Chapter 6 The Transport Layer The Transport Service & Elements of Transport Protocols.

Slides:



Advertisements
Similar presentations
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 20 – Transport Protocols.
Advertisements

Transport Layer. Context of various layers upto Network layer NL : present in LAN and subnet MAC sublayer : not present in Subnets, only in LANs DLL :
1 Transport Protocols & TCP CSE 3213 Fall April 2015.
Chapter 6 The Transport Layer.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Transport Layer Chapter
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 6 Transport Layer.
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
Chapter 6 The Transport Layer.
Transmission Control Protocol (TCP)
XCYANG Transport Protocols XCYANG Department of Computer Science and Technology, Nanjing University 1 Data Communications and Networking Chapter.
I N THE N AME OF G OD C OMPUTER N ETWORKS C HAPTER 6: T HE T RANSPORT L AYER Dr. Shahriar Bijani Shahed University May 2014.
1 TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
Chapter 6 The Transport Layer.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
The Transport Layer Chapter 6. The Transport Service Services Provided to the Upper Layers Transport Service Primitives Berkeley Sockets An Example of.
The Transport Layer Chapter 6. The Transport Service Services Provided to the Upper Layers Transport Service Primitives Berkeley Sockets An Example of.
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Transport Layer.
The OSI Reference Model
Computer Networks Transport Layer. Topics F Introduction  F Connection Issues F TCP.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
Gursharan Singh Tatla Transport Layer 16-May
Process-to-Process Delivery:
Chapter 6 The Transport Layer.
The Transport Layer.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Transport Layer Chapter 6.
6.1. Transport Control Protocol (TCP) It is the most widely used transport protocol in the world. Provides reliable end to end connection between two hosts.
SMUCSE 4344 transport layer. SMUCSE 4344 transport layer end-to-end protocols –transport code runs only on endpoint hosts encapsulates network communications.
The Transport Layer.
The Transport Layer Chapter 6. The Transport Service The transport layer is the heart of the whole protocol hierarchy It provides reliable data transport.
Transport Layer: TCP and UDP. Overview of TCP/IP protocols Comparing TCP and UDP TCP connection: establishment, data transfer, and termination Allocation.
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
Fall 2005 By: H. Veisi Computer networks course Olum-fonoon Babol Chapter 6 The Transport Layer.
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
(from Tanenabaum: “Computer Networks” Chapter 1) and
Networking Basics CCNA 1 Chapter 11.
The Transport Layer Chapter 6. Transport Service Primitives The primitives for a simple transport service.
The Transport Layer Chapter 6 12/14/2015www.ishuchita.com1.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Protocols and Architecture Slide 1 Use of Standard Protocols.
5. The Transport Layer 5.1 Role of Transport Layer It bridge the gab between applications and the network layer. Provides reliable cost-effective data.
4343 X2 – The Transport Layer Tanenbaum Ch.6.
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Distributed Systems 8. Transport Layer Simon Razniewski Faculty of Computer Science Free University of Bozen-Bolzano A.Y. 2014/2015.
The Transport Layer Dr. ir. S.S. Msanjila RIS 251.
Distributed Systems 12. Transport Layer Simon Razniewski Faculty of Computer Science Free University of Bozen-Bolzano A.Y. 2015/2016.
Roadmap  Introduction to Basics  Computer Network – Components | Classification  Internet  Clients and Servers  Network Models  Protocol Layers.
Distributed Systems 11. Transport Layer
Application – Transport – Network
The Transport Layer Implementation Services Functions Protocols
Fast Retransmit For sliding windows flow control we waited for a timer to expire before beginning retransmission of a packet TCP uses an additional mechanism.
Unit-7 The Transport Layer.
Process-to-Process Delivery, TCP and UDP protocols
Chapter 6 The Transport Layer.
TCP.
PART 5 Transport Layer Computer Networks.
Transport Layer: Sliding Window Reliability
Chapter 6: Transport Layer (Part I)
Notes and Handouts The Transport Layer
Computer Networks Bhushan Trivedi, Director, MCA Programme, at the GLS Institute of Computer Technology, Ahmadabad.
Chapter 6 The Transport Layer The Transport Service & Elements of Transport Protocols.
Transport Layer Unit 5.
Process-to-Process Delivery:
Chapter 5 TCP Control Flow
NT1210 Introduction to Networking
TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
The Transport Layer Chapter 6.
Process-to-Process Delivery: UDP, TCP
Computer Networks Protocols
Transport Layer 9/22/2019.
EEL 5718 Computer Communications
Presentation transcript:

Chapter 6 The Transport Layer The Transport Service & Elements of Transport Protocols

Transport Service Services provided to the Upper Layers Transport Service Primitives Berkeley Sockets Example of Socket Programming: Internet File Server

Services Provided to the Upper Layers Fig.: The network, transport, and application layers Transport layer responsibilities: Establishment, data transfer and release Make it more reliable than the underlying layer

Transport Service Primitives (1) The primitives for a simple transport service

Transport Service Primitives (2) Nesting of segments, packets, and frames.

Berkeley Sockets (1) A state diagram for a simple connection management scheme. Transitions labeled in italics are caused by packet arrivals. The solid lines show the client’s state sequence. The dashed lines show the server’s state sequence.

The socket primitives for TCP Berkeley Sockets (2) The socket primitives for TCP

Example of Socket Programming: An Internet File Server (1) . . . Client code using sockets

Example of Socket Programming: An Internet File Server (2) . . . . . . Client code using sockets

Example of Socket Programming: An Internet File Server (3) . . . Client code using sockets

Example of Socket Programming: An Internet File Server (4) . . . Server code

Example of Socket Programming: An Internet File Server (5) . . . . . . Server code

Example of Socket Programming: An Internet File Server (6) . . . Server code

Elements of Transport Protocols (1) Addressing Connection establishment Connection release Error control and flow control Multiplexing Crash recovery

Similarity between data link and transport layer Connection establishment Connection release Error control and flow control

Elements of Transport Protocols (2) Environment of the data link layer. Environment of the transport layer.

TSAPs, NSAPs, and transport connections Addressing (1) TSAPs, NSAPs, and transport connections

Addressing (2) How a user process in host 1 establishes a connection with a mail server in host 2 via a process server.

Connection Establishment (1) Techniques to enable receiver to distinguish between retransmitted packets and packets delivered late: Throwaway transport addresses. Assign each connection a different identifier: <Peer transport entity, connection entity> Limitation: Nodes have to maintain history information indefinitely.

Connection Establishment (2) Techniques for restricting packet lifetime: Restricted network design. Putting a hop counter in each packet. Timestamping each packet.

Connection Establishment (3) Segments may not enter the forbidden region. The resynchronization problem.

Connection Establishment (3) 3 protocol scenarios for establishing a connection using a 3-way handshake. CR denotes CONNECTION REQUEST. (1) Normal operation.

Connection Establishment (4) 3 protocol scenarios for establishing a connection using a 3-way handshake. CR denotes CONNECTION REQUEST. (2) Old duplicate CONNECTION REQUEST appearing out of nowhere.

Connection Establishment (5) 3 protocol scenarios for establishing a connection using a 3-way handshake. CR denotes CONNECTION REQUEST. (3) Duplicate CONNECTION REQUEST and duplicate ACK.

Connection Release (1) Abrupt disconnection with loss of data – one way release or two way release

The two-army problem Synchronization which will go on infinitely Connection Release (2) The two-army problem Synchronization which will go on infinitely

Connection Release (3) Four protocol scenarios for releasing a connection. (1) Normal case of three-way handshake

Connection Release (4) Four protocol scenarios for releasing a connection. (2) Final ACK lost.

Four protocol scenarios for releasing a connection. (3) Response lost Connection Release (5) Four protocol scenarios for releasing a connection. (3) Response lost

Connection Release (6) Four protocol scenarios for releasing a connection. (4) Response lost and subsequent DRs lost.

Error Control and Flow Control (1) (a) Chained fixed-size buffers. (b) Chained variable-sized buffers. (c) One large circular buffer per connection.

Error Control and Flow Control (2) For low-bandwidth bursty traffic, it is better not to allot buffer on connection establishment. Dynamic allotment of buffer a better strategy. Decouple sliding window protocol.

Error Control and Flow Control (3) Dynamic buffer allocation. The arrows show the direction of transmission. An ellipsis (...) indicates a lost segment

Error Control and Flow Control (4) Assuming buffer size is infinite, carrying capacity becomes a bottleneck. If adjacent routers can exchange at most x packets/sec, and there are k disjoint paths between a pair of hosts, max. rate of segment-exchange between hosts = kx segments/sec

(a) Multiplexing. (b) Inverse multiplexing.

Different combinations of client and server strategies Crash Recovery Different combinations of client and server strategies

Continued … Chapter 6