UNIT IV TRANSPORT LAYER

Similar documents
Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1

Chapter 24 Congestion Control and Quality of Service Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

23-3 TCP. Topics discussed in this section: TCP Services TCP Features Segment A TCP Connection Flow Control Error Control 23.22

Chapter 24. Transport-Layer Protocols

Transport Layer. The transport layer is responsible for the delivery of a message from one process to another. RSManiaol

TCP/IP Protocol Suite 1

Chapter 24 Congestion Control and Quality of Service 24.1

UNIT 2 TRANSPORT LAYER

TSIN02 - Internetworking

Stream Control Transmission Protocol

IS370 Data Communications and Computer Networks. Chapter 5 : Transport Layer

Unit 2.

TSIN02 - Internetworking

TSIN02 - Internetworking

TSIN02 - Internetworking

Transport Layer. Gursharan Singh Tatla. Upendra Sharma. 1

ETSF05/ETSF10 Internet Protocols Transport Layer Protocols

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control

ADVANCED COMPUTER NETWORKS

Quality of Service. Traffic Descriptor Traffic Profiles. Figure 24.1 Traffic descriptors. Figure Three traffic profiles

Lecture 3: The Transport Layer: UDP and TCP

UNIT IV -- TRANSPORT LAYER

ETSF10 Internet Protocols Transport Layer Protocols

Outline. History Introduction Packets Association/ Termination Data Transmission concepts Multihoming Streams

Transport Layer Protocols TCP

Lecture 20 Overview. Last Lecture. This Lecture. Next Lecture. Transport Control Protocol (1) Transport Control Protocol (2) Source: chapters 23, 24

Networking Technologies and Applications

ECE697AA Lecture 3. Today s lecture

Transport layer. UDP: User Datagram Protocol [RFC 768] Review principles: Instantiation in the Internet UDP TCP

Transport layer. Review principles: Instantiation in the Internet UDP TCP. Reliable data transfer Flow control Congestion control

Computer Networking Introduction

Transport Layer. -UDP (User Datagram Protocol) -TCP (Transport Control Protocol)

ETSF10 Internet Protocols Transport Layer Protocols

Outline. Connecting to the access network: DHCP and mobile IP, LTE. Transport layer: UDP and TCP

Application. Transport. Network. Link. Physical

Internet Applications and the Application Layer Material from Kurose and Ross, Chapter 2: The Application Layer

Chapter 11. User Datagram Protocol (UDP)

Process-to-Process Delivery:

Objectives. Chapter 10. Upon completion you will be able to:

NT1210 Introduction to Networking. Unit 10

Stream Control Transmission Protocol (SCTP)

Chapter 6 Transport Layer

TCP/IP. Chapter 5: Transport Layer TCP/IP Protocols

TSIN02 - Internetworking

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1

Department of Computer and IT Engineering University of Kurdistan. Transport Layer. By: Dr. Alireza Abdollahpouri

CSC 634: Networks Programming

Different Layers Lecture 20

Internet and Intranet Protocols and Applications

TCP/IP Networking. Part 4: Network and Transport Layer Protocols

Introduction to Protocols

6. The Transport Layer and protocols

CS4700/CS5700 Fundamentals of Computer Networks

UDP and TCP. Introduction. So far we have studied some data link layer protocols such as PPP which are responsible for getting data

CCNA R&S: Introduction to Networks. Chapter 7: The Transport Layer

Multiple unconnected networks

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16

OSI Transport Layer. objectives

Computer Networks and Data Systems

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

CCNA 1 v3.11 Module 11 TCP/IP Transport and Application Layers

05 Transmission Control Protocol (TCP)

TSIN02 - Internetworking

User Datagram Protocol (UDP):

Chapter 3- parte B outline

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer

CSC 4900 Computer Networks: TCP

MIDTERM EXAMINATION #2 OPERATING SYSTEM CONCEPTS U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E

Connectionless and Connection-Oriented Protocols OSI Layer 4 Common feature: Multiplexing Using. The Transmission Control Protocol (TCP)

