Transport Protocols. ISO Defined Types of Network Service: rate and acceptable rate of signaled failures.
|
|
- Ethan Shelton
- 6 years ago
- Views:
Transcription
1 Transport Protocols! Type A: ISO Defined Types of Network Service: Network connection with acceptable residual error rate and acceptable rate of signaled failures. - Reliable, sequencing network service with arbitrary message size. - Reliable, nonsequencing network service with arbitrary message size. - Reliable, nonsequencing network service with maximum message size.! Type B: Network connections with acceptable residual error rate but unacceptable rate of signaled failures.! Type C: Network connections with residual error rate not acceptable to the transport service user. Transport-1
2 Transport Layer Issues Reliable Sequencing Network Service! Addressing: How to identify the target user. Typically, the user address is specified as (Host,Port) The Port represents a particular transport service user (e.g., TELNET,FTP,HTTP,SMTP,SNMP,RTP,..). The Host represents the attached network device (e.g., the global internet address) (In TCP, the combination of port and host is referred to as a socket.! Multiplexing: Mapping transport connections onto network connections.! Flow Control: Receiver Mechanisms: - Discard TPDUs that overflow the buffer. - Refuse to accept further TPDUs from the network., - Use a sliding window protocol. - Use a credit allocation mechanism.! Connection Establishment and Termination: - Allows each end to assure that the other exists. - Allows negotiation of optional parameters. - Triggers allocation of transport entity resources. Transport-2
3 Credit Allocation Mechanism Example of Credit Allocation Mechanism Transport-3
4 TCP Credit Allocation Mechanism Transport-4
5 Sending & Receiving Flow Control Perpsectives Transport-5
6 Simple Connection State Diagram: 2-way Handshake Transport-6
7 Connection Establishment Scenarios Transport-7
8 Reliable Nonsequencing Network Service TPDUs may arrive out of order!! Sequence numbers are required for connection oriented service.! Credit allocations must be numbered sequentially.! Data TPDUs may arrive before connection is fully opened. (Data TPDUs should be queued until connection is fully established.)! TPDUs may arrive after a connection has been closed. (Solution is to have the connection termination message contain the number of the last data TPDU sent on this connection.) Example: Flow Control with a Nonsequenced Network Service Transport-8
9 Reliable Nonsequencing Network Service with Maximum TPDU Size! Fragmentation and reassembly required at the transport layer. Transport-9
10 Failure Prone Networks (Type B)! The transport entity must cope with the problem of recovering from known loss of data and/or network connections.! Note: the sequence numbering is an effective tool for dealing with network failures. Examples:! X.25 Reset is Received: - Issue a control TPDU to the other end that acknowledges a reset condition and gives the number of the last data TPDU received. - Refrain from issuing new data TPDUs until a corresponding reset control TPDU is received from the other end.! X.25 Restart is Received: - Issue a request to the network service for a new network connection. - Issue a control TPDU to the other end to identify the new network connection for the ongoing transport connection. - Resynchronize with the use of reset control TPDUs. Transport-10
11 Unreliable Network Service (Type C) A TPDU may fail to arrive at the destination and go undetected!! Retransmission Strategy: - Must have a positive ACK scheme. - Must have a Retransmission Timer.! Duplicate Detection: - Duplicate Received Prior to the Close of a Connection: a) The receiver must assume that its ACK was lost and send another ACK. b) The sequence number space must be long enough so as not to cycle in less than the maximum possible TPDU lifetime. - Duplicate Received After the Close of a Connection: a) Sequence numbers should extend across connection lifetimes (TCP). b) Provide a separate transport connection identifier and use a new identifier for each new connection. c) If a system crash occurs, the above two schemes can fail. One could use a Reconnection Timer to insure a minimum time between closing one connection and opening another with the same destination. Transport-11
12 Example of TCP Incorrect Duplicate Detection (Assume Sequence Space = 1600) Transport-12
13 ! Flow Control: - The credit allocation mechanism works well. - Add a Persist Timer to provide a maximum time between ACK/CREDIT TPDUs.! Connection Establishment: - Since Connection Requests can get lost, retransmissions can cause delayed duplicates. - Must use a three-way-handshake to open connections.! Connection Termination: - Each side must explicitly ACK each other's close message. - The close message must contain the sequence number of the last data TPDU sent.! Crash Recovery: - Connections can become half-open. - Use a Keepalive Timer to abort nonresponsive connections. Transport-13
14 2-way handshake: Problem with Obsolete Data Transport-14
15 2-way handshake: Problem with Obsolete SYN Transport-15
16 TCP Entity State Diagram (Three-Way Handshake) Transport-16
17 Examples of a Three-Way Handshake Transport-17
18 Example: A Simple Transport Protocol! Primitives for a Simple Transport Service:! Network Layer Packets Used in the Example: Transport-18
19 State Diagram for Transport Protocol Example Transport-19
20 Finite State Machine Representation Transport-20
21 A Simple Transport Protocol Transport-21
22 A Simple Transport Protocol cont. Transport-22
23 A Simple Transport Protocol cont. Transport-23
24 A Simple Transport Protocol cont. Transport-24
25 Transport Protocols! Transmission Control Protocol (TCP) Connection-Oriented! User Datagram Protocol (UDP) Connectionless! TCP Services: - Provides reliable communications across reliable and unreliable networks and internets. - Stream oriented. - Data transport is: - Full Duplex - Timely - Ordered - Flow Controlled - Error Controlled - Supports security and precedence labeling. - Supports special capabilities: - Data Stream Push - Urgent Data Signaling - Designed specifically and exclusively to work with IP.! UDP Services: - Provides a transport-level, unreliable, datagram service. - Delivery and duplicate detection are not guaranteed. Transport-25
