Transport Layer Overview

Similar documents
Chapter 11. User Datagram Protocol (UDP)

Network Security in Practice

Lecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. G.Bianchi, G.Neglia, V.Mancuso

Transport Layer Services Mul9plexing/Demul9plexing. Transport Layer Services

Improved Digital Media Delivery with Telestream HyperLaunch

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

Transport Layer Protocols

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Limi Kalita / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014, Socket Programming

Application layer Protocols application transport

Ethernet. Ethernet. Network Devices

Network Programming TDC 561

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Data Communication & Networks G

IP - The Internet Protocol

Access Control: Firewalls (1)

How To Understand The Internet Of S (Netware)

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

The Transport Layer. Antonio Carzaniga. October 24, Faculty of Informatics University of Lugano Antonio Carzaniga

Protocols and Architecture. Protocol Architecture.

How To Design A Layered Network In A Computer Network

Computer Networks UDP and TCP

Based on Computer Networking, 4 th Edition by Kurose and Ross

[Prof. Rupesh G Vaishnav] Page 1

Transport Layer. Chapter 3.4. Think about

Lecture 28: Internet Protocols

SSC - Communication and Networking Java Socket Programming (II)

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

The OSI Model and the TCP/IP Protocol Suite

IP Subnetting and Addressing

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Final for ECE374 05/06/13 Solution!!

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Network Layer: Network Layer and IP Protocol

q Connection establishment (if connection-oriented) q Data transfer q Connection release (if conn-oriented) q Addressing the transport user

Internet Packets. Forwarding Datagrams

Objectives of Lecture. Network Architecture. Protocols. Contents

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

Computer Networks. Chapter 5 Transport Protocols

8.2 The Internet Protocol

RARP: Reverse Address Resolution Protocol

First Midterm for ECE374 03/09/12 Solution!!

Chapter 8 Security Pt 2

Chapter 5. Transport layer protocols

IP Addressing. -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing

RTP / RTCP. Announcements. Today s Lecture. RTP Info RTP (RFC 3550) I. Final Exam study guide online. Signup for project demos

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

IP addressing and forwarding Network layer

Chapter 3. Internet Applications and Network Programming

ICOM : Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

CPS221 Lecture: Layered Network Architecture

NAT & IP Masquerade. Internet NETWORK ADDRESS TRANSLATION INTRODUCTION. NAT & IP Masquerade Page 1 of 5. Internal PC

Internet Concepts. What is a Network?

PART OF THE PICTURE: The TCP/IP Communications Architecture

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

Protocol Security Where?

Chapter 9. IP Secure

Architecture and Performance of the Internet

Variable length subnetting

The TCP/IP Reference Model

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

CS 43: Computer Networks IP. Kevin Webb Swarthmore College November 5, 2013

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

IT4405 Computer Networks (Compulsory)

CS335 Sample Questions for Exam #2

TCP/IP Programming. Joel Snyder, Opus1 Geoff Bryant, Process Software

How do I get to

(Refer Slide Time: 02:17)

Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

Address Resolution Protocol (ARP)

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Module 7 Internet And Internet Protocol Suite

Solution of Exercise Sheet 5

CS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding

LESSON Networking Fundamentals. Understand TCP/IP

Internet Control Protocols Reading: Chapter 3

Transport and Network Layer

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Network layer: Overview. Network layer functions IP Routing and forwarding

Protocols. Packets. What's in an IP packet

Network Security TCP/IP Refresher

21.4 Network Address Translation (NAT) NAT concept

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

IP address format: Dotted decimal notation:

Lecture 23: Firewalls

CS101 Lecture 19: Internetworking. What You ll Learn Today

Firewall Implementation

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

Computer Networks/DV2 Lab

Overview of Computer Networks

User Datagram Protocol - Wikipedia, the free encyclopedia

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Computer Networks and the Internet

A Transport Protocol for Multimedia Wireless Sensor Networks

Transcription:

Transport Layer Overview Kai Shen Transport-layer Overview Network layer: host-to-host to logical communication between hosts. Transport layer: logical communication between s. multiple comm. s can reside in one host. comm. s can be a Web browser/server, an FTP client/server, etc. 10/5/2011 CSC 257/457 - Fall 2011 1 10/5/2011 CSC 257/457 - Fall 2011 2 Multiplexing/demultiplexing Transport-layer Service Model t P2 Transport layer: logical communication between s. lil i l i l i host A host B = comm. = socket Possible additional services: reliable data transfer (guaranteed arrival, no error, in-order) flow control (keep sender from overrunning receiver): good for myself congestion control (keep sender from overrunning ): good for the community delay/bandwidth guarantee on host A is communicating with on host B; while at the same time, P2 on host A is communicating with on host B. 10/5/2011 CSC 257/457 - Fall 2011 3 10/5/2011 CSC 257/457 - Fall 2011 4 CSC 257/457 - Fall 2011 1