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections

Internetworking Models The OSI Reference Model

Transport Layer Review

TCP/IP-2. Transmission control protocol:

UDP, TCP, IP multicast

Lecture (11) OSI layer 4 protocols TCP/UDP protocols

Different Layers Lecture 21

Outline. TCP: Overview RFCs: 793, 1122, 1323, 2018, steam: r Development of reliable protocol r Sliding window protocols

Quality of Service (QoS)

Computer Network Programming

Video Streaming with the Stream Control Transmission Protocol (SCTP)

UNIT V. Computer Networks [10MCA32] 1

An SCTP-Protocol Data Unit with several chunks

Chapter 5 End-to-End Protocols

9th Slide Set Computer Networks

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

"Filling up an old bath with holes in it, indeed. Who would be such a fool?" "A sum it is, girl," my father said. "A sum. A problem for the mind.

User Datagram Protocol

Outline. TCP: Overview RFCs: 793, 1122, 1323, 2018, Development of reliable protocol Sliding window protocols

ITS323: Introduction to Data Communications

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

Transport Layer (TCP/UDP)

TRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016

(Refer Slide Time: 1:09)

Data Transport over IP Networks

Fall 2012: FCM 708 Bridge Foundation I

Lecture Outline. Bag of Tricks

CSC 8560 Computer Networks: TCP

Introduction to Networks and the Internet

Transcription:

Transport Layer UNIT IV TRANSPORT LAYER Congestion Control and Quality of Service Ref: Data Communication & Networking, 4 th edition, Forouzan IV-1

DATA TRAFFIC The main focus of congestion control and quality of service is data traffic.. In congestion control we try to avoid traffic congestion. In quality of service, we try to create an appropriate environment for the traffic. So, before talking about congestion control and quality of service, we discuss the data traffic itself. Traffic Descriptor Traffic Profiles Topics discussed in this section: IV-2

IV-3 Figure IV.1 Traffic descriptors

IV-4 Figure IV.2 Three traffic profiles

IV-2 CONGESTION Congestion in a network may occur if the load on the network the number of packets sent to the network is greater than the capacity of the network the number of packets a network can handle. Congestion control refers to the mechanisms and techniques to control the congestion and keep the load below the capacity. Topics discussed in this section: Network Performance IV-5

IV-6 Figure IV.3 Queues in a router

IV-7 Figure IV.4 Packet delay and throughput as functions of load

IV-3 CONGESTION CONTROL Congestion control refers to techniques and mechanisms that can either prevent congestion, before it happens, or remove congestion, after it has happened. In general, we can divide congestion control mechanisms into two broad categories: open-loop congestion control (prevention) and closed-loop congestion control (removal). Topics discussed in this section: Open-Loop Congestion Control Closed-Loop Congestion Control IV-8

IV-9 Figure IV.5 Congestion control categories

IV-10 Figure IV.6 Backpressure method for alleviating congestion

IV-11 Figure IV.7 Choke packet

IV-4 TWO EXAMPLES To better understand the concept of congestion control, let us give two examples: one in TCP and the other in Frame Relay. Topics discussed in this section: Congestion Control in TCP Congestion Control in Frame Relay IV-12

IV-13 Figure IV.8 Slow start, exponential increase

Note In the slow-start algorithm, the size of the congestion window increases exponentially until it reaches a threshold. IV-14

IV-15 Figure IV.9 Congestion avoidance, additive increase

Note In the congestion avoidance algorithm, the size of the congestion window increases additively until congestion is detected. IV-16

Note An implementation reacts to congestion detection in one of the following ways: If detection is by time-out, a new slow start phase starts. If detection is by three ACKs, a new congestion avoidance phase starts. IV-17

IV-18 Figure IV.10 TCP congestion policy summary

IV-19 Figure IV.11 Congestion example

IV-20 Figure IV.12 BECN

IV-21 Figure IV.13 FECN

IV-22 Figure IV.14 Four cases of congestion

IV-5 QUALITY OF SERVICE Quality of service (QoS) is an internetworking issue that has been discussed more than defined. We can informally define quality of service as something a flow seeks to attain. Topics discussed in this section: Flow Characteristics Flow Classes IV-23

IV-24 Figure IV.15 Flow characteristics

IV-6 TECHNIQUES TO IMPROVE QoS In Section IV.5 we tried to define QoS in terms of its characteristics. In this section, we discuss some techniques that can be used to improve the quality of service. We briefly discuss four common methods: scheduling, traffic shaping, admission control, and resource reservation. Topics discussed in this section: Scheduling Traffic Shaping Resource Reservation Admission Control IV-25

IV-26 Figure IV.16 FIFO queue

IV-27 Figure IV.17 Priority queuing

IV-28 Figure IV.18 Weighted fair queuing

IV-29 Figure IV.19 Leaky bucket

IV-30 Figure IV.20 Leaky bucket implementation

Note A leaky bucket algorithm shapes bursty traffic into fixed-rate traffic by averaging the data rate. It may drop the packets if the bucket is full. IV-31

Note The token bucket allows bursty traffic at a regulated maximum rate. IV-32

IV-33 Figure IV.21 Token bucket

IV-7 INTEGRATED SERVICES Two models have been designed to provide quality of service in the Internet: Integrated Services and Differentiated Services. We discuss the first model here. Topics discussed in this section: Signaling Flow Specification Admission Service Classes RSVP Problems with Integrated Services IV-34

Note Integrated Services is a flow-based QoS model designed for IP. IV-35

IV-36 Figure IV.22 Path messages

IV-37 Figure IV.23 Resv messages

IV-38 Figure IV.24 Reservation merging

IV-39 Figure IV.25 Reservation styles

IV-8 DIFFERENTIATED SERVICES Differentiated Services (DS or Diffserv) was introduced by the IETF (Internet Engineering Task Force) to handle the shortcomings of Integrated Services. DS Field Topics discussed in this section: IV-40

Note Differentiated Services is a class-based QoS model designed for IP. IV-41

IV-42 Figure IV.26 DS field

IV-43 Figure IV.27 Traffic conditioner

IV-9 QoS IN SWITCHED NETWORKS Let us now discuss QoS as used in two switched networks: Frame Relay and ATM. These two networks are virtual-circuit networks that need a signaling protocol such as RSVP. Topics discussed in this section: QoS in Frame Relay QoS in ATM IV-44

IV-45 Figure IV.28 Relationship between traffic control attributes

IV-46 Figure IV.29 User rate in relation to Bc and Bc + Be

IV-47 Figure IV.30 Service classes

Figure IV.31 Relationship of service classes to the total capacity of the network IV-48

TRANSPORT LAYER UNIT IV TRANSPORT LAYER Process-to-Process Delivery: UDP, TCP, and SCTP Ref: Data Communications & Networking, 4 th edition, Forouzan IV.49

IV-1 PROCESS-TO-PROCESS DELIVERY IV.50 The transport layer is responsible for process-to- process delivery the delivery of a packet, part of a message, from one process to another. Two processes communicate in a client/server relationship, as we will see later. Topics discussed in this section: Client/Server Paradigm Multiplexing and Demultiplexing Connectionless Versus Connection-Oriented Service Reliable Versus Unreliable Three Protocols

Note The transport layer is responsible for process-to-process delivery. IV.51

IV.52 Figure IV.1 Types of data deliveries

IV.53 Figure IV.2 Port numbers

IV.54 Figure IV.3 IP addresses versus port numbers

IV.55 Figure IV.4 IANA ranges

IV.56 Figure IV.5 Socket address

IV.57 Figure IV.6 Multiplexing and demultiplexing

IV.58 Figure IV.7 Error control

IV.59 Figure IV.8 Position of UDP, TCP, and SCTP in TCP/IP suite

IV-2 USER DATAGRAM PROTOCOL (UDP) IV.60 The User Datagram Protocol (UDP) is called a connectionless, unreliable transport protocol. It does not add anything to the services of IP except to provide process-to-process communication instead of host-to- host communication. Topics discussed in this section: Well-Known Ports for UDP User Datagram Checksum UDP Operation Use of UDP

IV.61 Table IV.1 Well-known ports used with UDP

Example 23.1 In UNIX, the well-known ports are stored in a file called /etc/services. Each line in this file gives the name of the server and the well-known port number. We can use the grep utility to extract the line corresponding to the desired application. The following shows the port for FTP. Note that FTP can use port 21 with either UDP or TCP. IV.62

Example 23.1 (continued) SNMP uses two port numbers (161 and 162), each for a different purpose, as we will see in Chapter 28. IV.63

IV.64 Figure IV.9 User datagram format

Note UDP length = IP length IP header s length IV.65

IV.66 Figure IV.10 Pseudoheader for checksum calculation

Example 23.2 Figure IV.11 shows the checksum calculation for a very small user datagram with only 7 bytes of data. Because the number of bytes of data is odd, padding is added for checksum calculation. The pseudoheader as well as the padding will be dropped when the user datagram is delivered to IP. IV.67

IV.68 Figure IV.11 Checksum calculation of a simple UDP user datagram

IV.69 Figure IV.12 Queues in UDP

IV-3 TCP IV.70 TCP is a connection-oriented protocol; it creates a virtual connection between two TCPs to send data. In addition, TCP uses flow and error control mechanisms at the transport level. Topics discussed in this section: TCP Services TCP Features Segment A TCP Connection Flow Control Error Control

IV.71 Table IV.2 Well-known ports used by TCP

IV.72 Figure IV.13 Stream delivery

IV.73 Figure IV.14 Sending and receiving buffers

IV.74 Figure IV.15 TCP segments

Note The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a randomly generated number. IV.75

Example 23.3 The following shows the sequence number for each segment: IV.76

Note The value in the sequence number field of a segment defines the number of the first data byte contained in that segment. IV.77

Note The value of the acknowledgment field in a segment defines the number of the next byte a party expects to receive. The acknowledgment number is cumulative. IV.78

IV.79 Figure IV.16 TCP segment format

IV.80 Figure IV.17 Control field

IV.81 Table IV.3 Description of flags in the control field

IV.82 Figure IV.18 Connection establishment using three-way handshaking

Note A SYN segment cannot carry data, but it consumes one sequence number. IV.83

Note A SYN + ACK segment cannot carry data, but does consume one sequence number. IV.84

Note An ACK segment, if carrying no data, consumes no sequence number. IV.85

IV.86 Figure IV.19 Data transfer

IV.87 Figure IV.20 Connection termination using three-way handshaking

Note The FIN segment consumes one sequence number if it does not carry data. IV.88

Note The FIN + ACK segment consumes one sequence number if it does not carry data. IV.89

IV.90 Figure IV.21 Half-close

IV.91 Figure IV.22 Sliding window

Note A sliding window is used to make transmission more efficient as well as to control the flow of data so that the destination does not become overwhelmed with data. TCP sliding windows are byte-oriented. IV.92

Example 23.4 What is the value of the receiver window (rwnd) for host A if the receiver, host B, has a buffer size of 5000 bytes and 1000 bytes of received and unprocessed data? Solution The value of rwnd = 5000 1000 = 4000. Host B can receive only 4000 bytes of data before overflowing its buffer. Host B advertises this value in its next segment to A. IV.93

Example 23.5 What is the size of the window for host A if the value of rwnd is 3000 bytes and the value of cwnd is 3500 bytes? Solution The size of the window is the smaller of rwnd and cwnd, which is 3000 bytes. IV.94