26 TCP Service Request Primitives UNSPECIFIED-PASSIVE-OPEN: Listen for connection attempts at specified security and precedence levels from any remote user. FULL-PASSIVE-OPEN: Listen for connection attempts at specified security and precedence levels from specified user. ACTIVE-OPEN: Request connection at particular security and precedence levels. ACTIVE-OPEN-WITH-DATA: Request connection at particular security and precedence levels and transmit data with request. SEND: Transfer data across named connection. ALLOCATE: Issue incremental allocation for receive data to TCP. CLOSE: Close connection gracefully. ABORT: Close connection abruptly. STATUS: Report connection status. Transport-26
27 TCP Service Response Primitives OPEN-ID (or OPEN_RECEIVED): Informs user of connection name assigned to pending connection requested in an OPEN primitive. OPEN-FAILURE: Reports failure of an ACTIVE-OPEN or request. OPEN-SUCCESS: Reports completion of an ACTIVE-OPEN request. DELIVER: Reports arrival of data. CLOSING: Reports that remote TCP user has issued a CLOSE. TERMINATE: Reports that connections has been terminated and no longer exists. STATUS-RESPONSE: Reports current status of connection. ERROR: Reports service request or internal error. Transport-27
28 TCP User Services - Time Sequence Diagram TCP User Services - Time Sequence Diagram Transport-28
29 TCP Service Request Primitives UNSPECIFIED-PASSIVE-OPEN (source-port, [timeout], [timeoutaction], [precedence], [security]) FULL-PASSIVE-OPEN (source-port, destination-port, destinationaddress, [timeout], [timeout-action], [precedence], [security]) ACTIVE-OPEN (source-port, destination-port, destination-address, [timeout], [timeout-action], [precedence], [security]) ACTIVE-OPEN-WITH-DATA (source-port, destination-port, destination-address, [timeout], [timeout-action], [precedence], [security], data, data-length, push-flag, urgent-flag) SEND (local-connection-name, data, data-length, push-flag, urgentflag, [timeout], [timeout-action]) ALLOCATE (local-connection-name, data-length) CLOSE (local-connection-name) ABORT (local-connection-name) STATUS (local-connection-name) TCP Service Response Primitives OPEN-ID (local-connection-name, source-port, destination-port, destination-address) OPEN-FAILURE (local-connection-name) OPEN-SUCCESS (local-connection-name) DELIVER (local-connection-name, data, data-length, urgent-flag) CLOSING (local-connection-name) TERMINATE (local-connection-name, description) STATUS-RESPONSE (local-connection-name, source-port, sourceaddress, destination-port, destination-address, connectionstate, receive-window, send-window, amount-waiting-ack, amount-waiting-receipt, urgent-mode, timeout, timeout-action) ERROR (local-connection-name, description) Transport-29
30 Use of TCP and IP Service Primitives Transport-30
31 TCP TPDU Format Source Port Destination Port Sequence Number Acknowledge Number Data Offset reserved Flags Window Checksum Urgent Pointer Options and Padding Data Transport-31
32 TCP Header Parameters! Source Port (16 bits): - Source SAP.! Destination Port (16 bits): - Destination SAP.! Sequence Number (32 bits): - Seq. Number of the first data octet in this TPDU. - When SYN is present, it is the initial sequence number (ISN) (first data octet is ISN+1).! Acknowledgement Number (32 bits): - Next octet expected.! Data Offset (4 bits): - Number of 32-bit words in header.! Reserved (4 bits): (for future use)! Flags: - CWR: Congestion window reduced flag Data sender notifies receiver that the sender s congestion window has been reduced - ECE: ECN-Echo flag Data receiver notifies sender that IP packet with and ECN value of 11 (CE) has been received. - URG: Urgent pointer field significant - ACK: Acknowledgement field significant - PSH: Push function - RST: Reset the connection - SYN: Synchronize the sequence numbers - FIN: No more data from sender! Window (16 bits): - Flow control credit allocation in octets. - Number of octets, beginning with the one specified in the ack field that the sender will accept.! Checksum (16 bits): - 1's complement of the sum of all the 16-bit words.! Urgent Pointer (16 bits): - Points to the octet following the urgent data. Transport-32
33 ! Options (variable): - Maximum segment size: Included within a SYN segment to indicate the maximum allowable incoming segment size. - Window scale: Included within a SYN segment. Ordinarily, credit allocation is in octets. When the window scale option is used, the value of the Window field is F multiplied by 2, where F is the value of the window scale option. - Sack-permitted: Indicates that selective acknowledgement is allowed. - Sack: Allows the receiver to inform the sender of all the segments that are received successfully. The sender will only retransmit segments that have not been received. - Timestamps: Allows the sending of a timestamp in a data segment and the return of an echo of that timestamp in a return ACK segment. Transport-33
34 Parameters passed to IP:! Precedence parameter is mapped into the DS (Differentialed Services) field.! Security parameter is mapped into the optional security field. Transport-34
35 TCP Mechanisms Connection Establishment:! Always uses a Three-Way Handshake: - SYN - SYN + ACK - ACK Data Transfer:! Viewed as a stream of octets.! Each octet is numbered.! Flow control using a credit allocation scheme (in octets (or the optionally set window scale)).! TCP normally exercises its own discretion when to construct a TPDU - unless PUSH flag is used).! RST flag when apparently incorrect data for current connection is received. (e.g. delayed duplicate SYN, acks for data not yet sent, etc.). Connection Termination:! Graceful Close: - Transport user issues CLOSE primitive. - Transport entity sets the FIN bit on last TPDU sent.! Abrupt Termination: - User issues an ABORT primitive. - Entity abandons all efforts to send or receive data. - Entity discards data in its buffers. - Entity sends out a RST TPDU. Transport-35
36 TCP Implementation Policy Options! Send Policy: - In the absence of both pushed data and a closed transmission window, a sending TCP entity is free to transmit data at its own convenience, within its current credit allocation. - As data are issued by the user, they are buffered in the transmit buffer. - TCP may construct a segment for each batch of data provided by its user or it may wait until a certain amount of data accumulates before constructing and sending a segment. - The actual policy will depend on performance considerations. - If transmissions are infrequent and large, there is low overhead in terms of segment generation and processing. - If transmissions are frequent and small, the system is providing quick response.! Deliver Policy: - In the absence of a Push, a receiving TCP entity is free to deliver data to the user at its own convenience. - It may deliver data as each in-order segment is received, or it may buffer data from a number of segments in the receive buffer before delivery. - The actual policy will depend on performance considerations. - If deliveries are infrequent and large, the user is not receiving data as promptly as may be desirable. - If deliveries are frequent and small, there may be unnecessary processing both in TCP and in the user software, as well as an unnecessary number of operating system interrupts. Transport-36
