Tcp transport layer Er. Vikram Dhiman lpu discussion from last topic


One question often comes to the mind



Download 1,99 Mb.
bet2/8
Sana21.07.2022
Hajmi1,99 Mb.
#832530
1   2   3   4   5   6   7   8
Bog'liq
18360 transport-layer-tcp-and-udp

One question often comes to the mind.

  • If the data link layer is reliable and has flow
  • and error control, do we need this at the transport layer, too?
  • The answer is yes. Reliability at the data link layer is between two nodes;
  • we need reliability between two ends. Because the network layer in the Internet is unreliable (best-effort delivery), we need to implement reliability at the transport layer.

Error control in data link and transport layer

  • As we will see, flow and error control in TCP is implemented by the sliding window
  • protocol,

UDP

  • The User Datagram Protocol (UDP) is called a connectionless, unreliable transport protocol. It does not add anything to the services of IP except to provide process-to process
  • communication instead of host-to-host communication.
  • Also, it performs very limited error checking.

If UDP is so powerless, why would a process want to use it?

  • UDP is a very simple protocol using a minimum of overhead. If a process wants to send a small message and does not care much about reliability,
  • it can use UDP.
  • Sending a small message by using UDP takes much less interaction between the sender and receiver than using TCP or SCT

Well Know Port No.

UDP

  • Destination port number. This is the port number used by the process running on
  • the destination host. It is also 16 bits long
  • There is a field in the IP datagram
  • that defines the total length. There is another field in the IP datagram that defines
  • the length of the header. So if we subtract the value of the second field from the
  • first, we can deduce the length of a UDP datagram that is encapsulated in an
  • IP datagram.
  • 23.
  • 23.
  • PROCESS-TO-PROCESS DELIVERY
  • The transport layer is responsible for process-to-process delivery—the delivery of a packet, part of a message, from one process to another. Two processes communicate in a client/server relationship,
  • 23.
  • The transport layer is responsible for process-to-process delivery.
  • Note
  • 23.
  • Figure 23.1 Types of data deliveries
  • Client, server
  • 1. Local host
  • 2. Local process
  • 3. Remote host
  • 4. Remote process
  • 23.
  • lANA Ranges
  • The lANA (Internet Assigned Number Authority) has divided the port numbers into
  • three ranges: well known, registered, and dynamic (or private)
  • o Well-known ports.
  • The ports ranging from 0 to 1023 are assigned and controlled
  • by lANA. These are the well-known ports.
  • Registered ports. The ports ranging from 1024 to 49,151 are not assigned or controlled
  • by lANA.
  • Dynamic ports. The ports ranging from 49,152 to 65,535 are neither controlled
  • nor registered. They can be used by any process. These are the ephemeral ports
  • 23.
  • 23.
  • Figure 23.2 Port numbers
  • 23.
  • 23.
  • Figure 23.4 IANA ranges
  • 23.
  • Figure 23.5 Socket address
  • 23.
  • Figure 23.6 Multiplexing and demultiplexing
  • 23.
  • Figure 23.7 Error control
  • 23.
  • Figure 23.8 Position of UDP, TCP, and SCTP in TCP/IP suite
  • 23.
  • PROCESS-TO-PROCESS DELIVERY
  • The transport layer is responsible for process-to-process delivery—the delivery of a packet, part of a message, from one process to another. Two processes communicate in a client/server relationship, as we will see later.
  • 23.
  • The transport layer is responsible for process-to-process delivery.
  • Note
  • 23.
  • Figure 23.1 Types of data deliveries
  • Client, server
  • 1. Local host
  • 2. Local process
  • 3. Remote host
  • 4. Remote process
  • 23.
  • lANA Ranges
  • The lANA (Internet Assigned Number Authority) has divided the port numbers into
  • three ranges: well known, registered, and dynamic (or private)
  • o Well-known ports.
  • The ports ranging from 0 to 1023 are assigned and controlled
  • by lANA. These are the well-known ports.
  • Registered ports. The ports ranging from 1024 to 49,151 are not assigned or controlled
  • by lANA.
  • Dynamic ports. The ports ranging from 49,152 to 65,535 are neither controlled
  • nor registered. They can be used by any process. These are the ephemeral ports
  • 23.
  • 23.
  • Figure 23.2 Port numbers
  • 23.
  • Figure 23.3 IP addresses versus port numbers
  • 23.
  • Figure 23.4 IANA ranges
  • 23.
  • Figure 23.5 Socket address
  • 23.
  • Figure 23.6 Multiplexing and demultiplexing
  • 23.
  • Figure 23.7 Error control
  • 23.
  • Figure 23.8 Position of UDP, TCP, and SCTP in TCP/IP suite
  • 23.
  • USER DATAGRAM PROTOCOL (UDP)
  • The User Datagram Protocol (UDP) is called a connectionless, unreliable transport protocol. It does not add anything to the services of IP except to provide process-to-process communication instead of host-to-host communication.
  • 13 daytime
  • 111 RPC
  • 161 SNMP
  • 53 DNS
  • 23.
  • 23.
  • In UNIX, the well-known ports are stored in a file called /etc/services. Each line in this file gives the name of the server and the well-known port number. We can use the
  • grep utility to extract the line corresponding to the desired application. The following shows the port for FTP. Note that FTP can use port 21 with either UDP or TCP.
  • Example 23.1
  • 23.
  • Example 23.1 (continued)
  • 23.
  • Figure 23.9 User datagram format
  • 23.
  • UDP length = IP length – IP header’s length
  • Note
  • 23.
  • Figure 23.10 Pseudoheader for checksum calculation
  • If the checksum does not include the pseudoheader, a user datagram may arrive safe
  • and sound. However, if the IP header is corrupted, it may be delivered to the wrong host
  • 23.
  • Figure 23.11 shows the checksum calculation for a very small user datagram with only 7 bytes of data. Because the number of bytes of data is odd, padding is added for checksum calculation. The pseudoheader as well as the padding will be dropped when the user datagram is delivered to IP.
  • Example 23.2
  • 23.
  • Figure 23.11 Checksum calculation of a simple UDP user datagram
  • 23.
  • The UDP checksum calculation is different from the one for IP and ICMP. Here
  • the checksum includes three sections:
  • a pseudoheader,
  • the UDP header,
  • and the data
  • coming from the application layer.

Download 1,99 Mb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6   7   8




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish