CS4/MSc Computer Networking. Lectures 4-5 Transport layer protocols TCP/UDP automatic repeat request
|
|
- Tamsyn Pearson
- 5 years ago
- Views:
Transcription
1 S4/MSc omputer Networking Lectures 4-5 Transport layer protocols TP/UDP automatic repeat request omputer Networking, opyright University o Edinburgh 005
2 Transport services and protocols provide logical communication between app processes running on dierent hosts Multiplexing/demultiplexing transport protocols run in end systems send side: breaks app messages into segments, passes to network layer rcv side: reassembles segments into messages, passes to app layer network layer provides logical communication between hosts application transport network data link physical network data link physical logical end-end transport network data link physical network data link physical network data link physical network data link physical application transport network data link physical
3 Basic services o transport protocols Depends on what is oered by the network layer Error control build a reliable channel between two peers Flow control allow the receiver to regulate the low o data Synchronization/time recovery or media streams (audio/video) they must be played back at the correct rate. Security: Privacy ensure no-one can read the inormation Integrity no-one can change what is transmitted uthentication veriy the identity o sender/receiver Implementation eiciency: network/link utilisation Idle time Header overhead 3
4 End-to-end or hop-by-hop? service eature can be provided by implementing a protocol end-to-end across the network across every hop in the network End-to-end advantages Simplicity, scalability, maintainability, interoperability, cost» Only two nodes are involved» Hop-by-hop only works i the service is provided at every hop an provide a service over channels that do not/cannot provide the same service: e.g. encryption Hop-by-hop advantages Speed cannot provide a ast service over a slow channel Reliability when using noisy links» Transmission o a large ile over a number o links with high bit error rate 4
5 Internet transport layer protocols: UDP Stands or User Datagram Protocol Unreliable, connectionless transport layer protocol Services beyond IP : demultiplexing and (optional) error checking Source Port Destination Port UDP Length UDP hecksum Data Port numbers added in the header» Identiy the particular application in the given host Optional checksum on the whole datagram» 0 checksum value means no checksum wanted» a checksum calculated to be 0 has to be included as all s» IP checksum algorithm uses s complement arithmetic; so all s = 0 5
6 UDP (cont) The datagram padded out to a multiple o 6 bits or checksum calculation» but the padding not transmitted pseudo-header also included in the checksum calculation» and not transmitted with the datagram Source IP ddress Destination IP ddress Protocol = 7 UDP Length Permits a check that the datagram has reached the correct destination orrupted datagrams are discarded» no error message returned to source 6
7 Error control protocols What is needed: Error detection special data encoding, R, etc Timeouts timers, interrupts, reverse channel to receive acknowledgements, positive or negative utomatic Repeat Request (RQ) amily o protocols Stop and wait Go back N Selective repeat ssumption (or now): channels are like wires, PDUs cannot arrive out-o-order Types o PDUs: Inormation transer user data ontrol acknowledgements, etc. 7
8 Stop and wait Basic idea: Send ame Wait or acknowledgement o receipt I ack does not arrive by some reasonable time, re-transmit ame What can go wrong? Frame is lost or has errors cknowledgement is lost/garbled 8
9 Inormation ames must be numbered B Frame 0 Time-out Frame Frame Frame Time B Frame 0 Time-out Frame Frame Frame Time Neither transmitter nor receiver have a global view o the situation The transmitter cannot distinguish between a lost ame or lost ack it just retransmits the ame The receiver does not know i a ame is new or a retransmission Solution: the inormation ames are numbered 9
10 ck ames must be numbered too B Time-out Frame 0 Frame 0 Frame Frame Time Premature timeouts may result in multiple acks or the same inormation ame The transmitter may misinterpret a duplicate ack as an ack or a subsequent ame I that ame is lost, the sender will never know about it Solution: cks are numbered too 0
11 Stop and wait (with sequencing numbers) Transmitter keeps track o the sequence number S last o the ame being sent plus the ame itsel, in case it needs to be retransmitted Receiver keeps track only o the sequence number o the next ame it is expecting to receive, R next Sequence number cannot get too large Limited, ixed space in the header -bit sequence number adequate in this case ombination o S last and R next orms the state o the transmission link S last will be 0 or ; R next will be 0 or thereore our states : (0,0), (0,), (,0), (,) depending on which ame has been transmitted and which s received
12 Stop and wait: state machine Global State: (S last, R next ) (0,0) Error-ee ame 0 (0,) arrives at receiver or ame arrives at transmitter Error-ee ame (,0) arrives at receiver (,) or ame 0 arrives at transmitter One veriied ame transmission corresponds to hal a cycle in the FSM
13 Link utilisation The link is an important resource, its utilisation must be maximised First ame bit enters channel Last ame bit enters channel hannel idle while transmitter waits or arrives t B t First ame bit arrives at receiver Last ame bit arrives at receiver Receiver processes ame and prepares 3
14 Stop and wait: ame transmission time t 0 = total time to transmit ame t proc B t prop ame t time t proc t prop t ack t 0 = = t t prop prop + + t t proc proc + + t n R + t + ack n R a bits/ino ame bits/ ame channel transmission rate 4