37 TCP Implementation Policy Options Cont.! Accept Policy: - When all data segments arrive in order over a TCP connection, TCP places the data in a receive buffer for delivery to the user. - It is possible, however, for segments to arrive out of order. In this case, the receiving TCP entity has two options: In-order: - Accept only segments that arrive in order; any segment that arrives out of order is discarded. - The in-order policy makes for a simple implementation but places a burden on the networking facility, as the sending TCP entity must retransmit segments that were successfully received but discarded because of misordering. - Furthermore, if a single segment is lost in transit, then all subsequent segments must be retransmitted once the sending TCP times out on the lost segment. In-window: - Accept all segments that are within the receive window - Reduces transmissions but requires a more complex acceptance test and a more sophisticated data storage scheme to buffer and keep track of data accepted out of order. Transport-37
38 TCP Implementation Policy Options Cont.! Retransmit Policy: - TCP maintains a queue of segments that have been sent but not yet acknowledged. - TCP will retransmit a segment if it fails to receive an acknowledgment within a given time. - A TCP implementation may employ one of three retransmission strategies: First-only: - Maintain one retransmission timer for the entire queue. - If an acknowledgment is received, remove the appropriate segment or segments from the queue and reset the timer. - If the timer expires, retransmit the segment at the front of the queue and reset the timer. - The first-only policy is efficient in terms of traffic. - However, because the timer for the second segment in the queue is not set until the first segment is acknowledged, there can be considerable delays. Batch: - Maintain one retransmission timer for the entire queue. - If an acknowledgment is received, remove the appropriate segment or segments from the queue and reset the timer. - If the timer expires, retransmit all segments in the queue and reset the timer. - The batch policy also reduces the likelihood of long delays but may result in unnecessary retransmissions. Individual: - Maintain one timer for each segment in the queue. - If an acknowledgment is received, remove the appropriate segment or segments from the queue and destroy the corresponding timer or timers. - If any timer expires, retransmit the corresponding segment individually and reset its timer. - The individual policy solves the delay problem at the expense of a more complex implementation. The actual effectiveness of the retransmit policy depends in part on the accept policy of the receiver. Transport-38
39 TCP Implementation Policy Options Cont.! Acknowledge Policy: When a data segment arrives that is in sequence, the receiving TCP entity has two options concerning the timing of acknowledgment: Immediate: When data are accepted, immediately transmit an empty (no data) segment containing the appropriate acknowledgment number. Cumulative: When data are accepted, record the need for acknowledgment, but wait for an outbound segment with data on which to piggyback the acknowledgment. To avoid long delay, set a persist timer; if the timer expires before an acknowledgment is sent, transmit an empty segment containing the appropriate acknowledgment number.! The immediate policy is simple and keeps the remote TCP entity fully informed, which limits unnecessary retransmissions.! However, this policy results in extra segment transmissions, namely, empty segments used only to ACK.! Because of the potential overhead of the immediate policy, the cumulative policy is typically used.! Recognize that the use of this policy requires more processing at the receiving end and complicates the task of estimating round-trip time by the sending TCP entity. Transport-39
40 Basic Explicit Congestion Notification (ECN) Operation! Basic Operation: - TCP host sending data sets ECT code (10 or 01) in IP header of every data segment sent. - If sender receives TCP segment with ECE set, sender adjusts congestion window as for fast recovery from single lost segment. - Next data segment sent has CWR flag set. This tells receiver that it has reacted to congestion - If router begins to experience congestion, may set CE code (11) in any packet with ECT code set. - When a receiver receives a packet with CE set it begins to set ECE flag on all acknowledgments (with or without data). - It continues to set ECE flag until it receives a segment with CWR set. Transport-40
41 The TCP Entity State Diagram Transport-41
42 Example of TCP Operation Transport-42
43 Example of TCP Operation cont. Transport-43
44 Example of TCP Operation cont. Transport-44
45 Currently Assigned TCP Port Numbers Transport-45
46 UDP TPDU Format Source Port Destination Port Length Checksum Data! UDP Uses: There are instances when the connection establishment and termination overhead is unjustified or even counterproductive: - Inward Data Collection: Involves periodic active or passive sampling of data sources; e.g., sensors, security equipment, network components,... - Outward Data Dissemination: e.g., broadcast messages, distribution of real-time clock values,... - Request-Response: Applications for which a single request-response is typical. The service is typically regulated at the application level and lower level connections are unnecessary and cumbersome. - Real-time Applications: e.g., real-time voice, video, and telemetry. These services must not have connection-oriened functions such as retransmission. Transport-46
47 Currently Assigned UDP Port Numbers Transport-47
48 Real Time Transport Protocol (RTP)! TCP not suited to real time distributed application - Point-to-point not suitable for multicast - Retransmitted segments arrive out of order - No way to associate timing with segments! UDP does not include timing information nor any support for real time applications! Solution is real-time transport protocol RTP Transport-48
