Unit- 4
Unit- 4
Transport Layer
OSI Model ( Layers)
1. Application layer
2. Presentation layer
3. Session layer
4. Transport layer
5. Network layer
6. Datalink layer
7. Physical layer
2
Error-----???
How to Control Error???
Error control Mechanism
3
Error control Mechanism
Stop and Wait ARQ (Automatic Repeat reQuest)
Sliding Window
4
STOP AND WAIT ARQ
5
STOP-AND-WAIT PROTOCOL
6
SLIDING WINDOW PROTOCOL
7
GO BACK N PROTOCOL
8
GO-BACK-N(GBN) PROTOCOL
• The key to Go-back-N is that we can send several packets before
receiving acknowledgments, but the receiver can only buffer one
packet.
SEND WINDOW
• The send window is an imaginary box covering the sequence
numbers of the data packets that can be in transit or can be sent
9
GO-BACK-N(GBN) PROTOCOL
• RECEIVE WINDOW
• The receive window makes sure that the correct data packets are
received and that the correct acknowledgments are sent.
• In Go-Back-N, the size of the receive window is always 1.
10
GO-BACK-N(GBN) PROTOCOL
11
GO-BACK-N(GBN) PROTOCOL
12
13
SELECTIVE REPEAT
14
SELECTIVE REPEAT
15
PORT NUMBERS & SERVICES
16
USER DATAGRAM PROTOCOL
17
APPLICATION OF UDP
1. Connectionless Service
• Short message
• Less Delay
18
Connectionless protocols
•HTTP (hypertext transfer)
•IP
•UDP (User Datagram Protocol)
•ICMP
•IPX
•TIPC
19
Here are some characteristics of connectionless
protocols:
21
22
A TCP CONNECTION
• Full duplex
• Three-way handshaking:
1. Connection establishment
2. Data Transfer
3. Connection Termination
23
A TCP CONNECTION
• Data Transfer
24
A TCP CONNECTION
• Connection Termination:
1. Three-way Handshaking
2. Half Close
Three-way Handshaking
25
A TCP CONNECTION: HALF CLOSE
• Connection Termination:
Half Close
26
TCP FLOW CONTROL
• The receiving TCP controls the sending TCP; the sending
TCP controls the sending process.
27
TCP ERROR CONTROL
• TCP provides reliability using error control.
• Error control includes mechanisms for detecting and resending
corrupted segments, resending lost segments, storing out-of
order segments until missing segments arrive, and detecting and
discarding duplicated segments.
• Error control in TCP is achieved through the use of three simple
tools:
1. Checksum
2. Acknowledgment: Cumulative ACK, Selective ACK
3. Time-out
28
TCP CONGESTION CONTROL
Congestion occurs, if load offered to any network is more than its
capability.
29
STREAM CONTROL TRANSMISSION PROTOCOL (SCTP)
30
SCTP SERVICES
Some important services provided by SCTP are as stated
below:
Step1: The two SCTPs establish the connection with each other.
Step2: Once the connection is established, the data gets exchanged
in both the directions.
Step3: Finally, the association is terminated.
32
FEATURES OF SCTP
1. Transmission Sequence Number (TSN): The unit of data in SCTP is
a data chunk. Data transfer in SCTP is controlled by numbering the data
chunks. In SCTP, TSN is used to assign the numbers to different data
chunks.
2. Stream Identifier (SI): 16 bit number and starts with 0. In SI, there
are several streams in each association and it is needed to identify them.
Each data chunk needs to carry the SI in the header, so that it is properly
placed in its stream on arrival.
3. Packets: The data is carried out in the form of data chunks and
control information is carried as control chunks. Data chunks and control
chunks are packed together in the packet.
34
Server:
36
UDP Client:
37
38
SMTP
41
DOMAIN NAME SYSTEM (DNS)
• Name Space
1. A name space that maps each address to a unique name can be organized in two ways:
Flat
Hierarchical
1. Flat name space: A name is assigned to an address A name in this space is a sequence of
characters without structure. The names may or may not have a common section.
2. Hierarchical name space: Each name is made of several parts. The first part can define the nature
of the organization, the second part can define the name of an organization, the third part can
define departments in the organization, and so on
42
1. DNS, or the Domain Name System, translates human readable
domain names (for example, www.amazon.com) to machine
readable IP addresses (for example, 192.0. 2.44).
Types of Domain
2. There are various kinds of domains:
• Generic
Domains: .com(commercial), .edu(educational), .mil(military), .org(
nonprofit organization), .net(similar to commercial) all these are
generic domains.
• Country Domain: .in (India) .us .uk
• Inverse Domain: if we want to know what is the domain name of
the website. IP to domain name mapping. So DNS can provide both
the mapping for example to find the IP addresses of
geeksforgeeks.org then we have to type
43
• nslookup www.geeksforgeeks.org
44
DOMAIN NAME SYSTEM (DNS)
• Domain name
If a label is terminated by a null string, it is called a fully qualified
domain name (FQDN).
If a label is not terminated by a null string, it is called a partially qualified
domain name (PQDN).
• Domain: Subtree of the domain name space
45
APPLICATION LAYER
INTRODUCTION TO REMOTE LOGIN PROTOCOLS: TELNET
• TELNET (Terminal Network)
• TELNET requires a logging name and password, it is vulnerable to hacking.
• TELNET client, which transforms the characters into a universal
character set called Network Virtual Terminal (NVT)
characters
47
INTRODUCTION TO REMOTE LOGIN PROTOCOLS: SSH
• SSH (Secure Shell)
• 3 Components:
• SSH Transport Layer Protocol (SSH-TRANS)
Privacy or confidentiality
Data Integrity
Server authentication
Compression of Messages
49
THANK YOU
50