SlideShare una empresa de Scribd logo
1 de 33
The Transport Layer
What You'll Learn in This Hour
 Connections oriented and connectionless
protocols
 Ports and sockets
 TCP
 UDP
At the completion of this hour, you
will be able to
 Describe the basic duties of the Transport layer
 Explain the difference between a connection-oriented protocol and a
connectionless protocol
 Explain how Transport layer protocols provide an interface to network
applications through ports and sockets
 Describe the differences between TCP and UDP
 Identify the fields that make up the TCP header
 Describe how TCP opens and closes a connection
 Describe how TCP sequences and acknowledges data transmissions
 Identify the four fields that comprise the UDP header
 the Transport layer protocols to provide the
following:
– Interface for network applications
– A mechanism for multiplexing/demultiplexing
– Error checking, flow control, and verification
– Transport Control Protocol (TCP)
– User Datagram Protocol (UDP)
Transport Layer Concepts
 Connection-oriented and
connectionless protocols
 Ports and sockets
 Multiplexing
Connection-Oriented and Connectionless Protocols
Connection-Oriented
Connectionless-Oriented
Ports and Sockets
 A port is a predefined internal address that
serves as a pathway from the application to
the Transport layer or from the Transport
layer to the application.
 A socket is an address formed by
concatenating the IP address and the port
number. For instance, the socket number
111.121.131.141.21 refers to port 21 on the
computer with the IP address
111.121.131.141.
Port
Socket
1.1.1.11.1.1.2
Socket 1.1.1.2.2500
Socket 1.1.1.1.23
Well-Known Port
 A well-known port is a port number that is
assigned to a specific application by ICANN
 See more details in “Sams Teach Yourself
TCP/IP in 24 Hours, Third Edition”
 Or you can see in http://www.iss.net/
security_center/advice/
Exploits/Ports/default.htm
Multiplexing/Demultiplexing
 The socket addressing system enables TCP
and UDP to perform another important
Transport layer task: multiplexing and
demultiplexing
Multiplexing/Demultiplexing
 Multiplexing/demultiplexing enables the lower levels
of the TCP/IP stack to process data without regard to
which application initiated that data.
 All associations with the originating application are
settled at the Transport layer, and data passes to and
from the Internet layer in a single, application-
independent pipeline.
 The key to multiplexing and demultiplexing is the
socket address. Because the socket address
combines the IP number with the port number, it
provides a unique identifier for a specific application
on a specific machine.
Multiplexing/Demultiplexing
Multiplexing/Demultiplexing
 See the Telnet server depicted in previous page
 All client machines use the well-known port address
TCP 23 to contact the Telnet server, but the
destination socket for each of the connecting PCs is
unique.
 Likewise, all network applications running on the
Telnet server use the server's IP address, but only
the Telnet service uses the socket address,
consisting of the server's IP address plus TCP port
23.
TCP: The Connection-Oriented
Transport Protocol
 Stream-oriented processing— TCP processes data in a stream. In other words,
TCP can accept data a byte at a time rather than as a preformatted block. TCP f
ormats the data into variable-length segments, which it will pass to the Internet l
ayer.
 Resequencing— If data arrives at the destination out of order, the TCP module
is capable of resequencing the data to restore the original order.
 Flow control — TCP's flow control feature ensures that the data transmission
won't outrun or overrun the destination machine's capability to receive the data.
This is especially critical in a diverse environment in which there may be conside
rable variation of processor speeds and buffer sizes.
 Precedence and security— The Department of Defense specifications for TCP
call for optional security and priority levels that can be set for TCP connections.
Many TCP implementations, however, do not provide these security and priority
features.
 Graceful close— TCP is as careful about closing a connection as it is about
opening a connection. The graceful close feature ensures that all segments hav
e been sent and received before a connection is closed.
TCP Header Format
192 bits
24 Bytes
TCP Header
 Source Port (16-bit)— The port number assigned to the application on the
source machine.
 Destination Port (16-bit)— The port number assigned to the application on
the destination machine.
 Sequence Number (32-bit)—The sequence number of the first byte in this
particular segment, unless the SYN flag is set to 1. If the SYN flag is set to
1, the Sequence Number field provides the initial sequence number (ISN),
which is used to synchronize sequence numbers. If the SYN flag is set to 1,
the sequence number of the first octet is one greater than the number that a
ppears in this field (in other words, ISN+1).
 Acknowledgment Number (32-bit)— The acknowledgment number
acknowledges a received segment. The value is the next sequence number
the receiving computer is expecting to receive, in other words, the
sequence number of the last byte received +1.
 Data offset (4 bits) — A field that tells the receiving TCP software how long
the header is and, therefore, where the data begins. The data offset is
