Protocoles et Interconnexions

Similar documents
Chapter III: Transport Layer

Announcement. Homework 1 due last night, how is that? Will discuss some problems in the lecture next week

CSC358 Week 4. Adapted from slides by J.F. Kurose and K. W. Ross. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved

COSC4377. Useful Linux Tool: screen

Chapter 3 Transport Layer

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 7

Internet transport-layer protocols. Transport services and protocols. Sending and receiving. Connection-oriented (TCP) Connection-oriented

CS 3516: Computer Networks

Last time. Mobility in Cellular networks. Transport Layer. HLR, VLR, MSC Handoff. Introduction Multiplexing / demultiplexing UDP 14-1

Suprakash Datta. Office: CSEB 3043 Phone: ext Course page:

Computer Networks & Security 2016/2017

CC451 Computer Networks

Transport layer. UDP: User Datagram Protocol [RFC 768] Review principles: Instantiation in the Internet UDP TCP

Chapter 3 Transport Layer

Transport layer. Review principles: Instantiation in the Internet UDP TCP. Reliable data transfer Flow control Congestion control

CSCD 330 Network Programming

Chapter 3 Transport Layer

Transport layer. Our goals: Understand principles behind transport layer services: Learn about transport layer protocols in the Internet:

Distributed Systems. 5. Transport Protocols. Werner Nutt

Lecture 5. Transport Layer. Transport Layer 1-1

Chapter 3: Transport Layer. Chapter 3 Transport Layer. Chapter 3 outline. Transport services and protocols

Distributed Systems. 5. Transport Protocols

Lecture 9: Transpor Layer Overview and UDP

TDTS06: Computer Networks

CSE 4213: Computer Networks II

CSE 3214: Computer Network Protocols and Applications Transport Layer (Part 2) Chapter 3 outline. UDP checksum. Port numbers

Transport layer: Outline

CS 3516: Advanced Computer Networks

CSC 401 Data and Computer Communications Networks

Application. Transport. Network. Link. Physical

Transport services and protocols. Chapter 3 outline. Internet transport-layer protocols Chapter 3 outline. Multiplexing/demultiplexing

Lecture 08: The Transport Layer (Part 2) The Transport Layer Protocol (TCP) Dr. Anis Koubaa

CNT 6885 Network Review on Transport Layer

Chapter 3 outline. 3.5 connection-oriented transport: TCP segment structure reliable data transfer flow control connection management

Chapter 3 outline. TDTS06 Computer networks. Principles of Reliable data transfer. Reliable data transfer: getting started

Chapter 6 Transport Layer

Chapter 3 Transport Layer

Chapter 3: Transport Layer

RSC Part III: Transport Layer 3. TCP

CMSC 332 Computer Networks Reliable Data Transfer

Lecture 10: Transpor Layer Principles of Reliable Data Transfer

CSC 4900 Computer Networks: Reliable Data Transport

The Transport Layer Multiplexing, Error Detection, & UDP

CSCE 463/612 Networks and Distributed Processing Spring 2018

Transport Layer: outline

Chapter 2: outline. 2.1 principles of network applications app architectures app requirements

Data Communications & Networks. Session 6 Main Theme Reliable Data Transfer. Dr. Jean-Claude Franchitti

Course on Computer Communication and Networks. Lecture 4 Chapter 3; Transport Layer, Part A

Chapter 3 Transport Layer

Chapter 3 Transport Layer

Lecture 07 The Transport Layer (TCP & UDP) Dr. Anis Koubaa

Chapter 3 Transport Layer

Course on Computer Communication and Networks. Lecture 4 Chapter 3; Transport Layer, Part A

Chapter 3: Transport Layer Part A

10 minutes survey (anonymous)

CSC 8560 Computer Networks: Transport Layer

TCP: Overview RFCs: 793, 1122, 1323, 2018, 2581

Correcting mistakes. TCP: Overview RFCs: 793, 1122, 1323, 2018, TCP seq. # s and ACKs. GBN in action. TCP segment structure

Transport Layer: Outline

Different Layers Lecture 20

Chapter 3 outline. Chapter 3: Transport Layer. Transport vs. network layer. Transport services and protocols. Internet transport-layer protocols

CS 655 System and Network Architectures and Implementation. Module 3 - Transport

32 bits. source port # dest port # sequence number acknowledgement number not used. checksum. Options (variable length)

CC451 Computer Networks

Internet and Intranet Protocols and Applications

Chapter 3 Transport Layer

Foundations of Telematics

Chapter 3 Transport Layer

Lecture 8. TCP/IP Transport Layer (2)

Chapter 3 Transport Layer

The Transport Layer Reliable data delivery & flow control in TCP. Transport Layer Protocols & Services Outline

COMP 431 Internet Services & Protocols. Transport Layer Protocols & Services Outline. The Transport Layer Reliable data delivery & flow control in TCP

CS Lecture 1 Review of Basic Protocols

CS 4390 Computer Networks. Transport Services and Protocols

Protocoles et Interconnexions

The Transport Layer Reliable data delivery & flow control in TCP. Transport Layer Protocols & Services Outline

Chapter 3 outline. 3.5 connection-oriented transport: TCP segment structure reliable data transfer flow control connection management

Computer Networking Introduction

Chapter III: Transport Layer

Chapter 3 Transport Layer

Lecture 11: Transport Layer Reliable Data Transfer and TCP

Chapter 3 Transport Layer

CSEN 503 Introduction to Communication Networks. Mervat AbuElkheir Hana Medhat Ayman Dayf. ** Slides are attributed to J. F.

TCP : Fundamentals of Computer Networks Bill Nace

Chapter 3 Transport Layer

Chapter 3 Transport Layer

CS 4390 Computer Networks. Pointers to Corresponding Section of Textbook

Chapter 3 outline. 3.5 Connection-oriented transport: TCP. 3.6 Principles of congestion control 3.7 TCP congestion control

Chapter 3- parte B outline

OSI Transport Layer. objectives

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 8

Chapter 3 Transport Layer

Computer Networks. Transport Layer

Chapter 3: Transport Layer

Lecture 3 The Transport Control Protocol (TCP) Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

CSC 401 Data and Computer Communications Networks

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 9

Chapter 3: Transport Layer. Chapter 3 Transport Layer. Chapter 3 outline. Transport services and protocols

The Transport Layer: TCP & Reliable Data Transfer

Computer Communication Networks Midterm Review

Transcription:

Protocoles et Interconnexions Course Overview and Introduction Dario Vieira Department of Computer Science EFREI

Computer Networking Preliminaries Transport Layer Network Layer Introduction Terminology UDP TCP Internet protocol Routing Link Layer Physical Layer Ethernet Transmission media Other Topics Aplication Layer, advanced topics (e.g., wirelless, P2P, Multimedia, security, and management

Network Software Protocol layers» Design issues for the layers» Connection-oriented vs. connectionless service» Service primitives» Relationship of services to protocols» CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011

What s a protocol? human protocols: v what s the time? v I have a question v introductions specific msgs sent specific actions taken when msgs received, or other events network protocols: v machines rather than humans v all communication activity in Internet governed by protocols protocols define format, order of msgs sent and received among network entities, and actions taken on msg transmission, receipt Introduction 1-4

What s a protocol? A human protocol and a computer network protocol: Hi Hi Got the time? 2:00 time TCP connection request TCP connection response Get http://www.awl.com/kurose-ross <file> Introduction 1-5

Protocol Layers (1) Protocol layering is the main structuring method used to divide up network functionality. Each protocol instance talks virtually to its peer Each layer communicates only by using the one below Lower layer services are accessed by an interface At bottom, messages are carried by the medium CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011

Protocol Layers (2) Example: the philosopher-translator-secretary architecture Each protocol at different layers serves a different purpose CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011

Protocol Layers (3) Each lower layer adds its own header (with control information) to the message to transmit and removes it on receive Layers may also split and join messages, etc. CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011

Design Issues for the Layers Each layer solves a particular problem but must include mechanisms to address a set of recurring design issues Issue Reliability despite failures Network growth and evolution Allocation of resources like bandwidth Security against various threats Example mechanisms at different layers Codes for error detection/correction Routing around failures Addressing and naming Protocol layering Multiple access Congestion control Confidentiality of messages Authentication of communicating parties CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011

