1 transport layer computer networks. 2 where are we?

Post on 11-Jan-2016

220 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

1

Transport Layer

Computer Networks

2

Where are we?

3

Recall

Network LayerProvides host-to-host communicationSource and destination addresses identify

host interfacesMachine-to-machine networking

4

Transport Protocols

Provide application-to-application communication

Need extended addressing mechanism to identify applications

Called end-to-endOptionally provide:

ReliabilityFlow ControlCongestion Control

5

Example Transport Layer:Transmission Control Protocol (TCP)

Standardized by IETF as RFC 793Most popular layer 4 protocolConnection-oriented protocolConceptually between applications and IPFull-duplex operationByte-stream interfaceOf utmost importance for this class!

The book: TCP/IP Illustrated, Volume I - W.R. StevensAlso see: http://condor.depaul.edu/~jkristof/tcp.html

6

TCP Feature Summary

Provides a completely reliable (no data duplication or loss), connection-

oriented, full-duplex stream transport service that allows two application programs to form a connection, send data in either

direction and then terminate the connection.

7

Relationship Between TCP and Other Protocols

TCP on one computer uses IP to communicate with TCP on another computer

8

Apparent Contradiction

IP offers best-effort (unreliable) delivery

TCP uses IPTCP provides completely reliable

transferHow is this possible?

9

Achieving Reliability

Reliable connection setupReliable data transmissionReliable connection shutdown

10

Reliable Data Transmission

Positive AcknowledgementReceiver returns short message when data

arrivesCall an acknowledgement

RetransmissionSender starts timer whenever message is

transmittedIf timer expires before acknowledgement

arrives, sender retransmits message

11

Retransmission Illustrated

12

How Long Should TCP Wait Before Retransmitting?

Time for acknowledgement to arrive depends onDistance to destinationCurrent traffic conditions

Multiple connections can be open simultaneously

Traffic conditions change rapidly

13

Important Point

The delay required for data to reach a destination and an acknowledgement to return depends on traffic in the internet as well as the distance to

the destination. Since it allows multiple application programs to communicate with

multiple destinations concurrently, TCP must handle a variety of delays that can change

rapidly.

14

Solving the Retransmission Problem

Keep estimate of round trip time on each connection

Use current estimate to set retransmission timer

Known as adaptive retransmissionKey to TCP’s success

15

Adaptive Retransmission Illustrated

Timeout depends on current round-trip estimate

16

TCP Flow Control

ReceiverAdvertises available buffer spaceCalled the window

SenderCan send up to entire window before ACK

arrives

Also called a sliding window protocol

17

Window Advertisement

Each acknowledgement carries new window informationCalled window advertisementCan be zero (called closed window)

Interpretation: I have received up through X and can take Y more octets

18

Window Advertisement Illustrated

19

Another View: Sliding Window Illustrated

20

Startup and Shutdown

Connection StartupMust be reliable

Connection ShutdownMust be graceful

Difficult

21

Why Startup/Shutdown is Difficult

Segments can belostduplicateddelayeddelivered out of ordereither side can crasheither side can reboot

Need to avoid duplicate shutdown "message” from affecting later connection

22

TCP’s Startup Solution

Use three-message exchangeKnown as the 3-way handshakeNecessary and sufficient for

unambiguous, reliable startupSYN messages used for connection

establishment

23

3-Way Handshake Illustrated

24

TCP’s Shutdown Illustrated

25

Byte Stream Sequencing

Segments are labeled with a sequence number

Protects from out-of-order delivery32-bit numberLimited size of byte stream?Initial Sequence Numbers (ISNs) must be

exchanged at TCP connection establishment

26

More Complete Illustration of the 3-Way Handshake

27

Application Multiplexing

Cannot extend IP addressNo unused bits

Cannot use OS dependent quantityProcess IDTask numberJob name

Must work on all computer systems

28

Application Multiplexing Illustrated

29

Protocol Ports

Each application assigned a unique integer

ServerFollows standardAlways uses same port numberUsually uses lower port numbers

ClientObtains unused port from protocol softwareUsually uses higher port numbers

30

Protocol Port Example

Web server application is assigned port 80Web client application obtains port 32938TCP segment sent from client to server has

source port number 32938destination port number 80

When web server responds, TCP segment hassource port number 80destination port number 32938

31

Standard Protocol Ports

See http://www.iana.org for standard protocol port assignmentsSee /etc/services in UNIX systems and \winnt\system32\drivers\etc\services in Windows NT

32

TCP Segment Format

33

Example Transport Layer: User Datagram Protocol (UDP)

Unreliable message deliveryConnectionless protocolNo flow control (no window)No error recovery (no ACKs)Provides application multiplexingError detection optional (checksum

field)

34

UDP Message Format

top related