expressed as an integer number of 32-bit words.
TCP Header
 Reserved (6 bits)— Reserved for future use. The Reserved field
provides room to accommodate future developments of TCP and must
be all zeros
 Control flags (1 bit each)— The control flags communicate special
information about the segment.
– URG— A value of 1 announces that the segment is urgent and the Urgent Pointer field
is significant.
– ACK— A value of 1 announces that the Acknowledgment Number field is significant.
– PSH— A value of 1 tells the TCP software to push all the data sent so far through the
pipeline to the receiving application.
– RST— A value of 1 resets the connection.
– SYN— A value of 1 announces that sequence numbers will be synchronized, marking
the beginning of a connection. See the discussion of the three-way handshake, later in
this hour.
– FIN— A value of 1 signifies that the sending computer has no more data to transmit.
This flag is used to close a connection.
TCP Header
 Window (16-bit)— A parameter used for flow control. The window defines
the range of sequence numbers beyond the last acknowledged sequence n
umber that the sending machine is free to transmit without further acknowle
dgment.
 Checksum (16-bit)— A field used to check the integrity of the segment. A
receiving computer performs a checksum calculation based on the segment
and compares the value to the value stored in this field. TCP and UDP
include a pseudo-header with IP addressing information in the checksum
calculation. See the discussion of the UDP pseudo-header later in this
hour.
 Urgent Pointer (16-bit)— An offset pointer pointing to the sequence number
that marks the beginning of any urgent information.
 Options— Specifies one of a small set of optional settings.
 Padding— Extra zero bits (as needed) to ensure that the data begins on a
32-bit boundary.
 Data— The data being transmitted with the segment.
TCP Connection
 Passive open— A given application process notifies
TCP that it is prepared to receive incoming connectio
ns through a TCP port. Thus, the pathway from TCP t
o the application is opened in anticipation of an incom
ing connection request.
 Active open— An application requests that TCP
initiate a connection with another computer that is in
the passive open state. (Actually, TCP can also
initiate a connection to a computer that is in the
active open state, in case both computers are
attempting to open a connection at once.)
Establishing a Connection
 This synchronization of sequence numbers is called a three-way
handshake. The three-way handshake always occurs at the
beginning of a TCP connection. The three steps of a three-way
handshake are as follows:
Establishing a Connection
TCP Retransmission
TCP Flow Control
 The Window field in the TCP header provides a flow control mechanism
for the connection.
 The purpose of the Window field is to ensure that the sending computer
doesn't send too much data too quickly, which could lead to a situation
in which data is lost because the receiving computer can't process
incoming segments as quickly as the sending computer can transmit
them.
 The flow control method used by TCP is called the sliding window
method. The receiving computer uses the Window field (also known as
the buffer size field) to define a window of sequence numbers beyond
the last acknowledged sequence number that the sending computer is
authorized to transmit.
 The sending computer cannot transmit beyond that window until it
receives the next acknowledgment.
Sliding Window
Stop and Wait
Sliding Window
Closing a Connection
 When it is time to close the connection, the computer initiating
the close, Computer A, places a segment in the queue with the
FIN flag set to one.
 The application then enters what is called the fin-wait state. In
the fin-wait state, Computer A's TCP software continues to
receive segments and processes the segments already in the
queue, but no additional data is accepted from the application.
 When Computer B receives the FIN segment, it returns an
acknowledgment to the FIN, sends any remaining segments,
and notifies the local application that a FIN was received.
 Computer B sends a FIN segment to Computer A, which
Computer A acknowledges, and the connection is closed
Closing a Connection
Closing a Connection (Continue)
UDP: The Connectionless Transport
Protocol
 UDP is much simpler than TCP, and it doesn't
perform any of the functions listed in the preceding
section..
 First, although UDP is sometimes described as
having no error-checking capabilities, in fact, it is
capable of performing rudimentary error checking.
 Second, UDP does not offer the resequencing of data
provided by TCP.
UDP Header
UDP Header
 Source Port— This field occupies the first 16 bits of the UDP header.
This field typically holds the UDP port number of the application sendin
g this datagram.
 Destination Port— This 16-bit field holds the port address to which the
UDP software on the receiving machine will deliver this datagram.
 Length— This 16-bit field identifies the length in octets of the UDP
datagram. The length includes the UDP header as well as the UDP dat
a payload.
 Checksum— This 16-bit field is used to determine whether the
datagram was corrupted during transmission. The checksums
generated at the source and verified at the destination allow the client
application to determine if the datagram has been corrupted.

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Network Layer
Network LayerNetwork Layer
Network Layer
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP Presentation
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Transport layer
Transport layerTransport layer
Transport layer
 
Icmp V4 And Icmp V6
Icmp V4 And Icmp V6Icmp V4 And Icmp V6
Icmp V4 And Icmp V6
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake
 
Transport layer
Transport layer Transport layer
Transport layer
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Data Link Layer
Data Link LayerData Link Layer
Data Link Layer
 
Mobile transport layer .
Mobile transport layer .Mobile transport layer .
Mobile transport layer .
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
Chap 10 igmp
Chap 10 igmpChap 10 igmp
Chap 10 igmp
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 
Multicast routing
Multicast routingMulticast routing
Multicast routing
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
Operating System Concepts - Ch05
Operating System Concepts - Ch05Operating System Concepts - Ch05
Operating System Concepts - Ch05
 

Destacado (20)

Network Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerNetwork Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport Layer
 
Transport layer (computer networks)
Transport layer (computer networks)Transport layer (computer networks)
Transport layer (computer networks)
 
transport layer
transport layertransport layer
transport layer
 
Transport layer
Transport layerTransport layer
Transport layer
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram Protocol
 
Tcp and udp
Tcp and udpTcp and udp
Tcp and udp
 
The Transport Layer
The Transport LayerThe Transport Layer
The Transport Layer
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
GO BACK N PROTOCOL
GO BACK N PROTOCOLGO BACK N PROTOCOL
GO BACK N PROTOCOL
 
transport layer
transport layer transport layer
transport layer
 
3a data link layer continued
3a data link layer continued3a data link layer continued
3a data link layer continued
 
TCP Congestion Control By Owais Jara
TCP Congestion Control By Owais JaraTCP Congestion Control By Owais Jara
TCP Congestion Control By Owais Jara
 
Transport layer
Transport layerTransport layer
Transport layer
 
Transport Layer Description By Varun Tiwari
Transport Layer Description By Varun TiwariTransport Layer Description By Varun Tiwari
Transport Layer Description By Varun Tiwari
 
Transport layer
Transport layerTransport layer
Transport layer
 
1 multiplexing
1 multiplexing1 multiplexing
1 multiplexing
 
Newton raphson
Newton raphsonNewton raphson
Newton raphson
 
Mobile computing-tcp data flow control
Mobile computing-tcp data flow controlMobile computing-tcp data flow control
Mobile computing-tcp data flow control
 

Similar a the transport layer

Transport_Layer_Protocols.pptx
Transport_Layer_Protocols.pptxTransport_Layer_Protocols.pptx
Transport_Layer_Protocols.pptxAnkitKumar891632
 
Transport Layer [Autosaved]
Transport Layer [Autosaved]Transport Layer [Autosaved]
Transport Layer [Autosaved]Ram Dutt Shukla
 