15 Stop and wait: eiciency Eective transmission rate: R 0 e bits or header & R number o inormation bits delivered to destination n = = total time required to deliver the inormation bits t 0 n o, Transmission eiciency: R e R n = n t0 R o = + n n a + n n ( t o prop + t n proc ) R. Eect o ame overhead Eect o ame Eect o Delay-Bandwidth Product 5
16 Stop and wait: Impact o transmission errors in eiciency Previous calculations assume error-ee transmission In presence o errors the eective bit rate drops P probability o an error in a ame (data or ack) transmission verage number o retransmissions: /(-P ) Total time to transer ame becomes t = t 0 P = (t prop + t proc Transmission eiciency multiplied (drops) by (-P ) + n R + n R a ) P Link error rate is usually quoted as probability o error or single bit 6
17 Go-back-N The source o Stop-and-Wait ineiciency is that it does not ill the channel with data Improve Stop-and-Wait by not waiting or an ack beore sending the next packet i.e. pipeline the ame transmission Transmitter has a limited number o ames (called a window) that can be outstanding without acknowledgment : W s W s is chosen to allow the channel to be ully utilised Frames are numbered cks are also numbered 7
18 Example: Go-back-4 Go-Back-4: 4 ames are outstanding; so go back Time B 3 out o sequence ames R next When there are ewer than Ws- subsequent packets to send retransmissions are not triggered, since the window is not exhausted Need to associate a timer with every packet 8
19 Go-back-N with timeouts Transmitter Send Window... Receiver Receive Window Frames transmitted and ed Timer Timer S last S recent S last +W s - Timer Buers S last S last +... S recent... S last +W s - oldest un- ed ame most recent transmission max Seq # allowed When #X is received, assume all ames up to X are received, even i previous s did not reach the xmitter Frames received R next Receiver will only accept a ame that is error-ee and that has sequence number R next When such ame arrives R next is incremented by one, so the receive window slides orward by one Receiver sends an with seq. number R next or error-ee but out o sequence ames 9
20 Go-back-N: window size I there are m bits available in the header or sequencing, which is the largest possible value or W S? receiver must be able to determine unambiguously which ame has been received taking into account the wrapping around when count reaches m M = = 4, Go-Back - 4: Transmitter goes back Time B R next Receiver has R next = 0, but it does not know whether its or ame 0 was received, so it does not know whether this is the old ame 0 or a new ame 0 onclusion: W S <= m - 0
21 Go-back-N with negative acknowledgments Go-Back-7: Transmitter goes back to ame time B N Out-o-sequence ames N with sequence number R next acknowledges all ames up to R next - and hints the transmitter that an error has been detected in ame R next Go-back-N with N, results in having the transmitter go back less than N ames, so speeds up error recovery
22 Go-back-N with bidirectional inormation low Xmitter and receiver unctions o the protocol implemented at both ends cknowledgement ames can be piggybacked into headers o I-ames Signiicant improvement in use o bandwidth: separate acknowledge ames can oten be avoided I no ames are yet ready to be transmitted to piggyback into, receiver can set an timer» that deines the maximum time it will wait or a suitable I-ame» i it expires, a separate control ame can be sent with the acknowledgment receiver handles out-o sequence packets slightly dierently: corrupted ame is ignored Out o sequence, error-ee ames are discarded, but the sequence number is extracted and processed
23 Go-back-N perormance t η GBN GBN = t ( P n no tgbn = R ) + P { t s Wst + P no n = + ( W ) P } = t ( P + ) P W t s P and Delay-bandwidth product determines W s Propagation delay is not part o t GEN because go-back-n does not wait or the acknowledgement beore sending the next ame When errors occur W S ames are transmitted Best possible eiciency is Just header overhead n n o 3
24 Selective-Repeat Go-back-N perorms badly in noisy channels Retransmits more than the minimum required Selective-repeat improvements: Reception window is made larger so it accepts (error-ee) out-o-order ames Only individual ames are retransmitted More storage is required at the receiver omplexity is higher 4
25 Selective-Repeat: Operation example Time B Ns are not essential; speed-up the retransmission o a speciic ame I N not used (or lost) a timeout will eventually cause retransmission The basic objective remains to advance the values o R next and S last by delivery o the oldest outstanding ame N
26 Selective-Repeat: Window sizes Example: M= =4, Ws=3, Wr=3 Send Window {0,,} {,} {} {.} 0 0 Frame 0 resent Time Receive Window B 3 {0,,} {,,3} {,3,0} {3,0,} Old ame 0 accepted as a new ame because it alls in the receive window 6
27 Selective-Repeat: max window sizes Worst case scenario: Try to ool receiver into believing that a retransmission o ame 0 is a new ame, numbered 0 because the sequence # wrapped around ll ames (0 W S -) are received correctly ll s (and Ns) are lost Receive window is then W S W S +W R - Frame W S +W R will not be accepted until the transmitter gets ame 0 acknowledged (by an # in the range to W S ) Thus, max window sizes: W S +W R = m m - 0 m - 0 send window S last W s - W s +W r - R next W s receive window 7
28 Selective repeat perormance t SR = t P η SR = t n R n o /( P ) = ( n n o )( P ) Propagation delay depends only on probability o error in transmission ssuming channel is always ull, i.e. send window > bandwidth delay product Best possible eiciency is Same as go-back-n n n o 8