Example 23.6 Figure IV.23 shows an unrealistic example of a sliding window. The sender has sent bytes up to 202. We assume that cwnd is 20 (in reality this value is thousands of bytes). The receiver has sent an acknowledgment number of 200 with an rwnd of 9 bytes (in reality this value is thousands of bytes). The size of the sender window is the minimum of rwnd and cwnd, or 9 bytes. Bytes 200 to 202 are sent, but not acknowledged. Bytes 203 to 208 can be sent without worrying about acknowledgment. Bytes 209 and above cannot be sent. IV.95

IV.96 Figure IV.23 Example 23.6

IV.97 Note Some points about TCP sliding windows: The size of the window is the lesser of rwnd and cwnd. The source does not have to send a full window s worth of data. The window can be opened or closed by the receiver, but should not be shrunk. The destination can send an acknowledgment at any time as long as it does not result in a shrinking window. The receiver can temporarily shut down the window; the sender, however, can always send a segment of 1 byte after the window is shut down.

Note ACK segments do not consume sequence numbers and are not acknowledged. IV.98

Note In modern implementations, a retransmission occurs if the retransmission timer expires or three duplicate ACK segments have arrived. IV.99

Note No retransmission timer is set for an ACK segment. IV.100

Note Data may arrive out of order and be temporarily stored by the receiving TCP, but TCP guarantees that no out-of-order segment is delivered to the process. IV.101

Figure IV.24 Normal operation IV.102

Figure IV.25 Lost segment IV.103

Note The receiver TCP delivers only ordered data to the process. IV.104

Figure IV.26 Fast retransmission IV.105

IV-4 SCTP Stream Control Transmission Protocol (SCTP) is a new reliable, message-oriented transport layer protocol. SCTP, however, is mostly designed for Internet applications that have recently been introduced. These new applications need a more sophisticated service than TCP can provide. SCTP Services and Features Packet Format An SCTP Association Flow Control and Error Control IV.106 Topics discussed in this section:

Note SCTP is a message-oriented, reliable protocol that combines the best features of UDP and TCP. IV.107

IV.108 Table IV.4 Some SCTP applications

Figure IV.27 Multiple-stream concept IV.109

Note An association in SCTP can involve multiple streams. IV.110

Figure IV.28 Multihoming concept IV.111

Note SCTP association allows multiple IP addresses for each end. IV.112

Note In SCTP, a data chunk is numbered using a TSN. IV.113

Note To distinguish between different streams, SCTP uses an SI. IV.114

Note To distinguish between different data chunks belonging to the same stream, SCTP uses SSNs. IV.115

Note TCP has segments; SCTP has packets. IV.116

Figure IV.29 Comparison between a TCP segment and an SCTP packet IV.117

Note In SCTP, control information and data information are carried in separate chunks. IV.118

Figure IV.30 Packet, data chunks, and streams IV.119

Note Data chunks are identified by three items: TSN, SI, and SSN. TSN is a cumulative number identifying the association; SI defines the stream; SSN defines the chunk in a stream. IV.120

Note In SCTP, acknowledgment numbers are used to acknowledge only data chunks; control chunks are acknowledged by other control chunks if necessary. IV.121

Figure IV.31 SCTP packet format IV.122

Note In an SCTP packet, control chunks come before data chunks. IV.123

Figure IV.32 General header IV.124

IV.125 Table IV.5 Chunks

Note A connection in SCTP is called an association. IV.126

Note No other chunk is allowed in a packet carrying an INIT or INIT ACK chunk. A COOKIE ECHO or a COOKIE ACK chunk can carry data chunks. IV.127

Figure IV.33 Four-way handshaking IV.128

Note In SCTP, only DATA chunks consume TSNs; DATA chunks are the only chunks that are acknowledged. IV.129

Figure IV.34 Simple data transfer IV.130

Note The acknowledgment in SCTP defines the cumulative TSN, the TSN of the last data chunk received in order. IV.131

Figure IV.35 Association termination IV.132

Figure IV.36 Flow control, receiver site IV.133

Figure IV.37 Flow control, sender site IV.134

Figure IV.38 Flow control scenario IV.135

Figure IV.39 Error control, receiver site IV.136

Figure IV.40 Error control, sender site IV.137