Unit 4 tansport layer in the internat
Unit 4 tansport layer in the internatUnit 4 tansport layer in the internat
Unit 4 tansport layer in the internatKritika Purohit
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)Kruti Niranjan
 
tcp-ippresentation-150614172243-lva1-app6892.pptx
tcp-ippresentation-150614172243-lva1-app6892.pptxtcp-ippresentation-150614172243-lva1-app6892.pptx
tcp-ippresentation-150614172243-lva1-app6892.pptxAlphaKoiSylvester
 
Chapter Five - Transport Layer.pptx
Chapter Five - Transport Layer.pptxChapter Five - Transport Layer.pptx
Chapter Five - Transport Layer.pptxGirT2
 
Tcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication headerTcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication headerFaizan Shaikh
 
tcpheader-151221111244.pdf
tcpheader-151221111244.pdftcpheader-151221111244.pdf
tcpheader-151221111244.pdfEnumulaBhargava1
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3Roman Brovko
 
Transport Layer Services : Multiplexing And Demultiplexing
Transport Layer Services : Multiplexing And DemultiplexingTransport Layer Services : Multiplexing And Demultiplexing
Transport Layer Services : Multiplexing And DemultiplexingKeyur Vadodariya
 
13_TCP_Attack.pptx
13_TCP_Attack.pptx13_TCP_Attack.pptx
13_TCP_Attack.pptxAlmaOraevi
 

Similar a the transport layer (20)

Transport_Layer_Protocols.pptx
Transport_Layer_Protocols.pptxTransport_Layer_Protocols.pptx
Transport_Layer_Protocols.pptx
 
Transport Layer [Autosaved]
Transport Layer [Autosaved]Transport Layer [Autosaved]
Transport Layer [Autosaved]
 
Unit 5.Transport Layer.pptx
Unit 5.Transport Layer.pptxUnit 5.Transport Layer.pptx
Unit 5.Transport Layer.pptx
 
Unit 4 tansport layer in the internat
Unit 4 tansport layer in the internatUnit 4 tansport layer in the internat
Unit 4 tansport layer in the internat
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
Osi model
Osi modelOsi model
Osi model
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
 
transport layer
transport layertransport layer
transport layer
 
Mod4
Mod4Mod4
Mod4
 
tcp-ippresentation-150614172243-lva1-app6892.pptx
tcp-ippresentation-150614172243-lva1-app6892.pptxtcp-ippresentation-150614172243-lva1-app6892.pptx
tcp-ippresentation-150614172243-lva1-app6892.pptx
 
Tcp ip presentation
Tcp ip presentationTcp ip presentation
Tcp ip presentation
 
Chapter Five - Transport Layer.pptx
Chapter Five - Transport Layer.pptxChapter Five - Transport Layer.pptx
Chapter Five - Transport Layer.pptx
 
Tcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication headerTcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication header
 
tcpheader-151221111244.pdf
tcpheader-151221111244.pdftcpheader-151221111244.pdf
tcpheader-151221111244.pdf
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3
 
計概
計概計概
計概
 
TCP Vs UDP
TCP Vs UDP TCP Vs UDP
TCP Vs UDP
 
TCP.docx
TCP.docxTCP.docx
TCP.docx
 
Transport Layer Services : Multiplexing And Demultiplexing
Transport Layer Services : Multiplexing And DemultiplexingTransport Layer Services : Multiplexing And Demultiplexing
Transport Layer Services : Multiplexing And Demultiplexing
 
13_TCP_Attack.pptx
13_TCP_Attack.pptx13_TCP_Attack.pptx
13_TCP_Attack.pptx
 

Más de tumetr1

ตัวอย่างประวัติผู้วิจัย เล่มโปรเจ็ค
ตัวอย่างประวัติผู้วิจัย เล่มโปรเจ็คตัวอย่างประวัติผู้วิจัย เล่มโปรเจ็ค
ตัวอย่างประวัติผู้วิจัย เล่มโปรเจ็คtumetr1
 