29 RQ protocols, comparison o eiciency ssume header, ack overheads are negligible # ames in transit: L = (t prop +t proc )R/n =(W s -) η SR Eiciency ( P ) η GBN P + LP Bit error rate (log 0 ) η SW P + L Selective Repeat Go Back N 0 Stop and Wait 0 Go Back N 00 Stop and Wait 00 9
30 Flow control protocols The receiver has limited buer space to store ames I the transmitter sends data at a higher rate, the buer can overlow and some o the transerred data will be dropped mechanism is needed so that the receiver can tell the transmitter to slow down (or stop) or speed-up again Implementation requires: Detection o potential buer overlow reverse channel or low control messages to transmitter Two types o ames: Inormation transer user data Flow-control ames 30
31 X ON \ X OFF protocol threshold Inormation ame Transmitter Receiver Transmit X OFF Transmit Time on o o on B Time T prop Receiver must activate OFF signal while T prop R bits still remain in buer 3
32 Sliding window low control The sliding window protocols can be used or low control; set W s equal to receiver buer size Transmitter can never send more than W s ames s slide window orward = permit transmission o new ames s are called credits in this case Flow control can be combined with error control in a sliding window RQ protocol Window size depends on bandwidth-delay product and size o receiver s buer lternative: extend ame header with an extra ield or control-low credits; decouples credits om acks 3
33 ombining selective repeat with low control Send Window S last + W a R last R last + W R ames transmitted & ed S last S last + W s S recent R next R new Receive Window S last oldest unacknowledged ame S recent highest-numbered transmitted ame S last +W a - highest-numbered ame that can be transmitted S last +W s - highest-numbered ame that can be accepted om the application R last highest-numbered ame not yet read by the application R next next expected ame R new highest numbered ame received correctly R last +W R - highest-numbered ame that can be accommodated in receive buer dvertised window: W a = W R -(R new - R last ) the number o currently available buers, included in the ame header 33
34 End-to-end protocols Problems (only when lower layer provides datagram service) Packets arrive out o order Old packets (even om previous connections) reappear» The correct packet could be wrongly rejected as a duplicate Solution Packets have a maximum lietime areully selected initial sequence number» Implies agreement, implies connection establishment procedure Sequence number space is large, but legal windows are (relatively) small Wait or a reasonable time beore re-establishing a connection End-to-end delays are subject to more variation How to select a reasonable timeout? 34
35 Sequence numbers ssume T is (a multiple o) maximum packet (and ack) lietime Must ensure two packets (or the same pair o hosts and sockets) with same sequence number are never outstanding or a time dierence o T Thus i they do, they must be duplicates o the same packet retransmitted Each computer has a timer (counter) Not synchronised. Synchronisation is very hard/expensive! Sequence numbers created om the timer Sequence space large, so or a single connection, wrap around time is much larger than T The two peers agree on an initial sequence number 35
36 Sequence numbers - Problems rashes cause problem: which was the last sequence number? Expensive solution: wait or T beore doing anything lternatively, impose urther restrictions on sequence numbers The current timer (= potential initial seq number) determines a set o sequence numbers (in existing connections) that should not be used. Sequence number Forbidden region T Forbidden region T Time Rate o actual sequence numbers cannot be steeper than the timer Fast timers needed Eventually will enter the orbidden region on the right 36
37 End-to-end retransmission timeout Timeout depends on round trip time (RTT): time om when segment is sent to when is received Round trip time (RTT) across a network (esp. Internet) is highly variable Routes vary and can change in mid-connection Traic luctuates Timeout too short: excessive number o retransmissions Timeout too long: recovery too slow daptive estimation o RTT used in TP Measure RTT each time received: τ n α = 7/8 typical t RTT (new) = α t RTT (old) + ( α) τ n 37
38 Timeout using RTT variability RTT (milliseconds) time (seconnds) SampleRTT Estimated RTT Estimate variance σ o RTT variation Estimate or timeout: t out = t RTT + k σ RTT I RTT highly variable, timeout increase accordingly I RTT nearly constant, timeout close to RTT estimate 38
39 TP: Overview RFs: 793,, 33, 08, 58 point-to-point: one sender, one receiver reliable, in-order byte steam: no message boundaries pipelined: TP congestion and low control set window size send & receive buers Transmitter pplication byte stream segments pplication byte stream Receiver ull duplex data: bi-directional data low in same connection MSS: maximum segment size connection-oriented: handshaking (exchange o control msgs) init s sender, receiver state beore data exchange low controlled: sender will not overwhelm receiver Send s buer Receive buer 39
40 TP segment structure URG: urgent data (generally not used) : # valid PSH: push data now (generally not used) RST, SYN, FIN: connection estab (setup, teardown commands) Internet checksum (as in UDP) 3 bits source port # dest port # head len sequence number acknowledgement number not used U P checksum R S F Receive window application data (variable length) Urg data pnter Options (variable length) counting by bytes o data (not segments!) # bytes rcvr willing to accept 40
41 onnection Establishment Three-way handshake Host Host B SYN, Seq_no = x SYN, Seq_no = y,, ck_no = x+ Seq_no = x+,, ck_no = y+ sends connection request to B» SYN=; initial sequence number = x B acknowledges connection request» =; SYN=; initial sequence number = y; next data byte expected=x+» s SYN consumes the irst sequence number acknowledges the request om B» =; sequence number = x+; next data byte expected=y+» on receipt at B, connection is established 4
42 onnection Termination There is no protocol that can do this 00% saely! The two army problem: the side that sends the last message cannot know i it has been received at the other side The inal message (ack) is allowed to be lost 4
43 TP onnection Termination Each end o a TP connection terminates independently Host receives the or the last data, it sends a segment with FIN Host B receives the FIN segment, inorms its application that the other entity has terminated its connection and s the FIN Host B can still transmit in the other direction until it has inished Host B eventually also sends a FIN segment Host receives FIN, replies with and goes into a wait state Starts a TIME-WIT timer set to x maximum segment lietime» st MSL accounts or time a segment in one direction can remain in the network» nd MSL accounts or the transit time o the reply The only valid segment that can arrive in this interval is a retransmission o the FIN segment (e.g. i the was lost)» i a FIN retransmission is detected, the is retransmitted and the timer restarted Wait state means old session segments are gone beore termination 43
INF4/MSc Computer Networking. Lectures 3-4 Transport layer protocols TCP/UDP automatic repeat request
INF4/MSc omputer Networking Lectures 3-4 Transport layer protocols TP/UDP automatic repeat request Transport services and protocols provide logical communication between app processes running on different
More informationCSE3213 Computer Network I
SE33 omputer Network I Service Model, Error ontrol, Flow ontrol, and Link Sharing (h. 5. 5.3. and 5.7.) ourse page: http://www.cse.yorku.ca/course/33 Slides modiied om lberto Leon-Garcia and Indra Widjaja
More informationChapter 5 Peer-to-Peer Protocols and Data Link Layer
Chapter 5 Peer-to-Peer Protocols and Data Link Layer PRT I: Peer-to-Peer Protocols Peer-to-Peer Protocols and Service Models RQ Protocols and Reliable Data Transfer Flow Control Timing Recovery TCP Reliable
More information32 bits. source port # dest port # sequence number acknowledgement number not used. checksum. Options (variable length)
Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer 3.5 Connectionoriented transport: TCP segment
More informationCorrecting mistakes. TCP: Overview RFCs: 793, 1122, 1323, 2018, TCP seq. # s and ACKs. GBN in action. TCP segment structure
Correcting mistakes Go-back-N: big picture: sender can have up to N unacked packets in pipeline rcvr only sends cumulative acks doesn t ack packet if there s a gap sender has r for oldest unacked packet
More informationLecture 5. Transport Layer. Transport Layer 1-1
Lecture 5 Transport Layer Transport Layer 1-1 Agenda The Transport Layer (TL) Introduction to TL Protocols and Services Connectionless and Connection-oriented Processes in TL Unreliable Data Transfer User
More informationSuprakash Datta. Office: CSEB 3043 Phone: ext Course page:
CSE 3214: Computer Networks Protocols and Applications Suprakash Datta datta@cse.yorku.ca Office: CSEB 3043 Phone: 416-736-2100 ext 77875 Course page: http://www.cse.yorku.ca/course/3214 These slides are
More informationLecture 08: The Transport Layer (Part 2) The Transport Layer Protocol (TCP) Dr. Anis Koubaa
NET 331 Computer Networks Lecture 08: The Transport Layer (Part 2) The Transport Layer Protocol (TCP) Dr. Anis Koubaa Reformatted slides from textbook Computer Networking a top-down appraoch, Fifth Edition
More informationCSE 4213: Computer Networks II
Next CSE 4213: Computer Networks II The layer Suprakash Datta datta@cs.yorku.ca Office: CSEB 3043 Phone: 416-736-2100 ext 77875 Course page: http://www.cs.yorku.ca/course/4213 These slides are adapted
More informationTransport Layer: outline
Transport Layer: outline Transport-layer services Multiplexing and demultiplexing Connectionless transport: UDP Principles of reliable data transfer Connection-oriented transport: TCP Segment structure
More informationRSC Part III: Transport Layer 3. TCP
RSC Part III: Transport Layer 3. TCP Redes y Servicios de Comunicaciones Universidad Carlos III de Madrid These slides are, mainly, part of the companion slides to the book Computer Networking: A Top Down
More informationLecture 3: The Transport Layer: UDP and TCP
Lecture 3: The Transport Layer: UDP and TCP Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 3-1 The Transport Layer Provides efficient and robust end-to-end
More informationTransport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections
Application / Transport Interface Application requests service from transport layer Transport Layer Application Layer Prepare Transport service requirements Data for transport Local endpoint node address
More informationCS Lecture 1 Review of Basic Protocols
CS 557 - Lecture 1 Review of Basic Protocols IP - RFC 791, 1981 TCP - RFC 793, 1981 Spring 2013 These slides are a combination of two great sources: Kurose and Ross Textbook slides Steve Deering IETF Plenary
More informationChapter 3 Transport Layer
Chapter 3 Transport Layer Reti degli Elaboratori Canale AL Prof.ssa Chiara Petrioli a.a. 2013/2014 We thank for the support material Prof. Kurose-Ross All material copyright 1996-2012 J.F Kurose and K.W.
More informationCSCD 330 Network Programming
CSCD 330 Network Programming Lecture 10 Transport Layer Continued Spring 2018 Reading: Chapter 3 Some Material in these slides from J.F Kurose and K.W. Ross All material copyright 1996-2007 1 Last Time.