Transport-layer in the Internet Architecture Internet Transport-layer Protocols End-host only implementation Simple layer, complex Benefits: Flexible layer Fast, stable core Challenge: Transport functions without router assistance UDP: minimum service p g error detection TCP: full service error detection reliable data transfer flow control congestion control Services not available: delay guarantees bandwidth guarantees why? 10/5/2011 CSC 257/457 - Fall 2011 5 10/5/2011 CSC 257/457 - Fall 2011 6 Connection-oriented /Connectionless Transport Outline What is a connection? logical grouping of data segments for a comm. session between the same pair of end-points state maintained for such session Why is a connection useful? conn. state-based reliable communication track performance using a history of performance measurement UDP is connectionless TCP is connection-oriented Overview of -layer services/protocols Multiplexing l and demultiplexing l Connectionless : UDP Principles of reliable data transfer Connection-oriented : TCP reliable data transfer flow control connection management Principles of congestion control Congestion control in TCP 10/5/2011 CSC 257/457 - Fall 2011 7 10/5/2011 CSC 257/457 - Fall 2011 8 CSC 257/457 - Fall 2011 2

Multiplexing/demultiplexing How multiplexing/demultiplexing works? host A t P2 = comm. = socket host B on host A is communicating with on host B; while at the same time, P2 on host A is communicating with on host B. 10/5/2011 CSC 257/457 - Fall 2011 9 IP header TCP/UDP header data IP packet format using port numbers each IP packet has source IP address, destination IP address each IP packet carries a -layer segment each segment has source, destination port number dest. IP address for routing to the host; IP addresses and port numbers for going to appropriate socket in the dest. host. 10/5/2011 CSC 257/457 - Fall 2011 10 UDP Demultiplexing: An Example TCP Demultiplexing (Connection-oriented) UDP socket identified by dest. IP address and port number port 1234 port 5678 P2 SP: XXXX SP: YYYY DP: 1234 DP: 5678 Multiple TCP connections may simultaneously share a single port: Example: web server (on default port 80) has multiple connections, one for each client TCP socket identified by 4-tuple: (source IP address, source port number, dest IP address, dest port number) recv host uses all four values to direct segment to appropriate socket Machine A Machine C Machine B 10/5/2011 CSC 257/457 - Fall 2011 11 10/5/2011 CSC 257/457 - Fall 2011 12 CSC 257/457 - Fall 2011 3

TCP Demultiplexing: An Example UDP: User Datagram Protocol all on port 80 listening socket 32 bits client IP: A SP: 80 DP: 9157 SP: 9157 SP: 9157 DP: 80 DP: 80 connection request server IP: C P5 SP: 80 DP: 5775 SP: 5775 DP: 80 P2 client IP: B Length, in bytes of UDP segment, including header source port # dest port # length checksum Application data (message) UDP segment format How large can a UDP segment be? 10/5/2011 CSC 257/457 - Fall 2011 13 10/5/2011 CSC 257/457 - Fall 2011 14 UDP: User Datagram Protocol UDP Checksum UDP is connectionless UDP does simple error detection UDP does not do reliable data transfer, flow control, congestion control Length, in bytes of UDP segment, including header 32 bits source port # length Application data (message) dest port # checksum UDP segment format 10/5/2011 CSC 257/457 - Fall 2011 15 Goal: detect errors (e.g., flipped bits) in transmitted segments Sender: Receiver: treat segment contents compute checksum of as sequence of 16-bit received segment integers check if computed checksum: addition (1 s checksum equals checksum complement sum) of field value: segment contents NO: error detected t d sender puts checksum value into UDP checksum YES: no error detected. field Why are there error detections in,, and layers? 10/5/2011 CSC 257/457 - Fall 2011 16 CSC 257/457 - Fall 2011 4

What is good about UDP? Less overhead: no running cost for connection management no space cost for connection state small segment header Flexibility in doing things your own way no congestion control: UDP can blast away as fast as desired (may not be good for others, but not bad for my own connection ) Simple more robust, less security vulnerability less susceptible to denial-of-service attacks UDP In Practice When to use UDP? TCP services are not useful, or even hurtful TCP services are useful, but not worth the cost TCP services are useful, but in customized ways Used for: routing exchanges between routers performance measurements streaming multimedia apps loss tolerant, rate sensitive flow control and loss recovery sometimes implemented at the level 10/5/2011 CSC 257/457 - Fall 2011 17 10/5/2011 CSC 257/457 - Fall 2011 18 Disclaimer Parts of the lecture slides contain original work of James Kurose, Larry Peterson, and Keith Ross. The slides are intended for the sole purpose of instruction of computer s at the University of Rochester. All copyrighted materials belong to their original owner(s). 10/5/2011 CSC 257/457 - Fall 2011 19 CSC 257/457 - Fall 2011 5