0% found this document useful (0 votes)
14 views18 pages

2.2 - Transport Layer

Uploaded by

Jaat Sachit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views18 pages

2.2 - Transport Layer

Uploaded by

Jaat Sachit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

Selected Topics In Computer Engineering-II

COO4470

Unit - II
TCP/IP Model
 Transmission control protocol/Internet protocol

SMTP, FTP, SNMP, …..

TCP, UDP, SCTP

IP, ICMP, IGMP


Transport Layer Services
 Services provided by the transport layer:
 Process to process communication
 Encapsulation and Decapsulation
 Multiplexing and Demultiplexing
 Flow control
 Error control
 Congestion control
 Connectionless and connection-oriented services
Transport layer protocols
 TCP/IP protocol suite specifies two protocols for the transport layer originally: UDP
(User Datagram protocol) and TCP (Transmission Control Protocol)
 Figure: UDP in the TCP/IP protocol suite
UDP
 UDP is located between the application layer and the IP layer
 It serves as the intermediary between the application programs and the
network operations
 UDP uses port numbers to accomplish a process-to-process communication
 UDP does not provide any flow control mechanism and there is no
acknowledgment for received packets
 UDP, however, does provide error control to some extent by means of
checksum
 If UDP detects an error in the received packet, it silently drops it
 UDP is a connectionless, unreliable transport protocol

Disadvantage, so why use it?


User Datagram
 UDP packets are called User Datagrams
 Figure: User datagram format
User Datagram
 Source port number
 port number used by the process running on the source host.
 It is 16 bits long, can range from 0 to 65,535
 If the source host is the client (a client sending a request), the port number is an
ephemeral port number
 If the source host is the server, the port number is a well-known port number
 Destination port number
 port number used by the process running on the destination host
 It is also 16 bits long
 If the destination host is the server, the port number is a well-known port number
 If the destination host is the client, the port number is an ephemeral port number
User Datagram
 Length
 a 16-bit field that defines the total length of the user datagram, header plus
data.
 The 16 bits can define a total length of 0 to 65,535 bytes
 Checksum
 This field is used to detect errors over the entire user datagram (header plus
data)
 Example:
 The following is a dump of a UDP header in hexadecimal format.
 CB84000D001C001C

 Identify the following:


 source port number, destination port number
 total length of the user datagram, length of the data
 Is the packet directed from a client to a server or vice versa
User Datagram
 Table: Well-known Ports used with UDP
UDP Services
 Process-to-Process Communication – using sockets
 Connectionless Services
 Each user datagram sent by UDP is an independent datagram
 no relationship between the different user datagrams even if they are coming
from the same source process and going to the same destination program
 The user datagrams are not numbered
 each user datagram can travel on a different path
 Disadvantage: the process that uses UDP cannot send a stream of data
 Flow Control
 There is no flow control
 the process using UDP should provide for this service, if needed
 Error Control
 no error control mechanism in UDP except for the checksum
 When the receiver detects an error through the checksum, the user datagram is
silently discarded
UDP Services
 Congestion Control
 UDP does not provide congestion control as it is a connectionless protocol
 Encapsulation and Decapsulation
UDP Services
 Multiplexing and Demultiplexing
 Several processes may want to use the services of UDP
 To handle this situation, UDP multiplexes and demultiplexes
UDP Checksum
 The checksum includes three sections: a pseudoheader, the UDP header,
and the data coming from the application layer
TCP
 TCP stands for Transmission Control Protocol
 It provides a connection oriented service
 Services:
 Process-to-Process Communication
 Stream Delivery Service
 Sending and Receiving Buffers 

 Full-Duplex Communication
 Multiplexing and Demultiplexing
 Connection-Oriented Service
 Reliable Service – through acknowledgement
 Flow Control
 Error Control
 Congestion Control
TCP
 Connection-Oriented Service:
 The two TCPs establish a virtual connection between them
 Data are exchanged in both directions
 The connection is terminated

 Connection Establishment
 Using Three-Way Handshaking
TCP
 Data Transfer
TCP
 Connection Termination
 Using Three-Way
Handshaking
TCP
 TCP Segment

You might also like