More informationTransport Layer: Outline
Transport Layer: Outline Transport-layer services Multiplexing and demultiplexing Connectionless transport: UDP Principles of reliable data transfer Connection-oriented transport: TCP Segment structure
More informationThe Transport Layer: TCP & Reliable Data Transfer
The Transport Layer: TCP & Reliable Data Transfer Smith College, CSC 249 February 15, 2018 1 Chapter 3: Transport Layer q TCP Transport layer services: v Multiplexing/demultiplexing v Connection management
More informationTCP. TCP: Overview. TCP Segment Structure. Maximum Segment Size (MSS) Computer Networks 10/19/2009. CSC 257/457 - Fall
TCP Kai Shen 10/19/2009 CSC 257/457 - Fall 2009 1 TCP: Overview connection-oriented: handshaking (exchange of control msgs) to initialize sender, receiver state before data exchange pipelined: multiple
More informationCMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 9
CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 9 1 Chapter 3 outline 3.1 transport-layer services 3.2 multiplexing and demultiplexing 3.3
More informationChapter 3 outline. 3.5 connection-oriented transport: TCP segment structure reliable data transfer flow control connection management
Chapter 3 outline 3.1 transport-layer services 3.2 multiplexing and demultiplexing 3.3 connectionless transport: UDP 3.4 principles of reliable data transfer 3.5 connection-oriented transport: TCP segment
More informationUser Datagram Protocol
Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram
More informationLecture 8. TCP/IP Transport Layer (2)
Lecture 8 TCP/IP Transport Layer (2) Outline (Transport Layer) Principles behind transport layer services: multiplexing/demultiplexing principles of reliable data transfer learn about transport layer protocols
More informationCSC 4900 Computer Networks: TCP
CSC 4900 Computer Networks: TCP Professor Henry Carter Fall 2017 Project 2: mymusic You will be building an application that allows you to synchronize your music across machines. The details of which are
More informationChapter 3 Transport Layer
Chapter 3 Transport Layer Part b Connection-Oriented Transport Transport Layer 3-1 Chapter 3 outline 3.1 transport-layer services 3.2 multiplexing and demultiplexing 3.3 connectionless transport: UDP 3.4
More informationComputer Communication Networks Midterm Review
Computer Communication Networks Midterm Review ICEN/ICSI 416 Fall 2018 Prof. Aveek Dutta 1 Instructions The exam is closed book, notes, computers, phones. You can use calculator, but not one from your
More informationComputer Networking Introduction
Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.10 Chapter 3 outline 3.1 transport-layer services 3.2 multiplexing and
More informationUNIT IV -- TRANSPORT LAYER
UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission
More information10 minutes survey (anonymous)
10 minutes survey (anonymous) v Comments/Suggestions to my lecture/lab/ homework/exam v If you like this course, which part do you like? v If you don t like it, which part do you not like? Thanks! Transport
More informationTransport layer. UDP: User Datagram Protocol [RFC 768] Review principles: Instantiation in the Internet UDP TCP
Transport layer Review principles: Reliable data transfer Flow control Congestion control Instantiation in the Internet UDP TCP 1 UDP: User Datagram Protocol [RFC 768] No frills, bare bones Internet transport
More informationTransport layer. Review principles: Instantiation in the Internet UDP TCP. Reliable data transfer Flow control Congestion control
Transport layer Review principles: Reliable data transfer Flow control Congestion control Instantiation in the Internet UDP TCP 1 UDP: User Datagram Protocol [RFC 768] No frills, bare bones Internet transport
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Transport Layer Connection Oriented Transport: TCP Sec 3.5 Prof. Lina Battestilli Fall 2017 Transport Layer Chapter 3 Outline 3.1 Transport-layer Services
More informationUser Datagram Protocol (UDP):
SFWR 4C03: Computer Networks and Computer Security Feb 2-5 2004 Lecturer: Kartik Krishnan Lectures 13-15 User Datagram Protocol (UDP): UDP is a connectionless transport layer protocol: each output operation
More informationTCP : Fundamentals of Computer Networks Bill Nace
TCP 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia Lab #1 due now! Reminder: Paper Review
More informationApplication. Transport. Network. Link. Physical
Transport Layer ELEC1200 Principles behind transport layer services Multiplexing and demultiplexing UDP TCP Reliable Data Transfer TCP Congestion Control TCP Fairness *The slides are adapted from ppt slides
More informationOutline. TCP: Overview RFCs: 793, 1122, 1323, 2018, steam: r Development of reliable protocol r Sliding window protocols
Outline r Development of reliable protocol r Sliding window protocols m Go-Back-N, Selective Repeat r Protocol performance r Sockets, UDP, TCP, and IP r UDP operation r TCP operation m connection management
More informationCS 4390 Computer Networks. Pointers to Corresponding Section of Textbook