Connection-Oriented vs. Connectionless Service provided by a layer may be kinds of either: Connection-oriented, must be set up for ongoing use (and torn down after use), e.g., phone call Connectionless, messages are handled separately, e.g., postal delivery CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011

Connection-Oriented vs. Connectionless Connection-Oriented In connection-oriented communication, 2 communication partners (peers A and B) first establish a logical point-to-point relationship (=connection) with each other. After establishing the connection, all traffic injected into either endpoint is delivered to the other endpoint and peer. The network inbetween is often unaware of connections. The routers, switches etc. in the network forward traffic on a packet-by-packet basis without considering connections. Peer A Packe t Logical connection Packet Packet Peer B Connection endpoint Connection endpoint Peter R. Egli 2015

Peter R. Egli 2015 Connection-Oriented vs. Connectionless Connection-less: A connection-less protocol allows a peer A to send messages to different peers (B D) without first establishing a logical connection. Peer B Peer A Peer C Peer D Analogy with old-style communication: 1. Connection-oriented communication can be compared with good old telephony service. 2. Connection-less communication resembles postal correspondence.

Service Primitives (1) A service is provided to the layer above as primitives Hypothetical example of service primitives that may provide a reliable byte stream (connection-oriented) service: CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011

Service Primitives (2) Hypothetical example of how these primitives may be used for a client-server interaction CONNECT (1) SEND RECEIVE Client (3) DISCONNECT (5) Connect request Accept response Request for data Reply Disconnect Disconnect Server LISTEN (0) ACCEPT RECEIVE SEND (4) (2) DISCONNECT (6) CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011

Relationship of Services to Protocols Recap: A layer provides a service to the one above [vertical] A layer talks to its peer using a protocol [horizontal] CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011

Unicast, Broadcast, Multicast, Anycast Unicast, broadcast and multicast define the packet delivery mode, i.e. if packets are delivered to a single destination (unicast), to a group of destinations (multicast) or to all possible destinations in a network (broadcast) In anycast routing, the network delivers packets to the topologically nearest destination to reduce latency and network load. Unicast Broadcast Multicast Anycast Peter R. Egli 2015

Acknowledged Data Transfer A receiver signals successful reception of a packet (message) by sending back an acknowledgment packet to the sender. Acknowledgments may have different meanings such as: a) Message was successfully received, will be processed by receiver b) Message contents was accepted, will be processed by receiver c) Message was successfully received and processed d) Message was received but some error occurred (negative acknowledgment) Typically, acknowledgments are used for signaling successful reception so that the sender protocol layer can free resources such as transmit buffers that are used for retransmissions. Sender Receiver Message (ID=1) Acknowledge (ID=1) Message (ID=2) Acknowledge (ID=2) Peter R. Egli 2015

Handshake Handshake is a procedure employed by two peers to synchronize and exchange information needed in the subsequent communication. A handshake is typically a threeway packet exchange initiated by one peer. 1. Peer B accepts the information sent by peer A (Peer-A-ID in the example below) 2. And sends back an acknowledgment along with its own ID (Peer-B-ID) 3. Finally, peer A acknowledges peer B's ID by returning an acknowlegment. Peer A Peer B Peer-A-ID = 1 Ack Peer-A-ID, Peer-B-ID = 2 Ack Peter R. Egli 2015 Peer-B-ID

Client-Server, Peer-to-Peer (1/2) Dictated by the application logic, communication partners may have different roles from which the following communication patterns can be derived. Client-server (C/S): In the C/S model, application logic is distributed with a centralized server component responding to requests from clients (functional asymmetry). The client is the initiator of a connection / session (typically TCP) to the server which acts as a hub connecting multiple clients. Clients do not directly communicate with each other. Example C/S: Browser (C) and web server (S). Client A Client B Server Client C Peter R. Egli 2015