49 RTP Protocol Architecture Transport-49
50 RTP Header Transport-50
51 ! Version: Current version is 2 RTP Fixed Header Format Fields! Padding: Indicates whether padding octets appear at the end of the payload. If yes, last octet of payload has a count of the number of padding octets.! Extension: If set, the fixed header is followed by exactly one extension header.! CSRC Count: The number of CSRC identifiers that follow the fixed header.! Marker: Interpretation is payload type dependent (e.g., for audio, if set, it marks the start of a talk spurt.! Payload Type: Identifies the format of the RTP payload which follows the RTP header.! Sequence Number: Sequential sequence number, of each RTP data packet sent. Allows for loss detection and packet sequencing within a series of packets with the same timestamp.! Timestamp: corresponds to the generation instant of the first octet of the data payload.! Synchronization Source Identifier: Randomly generated value to uniquely identify the source in a session.! Contributing Source Identifier: Identifies a contributing source for the payload. (Supplied by a mixer). Transport-51
52 Payload Types for Audio and Video Encodings Transport-52
53 RTP Control Protocol (RTCP) A separate control protocol (RTCP) provides feedback to RTP data sources as well as all session participants. RTCP uses the same underlying transport service as RTP (usually UDP) and a separate port number. Each participant periodically issues an RTCP packet to all other session members. RTCP functions: Quality of Service (QoS) and congestion control: - RTCP provides feedback on the quality of data distribution. - Because RTCP packets are multicast, all session members can assess how well other members are performing and receiving. - Sender reports enable receivers to estimate data rates and the quality of the transmission. - Receiver reports indicate any problems encountered by receivers, including missing packets and excessive jitter. Identification: - RTCP packets carry a persistent textual description of the RTCP source. - This provides more information about the source of data packets than the random SSRC identifier and enables a user to associate multiple streams from different sessions. Session size estimation and scaling: - The rate of transmission of RTCP packets must be scaled down (to <5% traffic) as the number of participants increases. Session control: - RTCP optionally provides minimal session control info. An example is a participant identification to be displayed in the user interface. Transport-53
54 RTCP Packet Formats Transport-54
55 RTP Control Protocol (RTCP)! The primary function of RTCP is to provide feedback on the quality of the data distribution.! RTCP sender and receiver reports provide transmission of QoS information between senders and receivers.! Sender reports include information for synchronizing media streams, expected data rate, expected packet rate, and distance in time from the receiver to the sender.! Receiver reports include fraction of lost packets, cumulative lost packets, last sequence number received, and interarrival jitter. Transport-55
56 The RTCP Sender Report (SR) Packet Transport-56
57 The RTCP Receiver Report (RR) Packet! Interarrival jitter provides a short term measure of network congestion.! Packet loss tracks persistent congestion while jitter tracks transient congestion. Transport-57
58 ! Version:! Padding: SR & RR Header and SR Sender Report Fields! Report Count: Number of reception report blocks contained in the packet.! Packet Type:! Length: length of this packet in 32 bit words, minus 1.! NTP Timestamp: The absolute wall clock time when this report was generated. Used in combination with timestamps returned in reception reports from other receivers to measure round-trip propagation to those receivers.! RTP Timestamp: This is the relative time used to create timestamps in RTP data packets.! Sender's Packet Count: Total number of RTP data packets transmitted so far by the sender in this session.! Sender's Octet Count: Total number of RTP payload octets transmitter so far by this sender in this session. Transport-58
59 SR & RR: Reception Report Fields! SSRC_n: Identifies the source referred to by this report.! Fraction Lost: The fraction of RTP data packets from SSRC_n lost since the previous SR or RR packet was sent.! Cumulative Number of Packets Lost: Total number of RTP data packets lost from SSRC_n during this session.! Extended Highest Sequence Number Received: The least significant 16 bits record the highest sequence number received from the SSRC_n. The most significant 16 bits record the number of times the sequence number has wrapped back to zero.! Interarrival Jitter: An estimate of the jitter experienced on RTP data packets from SSRC_n.! Last SR Timestamp: the middle 32 bits of the NTP timestamp in the last SR packet received from SSRC_n.! Delay Since last SR: The delay, in units of 2 seconds -16 between receipt of the last SR packet from SSRC_n and the transmission of this report block. Transport-59
60 The RTCP Source Description (SDES) Packet! Used by a source to provide information about itself.! The packet has a 32-bit header followed by zero or more fields of information about this source.! Each field begins with an identifier for this source or for a contributing source, followed by a list of descriptive items. Transport-60
61 SDES Types Transport-61
62 The RTCP Goodbye (BYE) Packet! The BYE packet indicates that one or more sources are no longer active.! The packet consists of a 32-bit header followed by one or more source identifiers. Transport-62
ETSF05/ETSF10 Internet Protocols Transport Layer Protocols
ETSF05/ETSF10 Internet Protocols Transport Layer Protocols 2016 Jens Andersson Transport Layer Communication between applications Process-to-process delivery Client/server concept Local host Normally initialiser
More informationTransport Protocols & TCP TCP
Transport Protocols & TCP CSE 3213 Fall 2007 13 November 2007 1 TCP Services Flow control Connection establishment and termination Congestion control 2 1 TCP Services Transmission Control Protocol (RFC
More informationTransport Protocols. Raj Jain. Washington University in St. Louis
Transport Protocols Raj Jain Washington University Saint Louis, MO 63131 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 16-1 Overview q TCP q Key features
More informationTransport Protocols and TCP