CS 4390 Computer Networks UT D application transport network data link physical Session 10 Transmission Control Protocol (TCP) An Overview Adapted from Computer Networking a Top-Down Approach 1996-2012
More informationChapter III: Transport Layer
Chapter III: Transport Layer UG3 Computer Communications & Networks (COMN) Mahesh Marina mahesh@ed.ac.uk Slides thanks to Myungjin Lee and copyright of Kurose and Ross TCP: Overview RFCs: 793,1122,1323,
More informationCOMP 431 Internet Services & Protocols. Transport Layer Protocols & Services Outline. The Transport Layer Reliable data delivery & flow control in TCP
COMP 431 Internet Services & Protocols Transport Layer Protocols & Services Outline The Transport Layer Reliable data delivery & flow control in TCP Jasleen Kaur Fundamental transport layer services» Multiplexing/Demultiplexing»
More informationNWEN 243. Networked Applications. Layer 4 TCP and UDP
NWEN 243 Networked Applications Layer 4 TCP and UDP 1 About the second lecturer Aaron Chen Office: AM405 Phone: 463 5114 Email: aaron.chen@ecs.vuw.ac.nz Transport layer and application layer protocols
More informationCS457 Transport Protocols. CS 457 Fall 2014
CS457 Transport Protocols CS 457 Fall 2014 Topics Principles underlying transport-layer services Demultiplexing Detecting corruption Reliable delivery Flow control Transport-layer protocols User Datagram
More informationOutline. TCP: Overview RFCs: 793, 1122, 1323, 2018, Development of reliable protocol Sliding window protocols
Outline Development of reliable protocol Sliding window protocols Go-Back-N, Selective Repeat Protocol performance Sockets, UDP, TCP, and IP UDP operation TCP operation connection management flow control
More informationFall 2012: FCM 708 Bridge Foundation I
Fall 2012: FCM 708 Bridge Foundation I Prof. Shamik Sengupta Instructor s Website: http://jjcweb.jjay.cuny.edu/ssengupta/ Blackboard Website: https://bbhosted.cuny.edu/ Intro to Computer Networking Transport
More informationTransport Protocols. Raj Jain. Washington University in St. Louis
Transport Protocols Raj Jain Washington University Saint Louis, MO 63131 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 16-1 Overview q TCP q Key features
More informationChapter 3 outline. 3.5 Connection-oriented transport: TCP. 3.6 Principles of congestion control 3.7 TCP congestion control
Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer 3.5 Connection-oriented transport: TCP segment
More informationChapter 3 Transport Layer
Chapter 3 Transport Layer A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationCS450 Introduc0on to Networking Lecture 14 TCP. Phu Phung Feb 13, 2015
CS450 Introduc0on to Networking Lecture 14 TCP Phu Phung Feb 13, 2015 Next lecture (Feb 16) Assignment 3 (No iclicker ques0ons) Wireshark links Guest lecture on Monday Feb 23 rd DNS Security Midterm exam
More informationChapter 3- parte B outline
Chapter 3- parte B outline 3.1 transport-layer services 3.2 multiplexing and demultiplexing 3.3 connectionless transport: UDP 3.4 principles of reliable data transfer 3.5 connection-oriented transport:
More informationECE697AA Lecture 3. Today s lecture
ECE697AA Lecture 3 Transport Layer: TCP and UDP Tilman Wolf Department of Electrical and Computer Engineering 09/09/08 Today s lecture Transport layer User datagram protocol (UDP) Reliable data transfer
More informationLecture 20 Overview. Last Lecture. This Lecture. Next Lecture. Transport Control Protocol (1) Transport Control Protocol (2) Source: chapters 23, 24
Lecture 20 Overview Last Lecture Transport Control Protocol (1) This Lecture Transport Control Protocol (2) Source: chapters 23, 24 Next Lecture Internet Applications Source: chapter 26 COSC244 & TELE202
More informationTransport Protocols and TCP
Transport Protocols and TCP Functions Connection establishment and termination Breaking message into packets Error recovery ARQ Flow control Multiplexing, de-multiplexing Transport service is end to end
More informationCS 43: Computer Networks. 18: Transmission Control Protocol October 12-29, 2018
CS 43: Computer Networks 18: Transmission Control Protocol October 12-29, 2018 Reading Quiz Lecture 18 - Slide 2 Midterm topics Abstraction, Layering, End-to-end design HTTP, DNS, Email, BT, etc. (app
More informationTransport Layer Marcos Vieira
Transport Layer 2014 Marcos Vieira Transport Layer Transport protocols sit on top of network layer and provide Application-level multiplexing ( ports ) Error detection, reliability, etc. UDP User Datagram
More informationCNT 6885 Network Review on Transport Layer
CNT 6885 Network Review on Transport Layer Jonathan Kavalan, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida User Datagram Protocol [RFC 768] no frills,
More informationCSCE 463/612 Networks and Distributed Processing Spring 2017
CSCE 463/612 Networks and Distributed Processing Spring 2017 Transport Layer IV Dmitri Loguinov Texas A&M University March 9, 2017 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter
More informationChapter 5 Peer-to-Peer Protocols. School of Info. Sci. & Eng. Shandong Univ..
hapter 5 Peer-to-Peer Protocols School of Info. Sci. & Eng. Shandong Univ.. Outline 5. Peer-to-peer protocols and service models 5. RQ Protocols 5.3 Other daptation Functions Sliding Window Flow ontrol
More informationCC451 Computer Networks
CC451 Computer Networks Lecture 6 Transport Layer (cont d) Transport Layer 3-1 Chapter 3 Transport Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty,
More informationNetworking Technologies and Applications
Networking Technologies and Applications Rolland Vida BME TMIT Transport Protocols UDP User Datagram Protocol TCP Transport Control Protocol and many others UDP One of the core transport protocols Used
More informationChapter 3 outline. TDTS06 Computer networks. Principles of Reliable data transfer. Reliable data transfer: getting started
Chapter 3 outline TDTS06 Computer networks Lecture 4: Transport layer II Reliable data delivery and TCP Jose M. Peña, jospe@ida.liu.se IDA/ADIT, LiU 2009-08-28 3.1 Transport-layer services 3.2 Multiplexing
More informationChapter 3: Transport Layer Part A
Chapter 3: Transport Layer Part A Course on Computer Communication and Networks, CTH/GU The slides are adaptation of the slides made available by the authors of the course s main textbook 3: Transport
More informationAnswers to Sample Questions on Transport Layer
Answers to Sample Questions on Transport Layer 1) Which protocol Go-Back-N or Selective-Repeat - makes more efficient use of network bandwidth? Why? Answer: Selective repeat makes more efficient use of
More informationCS4700/CS5700 Fundamentals of Computer Networks
CS4700/CS5700 Fundamentals of Computer Networks Lecture 14: TCP Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu Northeastern
More informationChapter 3 Transport Layer
Chapter 3 Transport Layer All material copyright 1996-2016 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley
More information7. TCP 최양희서울대학교컴퓨터공학부
7. TCP 최양희서울대학교컴퓨터공학부 1 TCP Basics Connection-oriented (virtual circuit) Reliable Transfer Buffered Transfer Unstructured Stream Full Duplex Point-to-point Connection End-to-end service 2009 Yanghee Choi
More informationChapter 3 Transport Layer
Chapter 3 Transport Layer These slides are adapted from the original slides provided by J.Kurose and K.W Ross. All material copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
More informationChapter 6 Transport Layer
Chapter 6 Transport Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationChapter 24. Transport-Layer Protocols
Chapter 24. Transport-Layer Protocols 23.1 Introduction 23.2 User Datagram Protocol 23.3 Transmission Control Protocol 23.4 SCTP Computer Networks 24-1 Position of Transport-Layer Protocols UDP is an unreliable
More informationThe Transport Layer Reliable data delivery & flow control in TCP. Transport Layer Protocols & Services Outline
CPSC 852 Internetworking The Transport Layer Reliable data delivery & flow control in TCP Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu http://www.cs.clemson.edu/~mweigle/courses/cpsc852
More informationThe Transport Layer Reliable data delivery & flow control in TCP. Transport Layer Protocols & Services Outline
CPSC 360 Network Programming The Transport Layer Reliable data delivery & flow control in TCP Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu http://www.cs.clemson.edu/~mweigle/courses/cpsc360
More informationTCP: Overview RFCs: 793, 1122, 1323, 2018, 2581
TCP: Overview RFCs: 793, 1122, 1323, 2018, 2581 ocket door point-to-point: one sender, one receiver reliable, in-order byte steam: no message boundaries pipelined: TCP congestion and flow control set window
More informationConnection-oriented (virtual circuit) Reliable Transfer Buffered Transfer Unstructured Stream Full Duplex Point-to-point Connection End-to-end service
최양희서울대학교컴퓨터공학부 Connection-oriented (virtual circuit) Reliable Transfer Buffered Transfer Unstructured Stream Full Duplex Point-to-point Connection End-to-end service 1 2004 Yanghee Choi 2 Addressing: application
More information05 Transmission Control Protocol (TCP)
SE 4C03 Winter 2003 05 Transmission Control Protocol (TCP) Instructor: W. M. Farmer Revised: 06 February 2003 1 Interprocess Communication Problem: How can a process on one host access a service provided
More informationComputer Networks & Security 2016/2017
Computer Networks & Security 2016/2017 Transport Layer (04) Dr. Tanir Ozcelebi Courtesy: Kurose & Ross Courtesy: Forouzan TU/e Computer Science Security and Embedded Networked Systems Transport Layer Our
More informationTransport Protocols & TCP TCP
Transport Protocols & TCP CSE 3213 Fall 2007 13 November 2007 1 TCP Services Flow control Connection establishment and termination Congestion control 2 1 TCP Services Transmission Control Protocol (RFC
More informationThe Transport Layer Reliability
The Transport Layer Reliability CS 3, Lecture 7 http://www.cs.rutgers.edu/~sn4/3-s9 Srinivas Narayana (slides heavily adapted from text authors material) Quick recap: Transport Provide logical communication
More informationECE 650 Systems Programming & Engineering. Spring 2018
ECE 650 Systems Programming & Engineering Spring 2018 Networking Transport Layer Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) TCP/IP Model 2 Transport Layer Problem solved:
More informationDistributed Systems. 5. Transport Protocols
Distributed Systems 5. Transport Protocols Werner Nutt 1 5. Transport Protocols 5.1 Transport-layer Services 5.1 Transport-layer Services 5.2 Multiplexing and Demultiplexing 5.3 Connectionless Transport:
More informationNetworked Systems and Services, Fall 2018 Chapter 3
Networked Systems and Services, Fall 2018 Chapter 3 Jussi Kangasharju Markku Kojo Lea Kutvonen 4. Transport Layer Reliability with TCP Transmission Control Protocol (TCP) RFC 793 + more than hundred other
More informationTCP (Part 2) Session 10 INST 346 Technologies, Infrastructure and Architecture
TCP (Part 2) Session 10 INST 346 Technologies, Infrastructure and Architecture Muddiest Points Reading pseudocode Reading finite state diagrams What parts of rdt are in TCP? Goals for Today Finish up TCP
More informationDistributed Systems. 5. Transport Protocols. Werner Nutt
Distributed Systems 5. Transport Protocols Werner Nutt 1 5. Transport Protocols 5.1 Transport-layer Services 5.1 Transport-layer Services 5.2 Multiplexing and Demultiplexing 5.3 Connectionless Transport:
More informationPrinciples of Reliable Data Transfer
Principles of Reliable Data Transfer 1 Reliable Delivery Making sure that the packets sent by the sender are correctly and reliably received by the receiver amid network errors, i.e., corrupted/lost packets
More informationTransport Protocols Reading: Sections 2.5, 5.1, and 5.2. Goals for Todayʼs Lecture. Role of Transport Layer
Transport Protocols Reading: Sections 2.5, 5.1, and 5.2 CS 375: Computer Networks Thomas C. Bressoud 1 Goals for Todayʼs Lecture Principles underlying transport-layer services (De)multiplexing Detecting
More informationQUIZ: Longest Matching Prefix
QUIZ: Longest Matching Prefix A router has the following routing table: 10.50.42.0 /24 Send out on interface Z 10.50.20.0 /24 Send out on interface A 10.50.24.0 /22 Send out on interface B 10.50.20.0 /22
More informationTransport Protocols Reading: Sections 2.5, 5.1, and 5.2
Transport Protocols Reading: Sections 2.5, 5.1, and 5.2 COS 461: Computer Networks Spring 2006 (MW 1:30-2:50 in Friend 109) Jennifer Rexford Teaching Assistant: Mike Wawrzoniak http://www.cs.princeton.edu/courses/archive/spring06/cos461/
More informationLecture 3 The Transport Control Protocol (TCP) Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 3 The Transport Control Protocol (TCP) Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it TCP segment structure URG: urgent data (generally not used) ACK: ACK # valid PSH: push
More informationLecture 5: Flow Control. CSE 123: Computer Networks Alex C. Snoeren
Lecture 5: Flow Control CSE 123: Computer Networks Alex C. Snoeren Pipelined Transmission Sender Receiver Sender Receiver Ignored! Keep multiple packets in flight Allows sender to make efficient use of
More informationReliable Transport I: Concepts and TCP Protocol
Reliable Transport I: Concepts and TCP Protocol Stefano Vissicchio UCL Computer Science COMP0023 Today Transport Concepts Layering context Transport goals Transport mechanisms and design choices TCP Protocol
More informationTransport Layer. -UDP (User Datagram Protocol) -TCP (Transport Control Protocol)
Transport Layer -UDP (User Datagram Protocol) -TCP (Transport Control Protocol) 1 Transport Services The transport layer has the duty to set up logical connections between two applications running on remote
More informationIS370 Data Communications and Computer Networks. Chapter 5 : Transport Layer
IS370 Data Communications and Computer Networks Chapter 5 : Transport Layer Instructor : Mr Mourad Benchikh Introduction Transport layer is responsible on process-to-process delivery of the entire message.
More informationTransport Protocols and TCP: Review
Transport Protocols and TCP: Review CSE 6590 Fall 2010 Department of Computer Science & Engineering York University 1 19 September 2010 1 Connection Establishment and Termination 2 2 1 Connection Establishment
More informationNT1210 Introduction to Networking. Unit 10
NT1210 Introduction to Networking Unit 10 Chapter 10, TCP/IP Transport Objectives Identify the major needs and stakeholders for computer networks and network applications. Compare and contrast the OSI
More informationDepartment of Computer and IT Engineering University of Kurdistan. Transport Layer. By: Dr. Alireza Abdollahpouri
Department of Computer and IT Engineering University of Kurdistan Transport Layer By: Dr. Alireza Abdollahpouri TCP/IP protocol suite 2 Transport Layer The transport layer is responsible for process-to-process
More informationNetworked Systems and Services, Fall 2017 Reliability with TCP
Networked Systems and Services, Fall 2017 Reliability with TCP Jussi Kangasharju Markku Kojo Lea Kutvonen 4. Transmission Control Protocol (TCP) RFC 793 + more than hundred other RFCs TCP Loss Recovery
More informationGuide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16
Guide To TCP/IP, Second Edition Chapter 5 Transport Layer TCP/IP Protocols Objectives Understand the key features and functions of the User Datagram Protocol (UDP) Explain the mechanisms that drive segmentation,
More informationLecture 11: Transport Layer Reliable Data Transfer and TCP
Lecture 11: Transport Layer Reliable Data Transfer and TCP COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,
More informationInternet transport-layer protocols. Transport services and protocols. Sending and receiving. Connection-oriented (TCP) Connection-oriented
Transport services and protocols Internet -layer protocols logical communication between processes protocols run in end systems send side: breaks app messages into segments, passes to layer rcv side: reassembles
More informationChapter 3: Transport Layer. Chapter 3 Transport Layer. Chapter 3 outline. Transport services and protocols
Chapter 3 Transport Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationAnnouncements Computer Networking. Outline. Transport Protocols. Transport introduction. Error recovery & flow control. Mid-semester grades
Announcements 15-441 Computer Networking Lecture 16 Transport Protocols Mid-semester grades Based on project1 + midterm + HW1 + HW2 42.5% of class If you got a D+,D, D- or F! must meet with Dave or me
More informationComputer Networking: A Top Down Approach
Computer Networking: A Top Down Approach Seventh Edition Chapter 3 Transport Layer Slides in this presentation contain hyperlinks. JAWS users should be able to get a list of links by using INSERT+F7 Transport
More informationTransport Protocols Reading: Sections 2.5, 5.1, and 5.2
Transport Protocols Reading: Sections 2.5, 5.1, and 5.2 CE443 - Fall 1390 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides
More information