Client-Server, Peer-to-Peer (2/2) In the P2P model, all peers have the same functionality and communicate directly with each other. Each peer can initiate a connection / session to any other peer. There is no central component Therefore this model is resilient against failures of individual peers. Network and computing load is distributed more evenly compared to the centralized C/S model. Example: File sharing platform. Peer A Peer B Peer D Peer C Peter R. Egli 2015

Reference Models Reference models describe the layers in a network architecture OSI reference model» TCP/IP reference model» Model used for this text» Critique of OSI and TCP/IP» CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011

OSI Reference Model A principled, international standard, seven layer model to connect different systems Provides functions needed by users Converts different representations Manages task dialogs Provides end-to-end delivery Sends packets over multiple links Sends frames of information Sends bits as signals CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011

The OSI Protocol Model

OSI Layers Application: e.g. web browser, email, file transfer Presentation: provides independence to the app. processes from differences in data representation (syntax) Session: Provides control structure for comm. between applications; establish, manages, and terminates connections (sessions) between cooperating applications Transport: end-to-end reliable delivery control Network: routing/switching; establish/maintain/terminate connections Data Link: reliable transfer of information across the physical links; send frames with necessary synch., error control, and flow control Physical: concern with transmission of unstructured bit stream over physical medium;

Use of a Relay

TCP/IP Reference Model A four layer model derived from experimentation; omits some OSI layers and uses the IP as the network layer. IP is the narrow waist of the Internet Protocols are shown in their respective layers CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011

TCP/IP Protocol Architecture Developed by the US Defense Advanced Research Project Agency (DARPA) for its packet switched network (ARPANET) Used by the global Internet No official model but a working one. Application layer: logic needed to support various user applications Host to host or transport layer: reliable end-to-end delivery mechanisms, e.g. TCP Internet layer: provide routing function across multiple networks Network access layer: concern the exchange of date between end system & the network to which it is attached Physical layer: Physical interface between a data trans. device & a trans. medium or network

TCP/IP Protocol Architecture Model

PDUs in TCP/IP Architecture

Some Protocols in TCP/IP Suite

OSI v TCP/IP

Model Used It is based on the TCP/IP model but we call out the physical layer and look beyond Internet protocols. CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011

Critique of OSI & TCP/IP OSI: + Very influential model with clear concepts Models, protocols and adoption all bogged down by politics and complexity TCP/IP: + Very successful protocols that worked well and thrived Weak model derived after the fact from protocols CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011

Computer Networking Preliminaries Transport Layer Network Layer Introduction Terminology UDP TCP Internet protocol Routing Link Layer Physical Layer Ethernet Transmission media Other Topics Aplication Layer, advanced topics (e.g., wirelless, P2P, Multimedia, security, and management

Chapter 3 Transport Layer Computer Networking: A Top Down Approach 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009. Transport Layer 3-35

Chapter 3: Transport Layer Our Goals v Learn about transport layer protocols in the Internet UDP: connectionless transport TCP: connection-oriented transport Application Transport Network Link Physical Transport Layer 3-36

Transport services and protocols Transport protocols run in end systems send side: breaks app messages into segments, passes to network layer application transport network data link physical rcv side: reassembles segments into messages, passes to app layer More than one transport protocol available to apps Internet: TCP and UDP application transport network data link physical Transport Layer 3-37

Transport vs. Network layer Network layer Logical communication between hosts application transport network data link physical Transport layer Logical communication between processes Relies on, enhances, network layer services application transport network data link physical Transport Layer 3-38

Internet Transport-layer Protocols Reliable, in-order delivery (TCP) congestion control flow control connection setup application transport network data link physical network data link physical network data link physical Unreliable, unordered delivery (UDP) no-frills extension of best-effort IP Services not available delay guarantees bandwidth guarantees network data link physical network data link physical network data link physical network data link physical application transport network data link physical Transport Layer 3-39

Chapter 3 outline 3.1 Transport-layer services 3.2 Connectionless Transport: UDP 3.3 Principles of reliable data transfer 3.4 Connection-oriented transport: TCP 3.5 Principles of congestion control 3.6 TCP congestion control Transport Layer 3-40

