EEL 5718 Computer Communications

Slides:



Advertisements
Similar presentations
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 20 – Transport Protocols.
Advertisements

Chapter 06 Transport Protocols
1 Transport Protocols & TCP CSE 3213 Fall April 2015.
EE 4272Spring, 2003 Chapter 17 Transport Protocols Connection-Oriented Transport Protocol  Under Reliable Network Service  Design Issues  Under Unreliable.
CISCO NETWORKING ACADEMY Chabot College ELEC Transport Layer (4)
TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 6 Transport Layer.
Transmission Control Protocol (TCP)
XCYANG Transport Protocols XCYANG Department of Computer Science and Technology, Nanjing University 1 Data Communications and Networking Chapter.
Computer Networks with Internet Technology William Stallings
Data and Computer Communications Tenth Edition by William Stallings Data and Computer Communications, Tenth Edition by William Stallings, (c) Pearson Education.
CSEE W4140 Networking Laboratory Lecture 6: TCP and UDP Jong Yul Kim
1 TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
1 CS 4396 Computer Networks Lab Transmission Control Protocol (TCP) Part I.
1 Chapter 3 TCP and IP. Chapter 3 TCP and IP 2 Introduction Transmission Control Protocol (TCP) Transmission Control Protocol (TCP) User Datagram Protocol.
5/6/2015© 2010 Raymond P. Jefferis IIILect Transport Layer.
1 TCP CSE May TCP Services Flow control Connection establishment and termination Congestion control 2.
Computer Networks with Internet Technology William Stallings
Semester Copyright USM EEE442 Computer Networks Transport Protocol En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex, UK)
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 20 – Transport Protocols.
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Transport Layer.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Transport Protocols Slide 1 Transport Protocols.
TCP. Learning objectives Reliable Transport in TCP TCP flow and Congestion Control.
EE 4272Spring, 2003 Chapter 17 Transport Protocols Connection-Oriented Transport Protocol  Reliable Network Service: Design Issues  Unreliable Network.
Gursharan Singh Tatla Transport Layer 16-May
Process-to-Process Delivery:
1 Transport Layer Computer Networks. 2 Where are we?
William Stallings Data and Computer Communications Chapter 20 Transport Protocols.
6.1. Transport Control Protocol (TCP) It is the most widely used transport protocol in the world. Provides reliable end to end connection between two hosts.
TCP : Transmission Control Protocol Computer Network System Sirak Kaewjamnong.
University of the Western Cape Chapter 12: The Transport Layer.
CSC 336 Data Communications and Networking Lecture 10: Transport Layer Dr. Cheer-Sun Yang Spring 2001.
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 2.5 Internetworking Chapter 25 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
Transport Layer Moving Segments. Transport Layer Protocols Provide a logical communication link between processes running on different hosts as if directly.
1 15. Transport Protocols. Prof. Sang-Jo Yoo 2 Contents  Transport protocol  Transport Service  Protocol for reliable network service  Protocol for.
Computer Networks with Internet Technology William Stallings Chapter 06 Transport Protocols 1.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 20 – Transport Protocols.
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Chapter 5 Peer-to-Peer Protocols and Data Link Layer Timing Recovery.
William Stallings Data and Computer Communications Chapter 17 Transport Protocols.
1 Chapter 24 Internetworking Part 4 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
Chapter 7: Transport Layer
The Transport Layer Implementation Services Functions Protocols
Chapter 9: Transport Layer
Fast Retransmit For sliding windows flow control we waited for a timer to expire before beginning retransmission of a packet TCP uses an additional mechanism.
Lecture (2).
William Stallings Data and Computer Communications
Unit-7 The Transport Layer.
Instructor Materials Chapter 9: Transport Layer
5. End-to-end protocols (part 1)
Transport Layer.
Process-to-Process Delivery, TCP and UDP protocols
TCP.
PART 5 Transport Layer Computer Networks.
Chapter 6: Transport Layer (Part I)
TCP - Part I Karim El Defrawy
Transport Layer Unit 5.
TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
Process-to-Process Delivery:
University of Houston Transport Protocols Datcom II Lecture 9
Chapter 17. Transport Protocols
Week 10 Transport Protocols
TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
Process-to-Process Delivery: UDP, TCP
Computer Networks Protocols
Transport Layer 9/22/2019.
Presentation transcript:

EEL 5718 Computer Communications Transport Layer Protocols 5:33 AM

Transport Protocol Task: Reliable message delivery from end node to another end node via a subnet Transport service is end to end protocol between two systems on the same network 5:33 AM

End-to-End Connection Messages Messages Segments Transport Layer Transport Layer Network Layer Network Layer Network Layer Network Layer Data link Layer Data link Layer Data link Layer Data link Layer End system A End system B Physical Layer Physical Layer Physical Layer Physical Layer Network 5:33 AM

Point-to-Point vs. End-to-End Rigid (solid link) vs. flexible (rubber link) Predictable vs. unpredictable (in terms of round-trip delay) 5:33 AM