Transport Protocols and TCP Functions Connection establishment and termination Breaking message into packets Error recovery ARQ Flow control Multiplexing, de-multiplexing Transport service is end to end
More informationLecture 3: The Transport Layer: UDP and TCP
Lecture 3: The Transport Layer: UDP and TCP Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 3-1 The Transport Layer Provides efficient and robust end-to-end
More informationTransport Protocols and TCP: Review
Transport Protocols and TCP: Review CSE 6590 Fall 2010 Department of Computer Science & Engineering York University 1 19 September 2010 1 Connection Establishment and Termination 2 2 1 Connection Establishment
More informationUser Datagram Protocol
Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram
More informationTransport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections
Application / Transport Interface Application requests service from transport layer Transport Layer Application Layer Prepare Transport service requirements Data for transport Local endpoint node address
More informationEEC-682/782 Computer Networks I
EEC-682/782 Computer Networks I Lecture 16 Wenbing Zhao w.zhao1@csuohio.edu http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser at
More informationEEC-484/584 Computer Networks. Lecture 16. Wenbing Zhao
EEC-484/584 Computer Networks Lecture 16 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review Services provided by transport layer
More informationNetworking Technologies and Applications
Networking Technologies and Applications Rolland Vida BME TMIT Transport Protocols UDP User Datagram Protocol TCP Transport Control Protocol and many others UDP One of the core transport protocols Used
More informationRTP. Prof. C. Noronha RTP. Real-Time Transport Protocol RFC 1889
RTP Real-Time Transport Protocol RFC 1889 1 What is RTP? Primary objective: stream continuous media over a best-effort packet-switched network in an interoperable way. Protocol requirements: Payload Type
More informationTransporting Voice by Using IP
Transporting Voice by Using IP Voice over UDP, not TCP Speech Small packets, 10 40 ms Occasional packet loss is not a catastrophe Delay-sensitive TCP: connection set-up, ack, retransmit delays 5 % packet
More informationUser Datagram Protocol (UDP):
SFWR 4C03: Computer Networks and Computer Security Feb 2-5 2004 Lecturer: Kartik Krishnan Lectures 13-15 User Datagram Protocol (UDP): UDP is a connectionless transport layer protocol: each output operation
More informationMultimedia in the Internet
Protocols for multimedia in the Internet Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ > 4 4 3 < 2 Applications and protocol stack DNS Telnet
More informationChapter 7. The Transport Layer
Chapter 7 The Transport Layer 1 2 3 4 5 6 7 8 9 10 11 Addressing TSAPs, NSAPs and transport connections. 12 For rarely used processes, the initial connection protocol is used. A special process server,
More informationCongestion / Flow Control in TCP
Congestion and Flow Control in 1 Flow Control and Congestion Control Flow control Sender avoids overflow of receiver buffer Congestion control All senders avoid overflow of intermediate network buffers
More informationITS323: Introduction to Data Communications
ITS323: Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 ITS323Y12S1L13, Steve/Courses/2012/s1/its323/lectures/transport.tex,
More informationUDP and TCP. Introduction. So far we have studied some data link layer protocols such as PPP which are responsible for getting data
ELEX 4550 : Wide Area Networks 2015 Winter Session UDP and TCP is lecture describes the two most common transport-layer protocols used by IP networks: the User Datagram Protocol (UDP) and the Transmission
More informationTransport Layer. -UDP (User Datagram Protocol) -TCP (Transport Control Protocol)
Transport Layer -UDP (User Datagram Protocol) -TCP (Transport Control Protocol) 1 Transport Services The transport layer has the duty to set up logical connections between two applications running on remote
More informationTSIN02 - Internetworking
TSIN02 - Internetworking Literature: Lecture 4: Transport Layer Forouzan: ch 11-12 Transport layer responsibilities UDP TCP 2004 Image Coding Group, Linköpings Universitet 2 Transport layer in OSI model
More information6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1
6. Transport Layer 6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6.1 Internet Transport Layer Architecture The
More informationStream Control Transmission Protocol
Chapter 13 Stream Control Transmission Protocol Objectives Upon completion you will be able to: Be able to name and understand the services offered by SCTP Understand SCTP s flow and error control and
More informationComputer Networks. Wenzhong Li. Nanjing University
Computer Networks Wenzhong Li Nanjing University 1 Chapter 5. End-to-End Protocols Transport Services and Mechanisms User Datagram Protocol (UDP) Transmission Control Protocol (TCP) TCP Congestion Control
More informationTSIN02 - Internetworking
Lecture 4: Transport Layer Literature: Forouzan: ch 11-12 2004 Image Coding Group, Linköpings Universitet Lecture 4: Outline Transport layer responsibilities UDP TCP 2 Transport layer in OSI model Figure
More informationTransport Layer. Gursharan Singh Tatla. Upendra Sharma. 1
Transport Layer Gursharan Singh Tatla mailme@gursharansingh.in Upendra Sharma 1 Introduction The transport layer is the fourth layer from the bottom in the OSI reference model. It is responsible for message
More information05 Transmission Control Protocol (TCP)
SE 4C03 Winter 2003 05 Transmission Control Protocol (TCP) Instructor: W. M. Farmer Revised: 06 February 2003 1 Interprocess Communication Problem: How can a process on one host access a service provided
More informationCCNA R&S: Introduction to Networks. Chapter 7: The Transport Layer
CCNA R&S: Introduction to Networks Chapter 7: The Transport Layer Frank Schneemann 7.0.1.1 Introduction 7.0.1.2 Class Activity - We Need to Talk Game 7.1.1.1 Role of the Transport Layer The primary responsibilities
More informationECE 650 Systems Programming & Engineering. Spring 2018
ECE 650 Systems Programming & Engineering Spring 2018 Networking Transport Layer Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) TCP/IP Model 2 Transport Layer Problem solved:
More informationIntroduction to Networks and the Internet
Introduction to Networks and the Internet CMPE 80N Announcements Project 2. Reference page. Library presentation. Internet History video. Spring 2003 Week 7 1 2 Today Internetworking (cont d). Fragmentation.