UDP: User Datagram Protocol [RFC 768] No frills, bare bones Internet transport protocol Best effort service, UDP segments may be: lost delivered out of order to app Connectionless No handshaking between UDP sender, receiver Each UDP segment handled independently of others Why is there a UDP? No connection establishment (which can add delay) Simple: no connection state at sender, receiver Small segment header No congestion control: UDP can blast away as fast as desired Transport Layer 3-41

UDP: more Often used for streaming multimedia apps loss tolerant rate sensitive Other UDP uses DNS SNMP Reliable transfer over UDP: add reliability at application layer application-specific error recovery! Length, in bytes of UDP segment, including header 32 bits source port # dest port # length Application data (message) checksum UDP segment format Transport Layer 3-42

Chapter 3 outline 3.1 Transport-layer services 3.2 Connectionless Transport: UDP 3.3 Principles of reliable data transfer 3.4 Connection-oriented transport: TCP 3.5 Principles of congestion control 3.6 TCP congestion control Transport Layer 3-43

Principles of Reliable Data Transfer Important in app., transport, link layers top-10 list of important networking topics! Transport Layer 3-44

Principles of Reliable Data Transfer Important in app., transport, link layers top-10 list of important networking topics! Characteristics of unreliable channel will determine complexity of reliable data transfer protocol Transport Layer 3-45

Principles of Reliable Data Transfer Important in app., transport, link layers top-10 list of important networking topics! Characteristics of unreliable channel will determine complexity of reliable data transfer protocol (rdt) Transport Layer 3-46

Reliable Data Transfer: Getting Started rdt_send(): called from above, (e.g., by app.). Passed data to deliver to receiver upper layer deliver_data(): called by rdt to deliver data to upper send side receive side udt_send(): called by rdt, to transfer packet over unreliable channel to receiver rdt_rcv(): called when packet arrives on rcv-side of channel Transport Layer 3-47

Reliable Data Transfer: Getting Started Incrementally develop sender, receiver sides of Reliable Data Transfer protocol (rdt) Consider only unidirectional data transfer but control info will flow on both directions! Use Finite State Machines (FSM) to specify sender, receiver state: when in this state next state uniquely determined by next event State 1 event causing state transition actions taken on state transition event actions State 2 Transport Layer 3-48

Rdt1.0: Reliable Transfer over a Reliable Channel Underlying channel perfectly reliable no bit errors no loss of packets Separate FSMs for sender, receiver sender sends data into underlying channel receiver read data from underlying channel Wait for call from above rdt_send(data) packet =make_pkt(data) udt_send(packet) Wait for call from below rdt_rcv(packet) Extract (packet,data) deliver_data(data) sender receiver Transport Layer 3-49

Rdt2.0: channel with bit errors Underlying channel may flip bits in packet checksum to detect bit errors The question: how to recover from errors? acknowledgements (ACKs): receiver explicitly tells sender that pkt received OK How do humans recover from errors during conversation? negative acknowledgements (NAKs): receiver explicitly tells sender that pkt had errors sender retransmits pkt on receipt of NAK new mechanisms in rdt2.0 (beyond rdt1.0): error detection receiver feedback: control msgs (ACK,NAK) rcvr->sender Transport Layer 3-50

Rdt2.0: channel with bit errors Underlying channel may flip bits in packet checksum to detect bit errors The question: how to recover from errors? acknowledgements (ACKs): receiver explicitly tells sender that pkt received OK negative acknowledgements (NAKs): receiver explicitly tells sender that pkt had errors sender retransmits pkt on receipt of NAK New mechanisms in rdt2.0 (beyond rdt1.0): error detection receiver feedback: control msgs (ACK,NAK) rcvr->sender Transport Layer 3-51

rdt2.0: FSM specification Receiver sndpkt = make_pkt(data, checksum) udt_send(sndpkt) Wait for call from above rdt_send(data) rdt_rcv(rcvpkt) && isack(rcvpkt) Λ Wait for ACK or NAK Sender rdt_rcv(rcvpkt) && isnak(rcvpkt) udt_send(sndpkt) rdt_rcv(rcvpkt) && corrupt(rcvpkt) udt_send(nak) Wait for call from below rdt_rcv(rcvpkt) && notcorrupt(rcvpkt) extract(rcvpkt,data) deliver_data(data) udt_send(ack) Transport Layer 3-52

