1 TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.

Slides:



Advertisements
Similar presentations
TCP/IP Christopher Zacky. lolwut Decimal Numbers.
Advertisements

Flow control Connection management TCP, UDP
CISCO NETWORKING ACADEMY Chabot College ELEC Transport Layer (4)
TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
Transmission Control Protocol (TCP)
Fundamentals of Computer Networks ECE 478/578 Lecture #20: Transmission Control Protocol Instructor: Loukas Lazos Dept of Electrical and Computer Engineering.
CSEE W4140 Networking Laboratory Lecture 6: TCP and UDP Jong Yul Kim
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
CS 471/571 Transport Layer 5 Slides from Kurose and Ross.
TCP & UDP - Protocol Details Yen-Cheng Chen
Configuring a Router with RIP Basic Configuration and Show Commands.
1 CS 4396 Computer Networks Lab Transmission Control Protocol (TCP) Part I.
TCP: Transmission Control Protocol Overview Connection set-up and termination Interactive Bulk transfer Timers Improvements.
Transmission Control Protocol (TCP) Basics
1 Transport Protocols Relates to Lab 5. UDP and TCP.
5/6/2015© 2010 Raymond P. Jefferis IIILect Transport Layer.
CS3505 The Internet and Info Hiway transport layer protocols : TCP/UDP.
Provides a reliable unicast end-to-end byte stream over an unreliable internetwork.
1 Week 10 Transport Protocols, UDP, TCP. 2 Orientation r We move one layer up and look at the transport layer across the Internet.
Transport Layer – TCP (Part1) Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
TELE202 Lecture 14 TCP/UDP (2) 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »TCP/UDP (1) »Source: chapter 17 ¥This Lecture »TCP/UDP (2) »Source: chapter.
TCP segment structure source port # dest port # 32 bits application data (variable length) sequence number acknowledgement number rcvr window size ptr.
TCP© Dr. Ayman Abdel-Hamid, CS4254 Spring CS4254 Computer Network Architecture and Programming Dr. Ayman A. Abdel-Hamid Computer Science Department.
EEC-484/584 Computer Networks Lecture 15 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
CSEE W4140 Networking Laboratory Lecture 6: TCP and UDP Jong Yul Kim
Lecture 23: Network Primer 7/15/2003 CSCE 590 Summer 2003.
CSCE 515: Computer Network Programming TCP Details Wenyuan Xu Department of Computer Science and Engineering.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
TCP. Learning objectives Reliable Transport in TCP TCP flow and Congestion Control.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
1 ELEN 602 Lecture 15 More on IP TCP. 2 byte stream Send buffer segments Receive buffer byte stream Application ACKs Transmitter Receiver TCP Streams.
Gursharan Singh Tatla Transport Layer 16-May
Process-to-Process Delivery:
6.1. Transport Control Protocol (TCP) It is the most widely used transport protocol in the world. Provides reliable end to end connection between two hosts.
2: Transport Layer 21 Transport Layer 2. 2: Transport Layer 22 TCP: Overview RFCs: 793, 1122, 1323, 2018, 2581 r full duplex data: m bi-directional data.
TCP : Transmission Control Protocol Computer Network System Sirak Kaewjamnong.
TCP Lecture 13 November 13, TCP Background Transmission Control Protocol (TCP) TCP provides much of the functionality that IP lacks: reliable service.
CS332, Ch. 26: TCP Victor Norman Calvin College 1.
Transport Layer: UDP, TCP
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
Slide #1 CIT 380: Securing Computer Systems TCP/IP.
ECE 4110 – Internetwork Programming
© Jörg Liebeherr (modified by Malathi Veeraraghavan) 1 Overview Formats, Data Transfer, etc. Connection Management.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
1 TCP ProtocolsLayer name DNSApplication TCP, UDPTransport IPInternet (Network ) WiFi, Ethernet Link (Physical)
1 Transmission Control Protocol (TCP) RFC: Introduction The TCP is intended to provide a reliable process-to-process communication service in a.
Two Transport Protocols Available Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Provides unreliable transfer Requires minimal – Overhead.
3. END-TO-END PROTOCOLS (PART 1) Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University 22 March
Fast Retransmit For sliding windows flow control we waited for a timer to expire before beginning retransmission of a packet TCP uses an additional mechanism.
TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
Introduction to Networks
5. End-to-end protocols (part 1)
Chapter 17 and 18: TCP is connection oriented
Process-to-Process Delivery
Chapter 5: Transport Protocols
TCP.
TCP - Part I Karim El Defrawy
TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
Chapter 12 Transmission Control Protocol
PART V Transport Layer.
PART 5 Transport Layer.
TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
Transport Protocols: TCP Segments, Flow control and Connection Setup
Introduction to Computer Networks
Lecture 21 and 22 5/29/2019.
Transport Protocols: TCP Segments, Flow control and Connection Setup
Process-to-Process Delivery: UDP, TCP
Transport Layer 9/22/2019.
Presentation transcript:

1 TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.

2 Overview TCP = Transmission Control Protocol TCP is a connection-oriented protocol that provides a reliable unicast end-to-end byte stream over an unreliable internetwork.

3 Connection-Oriented Before any data transfer, TCP establishes a connection: One TCP entity is waiting for a connection (“server”) The other TCP entity (“client”) contacts the server The actual procedure for setting up connections is more complex. Each connection is full duplex

4 Reliable Byte stream is broken up into chunks which are called segments – Receiver sends acknowledgements (ACKs) for segments – TCP maintains a timer. If an ACK is not received in time, the segment is retransmitted Detecting errors: – TCP has checksums for header and data. Segments with invalid checksums are discarded – Each byte that is transmitted has a sequence number

5 Byte Stream Service To the lower layers, TCP handles data in blocks, the segments. To the higher layers TCP handles data as a sequence of bytes and does not identify boundaries between bytes So: Higher layers do not know about the beginning and end of segments !

6 Format of TCP segments TCP segments have a min. 20 byte header with ≥ 0 bytes of data.

7 TCP header fields Port Number: A port number identifies the endpoint of a connection. A pair (IP address, port number) identifies one endpoint of a connection. Two pairs (client IP address, client port number) and (server IP address, server port number) identify a TCP connection.

8 TCP header fields Sequence Number (SeqNo): –Sequence number in TCP is 32 bits long. –The range is 0 ≤ Sequence number ≤  4.3 Gbyte –Sequence numbers count bytes –Content of SeqNo is first data byte of the packet –The Initial Sequence Number (ISN) is the initial value for the sequence number –The client and the server each select the ISN randomly during connection establishment

9 TCP header fields Acknowledgement Number (AckNo): –Acknowledgements are piggybacked, I.e a segment from A-to-B can contain an acknowledgement for a data sent in the B-to-A direction Q: Why is piggybacking good ? –A hosts uses the AckNo field to send acknowledgements. (If a host sends an AckNo in a segment it sets the “ACK flag”) –The AckNo contains the next SeqNo that a hosts wants to receive Example: The acknowledgement for a segment with sequence numbers is AckNo=1501

10 TCP header fields Acknowledge Number (cont’d) –TCP uses the sliding window flow protocol to regulate the flow of traffic from the sender to receiver –TCP uses the following variation of the sliding window protocol: –no NACKs (Negative ACKnowledgement) –only cumulative ACKs Example: Assume: Sender sends two segments with “ ” and “ ”, but receiver only gets the second segment. In this case, the receiver cannot acknowledge the second packet. It can only send AckNo=1

11 TCP header fields Header Length (4 bits): –Length of header in 32-bit words –Note that TCP header has variable length (with minimum 20 bytes)

12 TCP header fields Flag bits: –URG: Urgent pointer is valid –If the bit is set, the following bytes contain an urgent message in the range: SeqNo ≤ urgent message ≤ SeqNo + urgent pointer –ACK: Acknowledgement Number is valid –PSH: PUSH Flag –Notification from sender to the receiver that the receiver should pass all data that it has to the application. –Normally set by sender when the sender’s buffer is empty

13 TCP header fields Flag bits: –RST: Reset the connection –The flag causes the receiver to reset the connection –Receiver of a RST terminates the connection and indicates higher layer application about the reset –SYN: Synchronize sequence numbers –Sent in the first packet when initiating a connection –FIN: Sender is finished with sending –Used for closing a connection –Both sides of a connection must send a FIN

14 TCP header fields Window Size: –Each side of the connection advertises the window size –Window size is the maximum number of bytes that a receiver can accept –Maximum window size is = bytes TCP Checksum: –TCP checksum covers both TCP header and TCP data (also covers some parts of the IP header) Urgent Pointer: –Only valid if URG flag is set

15 TCP header fields Options:

16 TCP header fields Options: –NOP is used to pad TCP header to multiples of 4 bytes –Maximum Segment Size –Window Scale Options »Increases the TCP window from 16 to 32 bits, I.e., the window size is interpreted differently Q: What is the different interpretation ? »This option can only be used in the SYN segment (first segment) during connection establishment time –Timestamp Option »Can be used for roundtrip measurements

17 Connection Management in TCP Opening a TCP Connection Closing a TCP Connection Special Scenarios State Diagram

18 TCP Connection Establishment TCP uses a three-way handshake to open a connection: (1) ACTIVE OPEN: Client sends a segment with –SYN bit set * –port number of client –initial sequence number (ISN) of client (2) PASSIVE OPEN: Server responds with a segment with –SYN bit set * –initial sequence number of server –ACK for ISN of client (3) Client acknowledges by sending a segment with: – ACK ISN of server (* counts as one byte)

19 Three-Way Handshake

20 Three-Way Handshake 1 st segment: client.1121 > server.23: Flags: S SeqNo: : (0) win Options: 2 nd segment: server.23 > client.1121: Flags: S, ACK SeqNo: : (0) AckNo: win 8760 Options: 3 rd segment: client.1121 > server.23 : Flags: ACK AckNo: win Options:.

21 Three-Way Handshake

22 Why is a Two-Way Handshake not enough? When client initiates the data transfer (starting with SeqNo= ), server will reject all data. Will be discarded as a duplicate SYN

23 TCP Connection Termination Each end of the data flow must be shut down independently (“half- close”) If client or sender wish to terminate the connection they send a FIN segment. The side that has sent the FIN segment cannot send new data First FIN segment can be sent by either client or server Each side of the connection must send a FIN segment to close the connection Four steps involved: (1) X sends a FIN to Y (active close) (2) Y ACKs the FIN, (at this time: Y can still send data to X, but X cannot send data to Y) (3) and Y sends a FIN to X (passive close) (4) X ACKs the FIN.

24 TCP Connection Termination 1 st server.23 > client.1121 : Flags: F SeqNo: : (0) AckNo: win 8733 Options:. 2 nd segment: client.1121 > server.23 : Flags: ACK AckNo: win Options:. 3 rd segment: client.1121 > server.23 : Flags: F SeqNo: : (0) AckNo: win Options:. 4 th segment: client.1121 > server.23 : Flags: ACK SeqNo: win 8733 Options:.

25 TCP Connection Termination

26 TCP States

27 TCP States in “Normal” Connection Lifetime

28 TCP State Transition Diagram Opening A Connection

29 TCP State Transition Diagram Closing A Connection

30 TIME_WAIT State When TCP does an active close, and sends the final ACK, the connection must stay in in the TIME_WAIT state for twice the maximum segment lifetime (2MSL). The MSL is set to 2 minutes or 1 minute or 30 seconds. By waiting in this state, the active closer is given a chance to resent the final ACK. (Active closer will timeout after sending the FIN segment if no ACK is received. Then it will resend the FIN)

31 Resetting Connections Resetting connections is done by setting the RST flag in the TCP header When is the RST flag set? –Connection request arrives and no server process is waiting on the destination port –Abort (Terminate) a connection Causes the receiver to throw away buffered data. Receiver does not acknowledge the RST segment