More informationTSIN02 - Internetworking
Lecture 4: Outline Literature: Lecture 4: Transport Layer Forouzan: ch 11-12 RFC? Transport layer introduction UDP TCP 2004 Image Coding Group, Linköpings Universitet 2 The Transport Layer Transport layer
More informationTSIN02 - Internetworking
Lecture 4: Transport Layer Literature: Forouzan: ch 11-12 2004 Image Coding Group, Linköpings Universitet Lecture 4: Outline Transport layer responsibilities UDP TCP 2 Transport layer in OSI model Figure
More informationTransport Over IP. CSCI 690 Michael Hutt New York Institute of Technology
Transport Over IP CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP What is a transport protocol? Choosing to use a transport protocol Ports and Addresses Datagrams UDP What is a
More informationGuide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16
Guide To TCP/IP, Second Edition Chapter 5 Transport Layer TCP/IP Protocols Objectives Understand the key features and functions of the User Datagram Protocol (UDP) Explain the mechanisms that drive segmentation,
More informationTCP /IP Fundamentals Mr. Cantu
TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:
More informationCS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP
CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering
More informationTCP/IP Protocol Suite 1
TCP/IP Protocol Suite 1 Stream Control Transmission Protocol (SCTP) TCP/IP Protocol Suite 2 OBJECTIVES: To introduce SCTP as a new transport-layer protocol. To discuss SCTP services and compare them with
More informationUnit 2.
Unit 2 Unit 2 Topics Covered: 1. PROCESS-TO-PROCESS DELIVERY 1. Client-Server 2. Addressing 2. IANA Ranges 3. Socket Addresses 4. Multiplexing and Demultiplexing 5. Connectionless Versus Connection-Oriented
More information7. TCP 최양희서울대학교컴퓨터공학부
7. TCP 최양희서울대학교컴퓨터공학부 1 TCP Basics Connection-oriented (virtual circuit) Reliable Transfer Buffered Transfer Unstructured Stream Full Duplex Point-to-point Connection End-to-end service 2009 Yanghee Choi
More informationOSI Transport Layer. objectives
LECTURE 5 OSI Transport Layer objectives 1. Roles of the Transport Layer 1. segmentation of data 2. error detection 3. Multiplexing of upper layer application using port numbers 2. The TCP protocol Communicating
More informationMobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods
Mobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods 1 Timeout freezing of transmission (TFT) Used in situations where
More informationSequence Number. Acknowledgment Number. Data
CS 455 TCP, Page 1 Transport Layer, Part II Transmission Control Protocol These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make
More informationCMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 25, 2018
CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet IP
More informationConnection-oriented (virtual circuit) Reliable Transfer Buffered Transfer Unstructured Stream Full Duplex Point-to-point Connection End-to-end service
최양희서울대학교컴퓨터공학부 Connection-oriented (virtual circuit) Reliable Transfer Buffered Transfer Unstructured Stream Full Duplex Point-to-point Connection End-to-end service 1 2004 Yanghee Choi 2 Addressing: application
More informationChapter 24. Transport-Layer Protocols
Chapter 24. Transport-Layer Protocols 23.1 Introduction 23.2 User Datagram Protocol 23.3 Transmission Control Protocol 23.4 SCTP Computer Networks 24-1 Position of Transport-Layer Protocols UDP is an unreliable
More informationLecture 20 Overview. Last Lecture. This Lecture. Next Lecture. Transport Control Protocol (1) Transport Control Protocol (2) Source: chapters 23, 24
Lecture 20 Overview Last Lecture Transport Control Protocol (1) This Lecture Transport Control Protocol (2) Source: chapters 23, 24 Next Lecture Internet Applications Source: chapter 26 COSC244 & TELE202
More informationin the Internet Andrea Bianco Telecommunication Network Group Application taxonomy
Multimedia traffic support in the Internet Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network Management and QoS Provisioning - 1 Application
More informationCS High Speed Networks. Dr.G.A.Sathish Kumar Professor EC
CS2060 - High Speed Networks Dr.G.A.Sathish Kumar Professor EC UNIT V PROTOCOLS FOR QOS SUPPORT UNIT V PROTOCOLS FOR QOS SUPPORT RSVP Goals & Characteristics RSVP operations, Protocol Mechanisms Multi
More informationUNIT IV -- TRANSPORT LAYER
UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission
More informationTransmission Control Protocol. ITS 413 Internet Technologies and Applications
Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion
More informationTransport Layer Protocols TCP
Transport Layer Protocols TCP Gail Hopkins Introduction Features of TCP Packet loss and retransmission Adaptive retransmission Flow control Three way handshake Congestion control 1 Common Networking Issues
More informationET4254 Communications and Networking 1
Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of
More informationRTP/RTCP protocols. Introduction: What are RTP and RTCP?