End-to-end Quality of Service (QoS) A set of qualitative and quantitative measures that define an acceptable level of performance Reliability: error rate Setup time Delay and delay variations (jitters) Throughput Priority Protection Resilience Security More 5:33 AM

Network Network service Application Application Adaptation Function End-to-end application requirements Network service Application Figure 5.5

Issues in Transport Protocol Issues to be addressed Handling arbitrary message sizes Segmentation/reassembly Reliability and sequencing ARQ protocols Pacing and flow control Sliding window control Congestion control Timing: sequence numbering or time-stamping Addressing Privacy, integrity, and authentication 5:33 AM

Addressing Target user specified by: User identification Usually a host, port number Port represents a particular transport service (TS) user Transport entity identification (e.g., TCP, UDP) Host address An attached network device In an internet, a global internet address Network number Address=<galaxy><star><planet><country><network><host><port> 5:33 AM

Finding Addresses Four methods Know address ahead of time e.g. collection of network device stats: device ID Well known addresses Name server or directory server Sending process request to well known address Address Resolution Protocol (ARP) 5:33 AM

Multiplexing Multiple users employ the same network connection User identified by port number or service access point (SAP) May also multiplex with respect to network services used e.g., multiplexing a single virtual X.25 circuit to a number of transport service user X.25 charges per virtual circuit connection time 5:33 AM

Service Access Point (SAP): Transport SAP, Network SAP TSAP, NSAP and connections 5:33 AM

User Process Operation Establishing connection 5:33 AM

Flow Control Longer transmission delay between transport entities compared with actual transmission time Delay in communication of flow control info Variable transmission delay Difficult to use timeouts Flow may be controlled because: The receiving user can not keep up The receiving transport entity can not keep up Results in buffer filling up (buffer overflow) 5:33 AM

Flow Control (Cont) Do nothing Refuse further segments Segments that overflow are discarded Sending transport entity will fail to get ACK and will retransmit: time-out Refuse further segments Clumsy Multiplexed connections are controlled on aggregate flow 5:33 AM

Flow Control (Cont) Use fixed sliding window protocol Incorporated in ARQ as well as congestion control Works well on reliable network Failure to receive ACK is taken as flow control indication Does not work well on unreliable network Can not distinguish between lost segment and flow control Use credit schemes Successful delivery (positive ack) will lead to more packet deliveries Will discuss more in next chapter 5:33 AM

Establishment and Termination Allow each end to know the other exists Negotiation of optional parameters (for QoS) Triggers allocation of transport entity resources By mutual agreement 5:33 AM

Connection State Diagram: Protocol Verification

Problems to Be Handled Ordered Delivery Retransmission strategy (ARQ) Duplication detection (Sequence Number) Flow control (Sliding Window) Connection establishment Connection termination Crash recovery 5:33 AM

TCP/IP Suite Transmission Control Protocol (TCP) Connection oriented RFC 793 User Datagram Protocol (UDP) Connectionless RFC 768 5:33 AM

TCP Services Reliable communication between a pair of processes (end users) Across variety of reliable and unreliable networks and internets Two labeling facilities Data stream push TCP user can require transmission of all data up to push flag Receiver will deliver in same manner Avoids waiting for full buffers Urgent data signal Indicates urgent data is upcoming in stream User decides how to handle it 5:33 AM

TCP Header 5:33 AM

Items Passed to IP TCP passes some parameters down to IP Precedence (priority) Normal delay/low delay Normal throughput/high throughput Normal reliability/high reliability Security 5:33 AM

TCP Mechanisms Connection establishment Three way handshake Between pair of ports One port can connect to multiple destinations 5:33 AM

SYN, Seq_no = y, ACK, Ack_no = x+1 Host A Host B SYN, Seq_no = x SYN, Seq_no = y, ACK, Ack_no = x+1 Seq_no = x+1, ACK, Ack_no = y+1 Figure 8.22

TCP Mechanisms (cont) Data transfer Logical stream of octets Flow control by credit allocation of number of octets Data buffered at transmitter and receiver Error control Selective Repeat (SR) ARQ Sliding window scheme is used Time-out is adaptively estimated based on the estimation of Round-Trip-Time (RTT) (more will be discussed in congestion control) 5:33 AM

TCP Mechanisms (cont) Connection termination Graceful close TCP users issues CLOSE primitive Transport entity sets FIN flag on last segment sent Abrupt termination by ABORT primitive Entity abandons all attempts to send or receive data RST segment transmitted 5:33 AM

UDP User Datagram Protocol RFC 768 Connectionless service for application level procedures Unreliable Delivery and duplication control not guaranteed Reduced overhead e.g. network management (ICMP) 5:33 AM

UDP Applicaitons Inward data collection Outward data dissemination Request-Response Real time application 5:33 AM

Reading Textbook Chapter 5, Chapter 8 Tanenbaum, Chapter 6 Stallings Chapter 17 5:33 AM