.0 Exam Answers 2013 CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the

More information

Operating Systems CS 571

Operating Systems CS 571 Computer Networks: Overview Operating Systems CS 571 Network types Range Bandwidth (Mbps) Latency (ms) LAN 1-2 kms 10-1000 1-10 WAN worldwide 0.010-600 100-500 MAN 2-50 kms 1-150 10 Wireless LAN 0.15-1.5

More information

Network.... communication system for connecting end- systems. End-systems a.k.a. hosts PCs, workstations dedicated computers network components

Network.... communication system for connecting end- systems. End-systems a.k.a. hosts PCs, workstations dedicated computers network components Networking 1 Network... communication system for connecting end- systems End-systems a.k.a. hosts PCs, workstations dedicated computers network components 2 Multiaccess vs.. Point-to-point Multiaccess

More information

Chapter 7. Local Area Network Communications Protocols

Chapter 7. Local Area Network Communications Protocols Chapter 7 Local Area Network Communications Protocols The Network Layer The third layer of the OSI Model is the network layer. The network layer is concerned with providing a means for hosts to communicate

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 4: Transport Layer Literature: Forouzan: ch 11-12 2004 Image Coding Group, Linköpings Universitet Lecture 4: Outline Transport layer responsibilities UDP TCP 2 Transport layer in OSI model Figure

More information

Networking and Health Information Exchange: ISO Open System Interconnection (OSI)

Networking and Health Information Exchange: ISO Open System Interconnection (OSI) Networking and Health Information Exchange: ISO Open System Interconnection (OSI) Lecture 4 Audio Transcript Slide 1 Welcome to Networking and Health Information Exchange, ISO Open System Interconnection

More information

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking

More information

Lecture 11. Transport Layer (cont d) Transport Layer 1

Lecture 11. Transport Layer (cont d) Transport Layer 1 Lecture 11 Transport Layer (cont d) Transport Layer 1 Agenda The Transport Layer (continue) Connection-oriented Transport (TCP) Flow Control Connection Management Congestion Control Introduction to the

More information

Defining Networks with the OSI Model. Module 2

Defining Networks with the OSI Model. Module 2 Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided. 223 Chapter 19 Inter mediate TCP The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research that the Defense Advanced Research Projects Agency

More information

Chapter 2 Network Models 2.1

Chapter 2 Network Models 2.1 Chapter 2 Network Models 2.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 2-1 LAYERED TASKS We use the concept of layers in our daily life. As an example,

More information

Advanced Computer Networking. CYBR 230 Jeff Shafer University of the Pacific QUIC

Advanced Computer Networking. CYBR 230 Jeff Shafer University of the Pacific QUIC CYBR 230 Jeff Shafer University of the Pacific QUIC 2 It s a Google thing. (Originally) 3 Google Engineering Motivations Goal: Decrease end-user latency on web To increase user engagement So they see more

More information

Multiple unconnected networks

Multiple unconnected networks TCP/IP Life in the Early 1970s Multiple unconnected networks ARPAnet Data-over-cable Packet satellite (Aloha) Packet radio ARPAnet satellite net Differences Across Packet-Switched Networks Addressing Maximum

More information

CCNA 1 v3.11 Module 11 TCP/IP Transport and Application Layers

CCNA 1 v3.11 Module 11 TCP/IP Transport and Application Layers CCNA 1 v3.11 Module 11 TCP/IP Transport and Application Layers 2007, Jae-sul Lee. All rights reserved. 1 Agenda 11.1 TCP/IP Transport Layer 11.2 The Application Layer What does the TCP/IP transport layer

More information

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections Application / Transport Interface Application requests service from transport layer Transport Layer Application Layer Prepare Transport service requirements Data for transport Local endpoint node address

More information

Chapter 24. Transport-Layer Protocols

Chapter 24. Transport-Layer Protocols Chapter 24. Transport-Layer Protocols 23.1 Introduction 23.2 User Datagram Protocol 23.3 Transmission Control Protocol 23.4 SCTP Computer Networks 24-1 Position of Transport-Layer Protocols UDP is an unreliable

More information

Outline. CS5984 Mobile Computing HTTP. HTTP (especially 1.0) Problems 1/2. Dr. Ayman Abdel-Hamid, CS5984. Wireless Web.

Outline. CS5984 Mobile Computing HTTP. HTTP (especially 1.0) Problems 1/2. Dr. Ayman Abdel-Hamid, CS5984. Wireless Web. CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline HTTP HTTP 1.0 problems Approaches to help wireless access HTTP 1.1 enhancements System Architecture for Web

More information

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples. About the Tutorial Internet Protocol version 4 (IPv4) is the fourth version in the development of the Internet Protocol (IP) and the first version of the protocol to be widely deployed. IPv4 is described

More information

TSIN02 - Internetworking

TSIN02 - Internetworking TSIN02 - Internetworking Literature: Lecture 4: Transport Layer Forouzan: ch 11-12 Transport layer responsibilities UDP TCP 2004 Image Coding Group, Linköpings Universitet 2 Transport layer in OSI model

More information

Network Models. Behrouz A. Forouzan Data communication and Networking Fourth edition

Network Models. Behrouz A. Forouzan Data communication and Networking Fourth edition Chapter 2 Network Models Behrouz A. Forouzan Data communication and Networking Fourth edition 1 Layered Tasks We use the concept of layers in our daily life. As an example, let us consider two friends

More information

UDP and TCP. Introduction. So far we have studied some data link layer protocols such as PPP which are responsible for getting data

UDP and TCP. Introduction. So far we have studied some data link layer protocols such as PPP which are responsible for getting data ELEX 4550 : Wide Area Networks 2015 Winter Session UDP and TCP is lecture describes the two most common transport-layer protocols used by IP networks: the User Datagram Protocol (UDP) and the Transmission

More information

ETSF05/ETSF10 Internet Protocols Transport Layer Protocols

ETSF05/ETSF10 Internet Protocols Transport Layer Protocols ETSF05/ETSF10 Internet Protocols Transport Layer Protocols 2016 Jens Andersson Transport Layer Communication between applications Process-to-process delivery Client/server concept Local host Normally initialiser

More information