RTP/RTCP protocols Introduction: What are RTP and RTCP? The spread of computers, added to the availability of cheap audio/video computer hardware, and the availability of higher connection speeds have
More informationTCP : Fundamentals of Computer Networks Bill Nace
TCP 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia Lab #1 due now! Reminder: Paper Review
More informationCMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 11, 2018
CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet IP
More informationTransport Layer Protocols. Internet Transport Layer. Agenda. TCP Fundamentals
Transport Layer Protocols Application SMTP HTTP FTP Telnet DNS BootP DHCP ( M I M E ) Presentation Session SNMP TFTP Internet Transport Layer TCP Fundamentals, TCP Performance Aspects, UDP (User Datagram
More informationTCP = Transmission Control Protocol Connection-oriented protocol Provides a reliable unicast end-to-end byte stream over an unreliable internetwork.
Overview Formats, Data Transfer, etc. Connection Management (modified by Malathi Veeraraghavan) 1 Overview TCP = Transmission Control Protocol Connection-oriented protocol Provides a reliable unicast end-to-end
More informationTransport protocols Introduction
Transport protocols 12.1 Introduction All protocol suites have one or more transport protocols to mask the corresponding application protocols from the service provided by the different types of network
More informationNWEN 243. Networked Applications. Layer 4 TCP and UDP
NWEN 243 Networked Applications Layer 4 TCP and UDP 1 About the second lecturer Aaron Chen Office: AM405 Phone: 463 5114 Email: aaron.chen@ecs.vuw.ac.nz Transport layer and application layer protocols
More informationTransport Protocols Reading: Sections 2.5, 5.1, and 5.2. Goals for Todayʼs Lecture. Role of Transport Layer
Transport Protocols Reading: Sections 2.5, 5.1, and 5.2 CS 375: Computer Networks Thomas C. Bressoud 1 Goals for Todayʼs Lecture Principles underlying transport-layer services (De)multiplexing Detecting
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationTransport Protocols Reading: Sections 2.5, 5.1, and 5.2
Transport Protocols Reading: Sections 2.5, 5.1, and 5.2 CE443 - Fall 1390 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides
More informationRTP: A Transport Protocol for Real-Time Applications
RTP: A Transport Protocol for Real-Time Applications Provides end-to-end delivery services for data with real-time characteristics, such as interactive audio and video. Those services include payload type
More informationCS457 Transport Protocols. CS 457 Fall 2014
CS457 Transport Protocols CS 457 Fall 2014 Topics Principles underlying transport-layer services Demultiplexing Detecting corruption Reliable delivery Flow control Transport-layer protocols User Datagram
More informationSimulation of TCP Layer
39 Simulation of TCP Layer Preeti Grover, M.Tech, Computer Science, Uttrakhand Technical University, Dehradun ABSTRACT The Transmission Control Protocol (TCP) represents the most deployed transport protocol
More informationTCP and Congestion Control (Day 1) Yoshifumi Nishida Sony Computer Science Labs, Inc. Today's Lecture
TCP and Congestion Control (Day 1) Yoshifumi Nishida nishida@csl.sony.co.jp Sony Computer Science Labs, Inc 1 Today's Lecture Part1: TCP concept Part2: TCP detailed mechanisms Part3: Tools for TCP 2 1
More informationECE697AA Lecture 3. Today s lecture
ECE697AA Lecture 3 Transport Layer: TCP and UDP Tilman Wolf Department of Electrical and Computer Engineering 09/09/08 Today s lecture Transport layer User datagram protocol (UDP) Reliable data transfer
More informationQUIZ: Longest Matching Prefix
QUIZ: Longest Matching Prefix A router has the following routing table: 10.50.42.0 /24 Send out on interface Z 10.50.20.0 /24 Send out on interface A 10.50.24.0 /22 Send out on interface B 10.50.20.0 /22
More informationJaringan Komputer. The Transport Layer
Jaringan Komputer Transport Layer The Transport Layer The heart of the whole protocol hierarchy Task: To provide reliable, cost-effective data transport from the source machine to the destination machine,
More informationIS370 Data Communications and Computer Networks. Chapter 5 : Transport Layer
IS370 Data Communications and Computer Networks Chapter 5 : Transport Layer Instructor : Mr Mourad Benchikh Introduction Transport layer is responsible on process-to-process delivery of the entire message.
More informationIntroduction to TCP/IP networking
Introduction to TCP/IP networking TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute TCP : Transmission Control Protocol HTTP, FTP, ssh What is an internet? A set
More informationInternet and Intranet Protocols and Applications
Internet and Intranet Protocols and Applications Lecture 1b: The Transport Layer in the Internet January 17, 2006 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu 01/17/06
More informationCSCI-GA Operating Systems. Networking. Hubertus Franke
CSCI-GA.2250-001 Operating Systems Networking Hubertus Franke frankeh@cs.nyu.edu Source: Ganesh Sittampalam NYU TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute
More informationTRANSPORT PROTOCOLS CHAPTER Connection-Oriented Transport Protocol Mechanisms 20.2 TCP TCP Congestion Control 20.4 UDP
20 CHAPTER TRANSPORT PROTOCOLS 20.1 Connection-Oriented Transport Protocol Mechanisms 20.2 TCP 20.3 TCP Congestion Control 20.4 UDP 20.5 Recommended Reading and Web Sites 20.6 Key Terms, Review Questions,
More informationECE 435 Network Engineering Lecture 15
ECE 435 Network Engineering Lecture 15 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 26 October 2016 Announcements HW#5 due HW#6 posted Broadcasts on the MBONE 1 The Transport
More informationThe Transport Layer: TCP & Reliable Data Transfer
The Transport Layer: TCP & Reliable Data Transfer Smith College, CSC 249 February 15, 2018 1 Chapter 3: Transport Layer q TCP Transport layer services: v Multiplexing/demultiplexing v Connection management
More informationTransmission Control Protocol (TCP)
Transmission Control Protocol (TCP) Antonio Carzaniga Faculty of Informatics University of Lugano May 3, 2005 Outline Intro to TCP Sequence numbers and acknowledgment numbers Timeouts and RTT estimation
More informationMultiple unconnected networks
TCP/IP Life in the Early 1970s Multiple unconnected networks ARPAnet Data-over-cable Packet satellite (Aloha) Packet radio ARPAnet satellite net Differences Across Packet-Switched Networks Addressing Maximum
More informationCCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer
CCNA Exploration Network Fundamentals Chapter 04 OSI Transport Layer Updated: 05/05/2008 1 4.1 Roles of the Transport Layer 2 4.1 Roles of the Transport Layer The OSI Transport layer accept data from the
More informationTwo approaches to Flow Control. Cranking up to speed. Sliding windows in action
CS314-27 TCP: Transmission Control Protocol IP is an unreliable datagram protocol congestion or transmission errors cause lost packets multiple routes may lead to out-of-order delivery If senders send
More informationECE4110 Internetwork Programming. Introduction and Overview
ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?