TCP: Overview Point-to-point: one sender, one receiver Reliable, in-order byte steam: no message boundaries Pipelined: TCP congestion and flow control set window size Send & receive buffers Full duplex data: bi-directional data flow in same connection MSS: maximum segment size Connection-oriented: handshaking (exchange of control msgs) inits sender, receiver state before data exchange Flow controlled: sender will not overwhelm receiver socket door application writes data TCP send buffer application reads data TCP receive buffer socket door 3-53 segment

TCP segment structure URG: urgent data (generally not used) ACK: ACK # valid PSH: push data now (generally not used) RST, SYN, FIN: connection estab (setup, teardown commands) Internet checksum (as in UDP) 32 bits source port # dest port # head len sequence number acknowledgement number not used checksum U A P R S F application data (variable length) Receive window Urg data pnter Options (variable length) counting by bytes of data (not segments!) # bytes rcvr willing to accept Transport Layer 3-54

TCP seq. # s and ACKs Seq. # s: ACKs: byte stream number of first byte in segment s data seq # of next byte expected from other side cumulative ACK Q: how receiver handles out-oforder segments A: TCP spec doesn t say, - up to implementor User types C host ACKs receipt of echoed C Host A Host B Seq=42, ACK=79, data = C Seq=79, ACK=43, data = C Seq=43, ACK=80 host ACKs receipt of C, echoes back C time simple telnet scenario Transport Layer 3-55

TCP: Retransmission Scenarios Host A Host B Seq=92, 8 bytes data Host A Host B Seq=92, 8 bytes data timeout SendBase = 100 time X loss ACK=100 Seq=92, 8 bytes data ACK=100 lost ACK scenario SendBase = 100 SendBase = 120 Seq=92 timeout Seq=92 timeout SendBase = 120 time Seq=100, 20 bytes data Seq=92, 8 bytes data premature timeout Transport Layer 3-56

TCP Retransmission Scenarios (more) Host A Host B Seq=92, 8 bytes data timeout Seq=100, 20 bytes data X loss ACK=100 SendBase = 120 ACK=120 time Cumulative ACK scenario Transport Layer 3-57

TCP Congestion Control (a) A fast network feeding a low capacity receiver. (b) A slow network feeding a high-capacity receiver.

TCP Connection Management Recall: TCP sender, receiver establish connection before exchanging data segments initialize TCP variables: Initial seq. #s Buffers, flow control info (e.g. RcvWindow) client: connection initiator Socket clientsocket = new Socket("hostname","port number"); server: contacted by client Socket connectionsocket = welcomesocket.accept(); Three way handshake: Step 1: client host sends TCP SYN segment to server specifies initial seq # no data Step 2: server host receives SYN, replies with SYNACK segment server allocates buffers specifies server initial seq. # Step 3: client receives SYNACK, replies with ACK segment, which may contain data Transport Layer 3-59

TCP Connection Management (cont.) Closing a connection: client closes socket: clientsocket.close(); close client FIN server Step 1: client end system sends TCP FIN control segment to server ACK FIN close Step 2: server receives FIN, replies with ACK. closed timed wait ACK Transport Layer 3-60

TCP Connection Management (cont.) Step 3: client receives FIN, replies with ACK. Enters timed wait - will respond with ACK to received FINs Step 4: server, receives ACK. Connection closed. closing client ACK FIN FIN server closing Step 5: after timeout, client s connection closed closed timed wait ACK closed Transport Layer 3-61

TCP Connection Management (cont) TCP client lifecycle TCP server lifecycle 3-62

TCP Finite State Machine Step 2 of the 3-way handshake Step 1 of the 3-way handshake TCP connection management Finite State Machine: 3-Way Handshake The heavy solid line is the normal path for a client. The heavy dashed line is the normal path for a server. Step 3 of the 3-way handshake

Some Protocols in TCP/IP Suite

Protocoles et Interconnexions Course Overview and Introduction Dario Vieira Department of Computer Science EFREI