More informationCS4700/CS5700 Fundamentals of Computer Networks
CS4700/CS5700 Fundamentals of Computer Networks Lecture 14: TCP Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu Northeastern
More informationAnnouncements Computer Networking. Outline. Transport Protocols. Transport introduction. Error recovery & flow control. Mid-semester grades
Announcements 15-441 Computer Networking Lecture 16 Transport Protocols Mid-semester grades Based on project1 + midterm + HW1 + HW2 42.5% of class If you got a D+,D, D- or F! must meet with Dave or me
More informationTransport Layer. <protocol, local-addr,local-port,foreign-addr,foreign-port> ϒ Client uses ephemeral ports /10 Joseph Cordina 2005
Transport Layer For a connection on a host (single IP address), there exist many entry points through which there may be many-to-many connections. These are called ports. A port is a 16-bit number used
More informationDigital Asset Management 5. Streaming multimedia
Digital Asset Management 5. Streaming multimedia 2015-10-29 Keys of Streaming Media Algorithms (**) Standards (*****) Complete End-to-End systems (***) Research Frontiers(*) Streaming... Progressive streaming
More informationECE 435 Network Engineering Lecture 9
ECE 435 Network Engineering Lecture 9 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 2 October 2018 Announcements HW#4 was posted, due Thursday 1 HW#3 Review md5sum/encryption,
More informationIntroduction to Network. Topics
Introduction to Network Security Chapter 7 Transport Layer Protocols 1 TCP Layer Topics Responsible for reliable end-to-end transfer of application data. TCP vulnerabilities UDP UDP vulnerabilities DNS
More informationChapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control
Chapter 6 What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control OSI Model Hybrid Model Software outside the operating system Software inside
More informationTransport Layer. The transport layer is responsible for the delivery of a message from one process to another. RSManiaol
Transport Layer Transport Layer The transport layer is responsible for the delivery of a message from one process to another Types of Data Deliveries Client/Server Paradigm An application program on the
More informationTCP Service Model. Today s Lecture. TCP Support for Reliable Delivery. EE 122:TCP, Connection Setup, Reliability
Today s Lecture How does TCP achieve correct operation? EE 122:TCP, Connection Setup, Reliability Ion Stoica TAs: Junda Liu, DK Moon, David Zats Reliability in the face of IP s best effort service 3-way
More informationTransport layer. UDP: User Datagram Protocol [RFC 768] Review principles: Instantiation in the Internet UDP TCP
Transport layer Review principles: Reliable data transfer Flow control Congestion control Instantiation in the Internet UDP TCP 1 UDP: User Datagram Protocol [RFC 768] No frills, bare bones Internet transport
More informationNetwork Technology 1 5th - Transport Protocol. Mario Lombardo -
Network Technology 1 5th - Transport Protocol Mario Lombardo - lombardo@informatik.dhbw-stuttgart.de 1 overview Transport Protocol Layer realizes process to process communication data unit is called a
More informationChapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1
Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 23-1 PROCESS-TO-PROCESS DELIVERY 23.2 The transport
More informationTCP/IP Networking. Part 4: Network and Transport Layer Protocols
TCP/IP Networking Part 4: Network and Transport Layer Protocols Orientation Application Application protocol Application TCP TCP protocol TCP IP IP protocol IP IP protocol IP IP protocol IP Network Access
More informationTransport layer. Review principles: Instantiation in the Internet UDP TCP. Reliable data transfer Flow control Congestion control
Transport layer Review principles: Reliable data transfer Flow control Congestion control Instantiation in the Internet UDP TCP 1 UDP: User Datagram Protocol [RFC 768] No frills, bare bones Internet transport
More information4.0.1 CHAPTER INTRODUCTION
4.0.1 CHAPTER INTRODUCTION Data networks and the Internet support the human network by supplying seamless, reliable communication between people - both locally and around the globe. On a single device,
More informationIntroduction to Networking. Operating Systems In Depth XXVII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved.
Introduction to Networking Operating Systems In Depth XXVII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved. Distributed File Systems Operating Systems In Depth XXVII 2 Copyright 2017 Thomas W.
More informationCCNA 1 Chapter 7 v5.0 Exam Answers 2013
CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the
More informationEE 122: Transport Protocols. Kevin Lai October 16, 2002
EE 122: Transport Protocols Kevin Lai October 16, 2002 Motivation IP provides a weak, but efficient service model (best-effort) - packets can be delayed, dropped, reordered, duplicated - packets have limited
More informationII. Principles of Computer Communications Network and Transport Layer
II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part
More information