ตัวอย่างภาคผนวก เล่มโปรเจ็ค
ตัวอย่างภาคผนวก เล่มโปรเจ็คตัวอย่างภาคผนวก เล่มโปรเจ็ค
ตัวอย่างภาคผนวก เล่มโปรเจ็คtumetr1
 
ตัวอย่างบรรณานุกรม เล่มโปรเจ็ค
ตัวอย่างบรรณานุกรม เล่มโปรเจ็คตัวอย่างบรรณานุกรม เล่มโปรเจ็ค
ตัวอย่างบรรณานุกรม เล่มโปรเจ็คtumetr1
 
ตัวอย่างบทที่1 บทนำ เล่มโปรเจ็ค
ตัวอย่างบทที่1 บทนำ เล่มโปรเจ็คตัวอย่างบทที่1 บทนำ เล่มโปรเจ็ค
ตัวอย่างบทที่1 บทนำ เล่มโปรเจ็คtumetr1
 
ตัวอย่างสารบัญ เล่มโปรเจ็ค
ตัวอย่างสารบัญ เล่มโปรเจ็คตัวอย่างสารบัญ เล่มโปรเจ็ค
ตัวอย่างสารบัญ เล่มโปรเจ็คtumetr1
 
ตัวอย่างกิตติกรรมประกาศ เล่มโปรเจ็ค
ตัวอย่างกิตติกรรมประกาศ เล่มโปรเจ็คตัวอย่างกิตติกรรมประกาศ เล่มโปรเจ็ค
ตัวอย่างกิตติกรรมประกาศ เล่มโปรเจ็คtumetr1
 
ตัวอย่างบทคัดย่อเล่มโปรเจ็ค
ตัวอย่างบทคัดย่อเล่มโปรเจ็คตัวอย่างบทคัดย่อเล่มโปรเจ็ค
ตัวอย่างบทคัดย่อเล่มโปรเจ็คtumetr1
 
file transfer and access utilities
file transfer and access utilitiesfile transfer and access utilities
file transfer and access utilitiestumetr1
 
retrieving the mail
retrieving the mailretrieving the mail
retrieving the mailtumetr1
 
connectivity utility
connectivity utilityconnectivity utility
connectivity utilitytumetr1
 
network hardware
network hardwarenetwork hardware
network hardwaretumetr1
 
ระบบเครือข่ายไร้สาย (wireless lan)
ระบบเครือข่ายไร้สาย (wireless lan)ระบบเครือข่ายไร้สาย (wireless lan)
ระบบเครือข่ายไร้สาย (wireless lan)tumetr1
 
ระดับชั้นเน็ตเวิร์ก
ระดับชั้นเน็ตเวิร์กระดับชั้นเน็ตเวิร์ก
ระดับชั้นเน็ตเวิร์กtumetr1
 
ระดับชั้นดาต้าลิงค์
ระดับชั้นดาต้าลิงค์ระดับชั้นดาต้าลิงค์
ระดับชั้นดาต้าลิงค์tumetr1
 
สถาปัตยกรรมเครือข่ายคอมพิวเตอร์และบริการ
สถาปัตยกรรมเครือข่ายคอมพิวเตอร์และบริการสถาปัตยกรรมเครือข่ายคอมพิวเตอร์และบริการ
สถาปัตยกรรมเครือข่ายคอมพิวเตอร์และบริการtumetr1
 
การส่งข้อมูลผ่านสายส่งและเทคนิคการส่งข้อมูลผ่านเครือข่าย
การส่งข้อมูลผ่านสายส่งและเทคนิคการส่งข้อมูลผ่านเครือข่ายการส่งข้อมูลผ่านสายส่งและเทคนิคการส่งข้อมูลผ่านเครือข่าย
การส่งข้อมูลผ่านสายส่งและเทคนิคการส่งข้อมูลผ่านเครือข่ายtumetr1
 
ความรู้พื้นฐานของระบบการสื่อสารข้อมูล
ความรู้พื้นฐานของระบบการสื่อสารข้อมูลความรู้พื้นฐานของระบบการสื่อสารข้อมูล
ความรู้พื้นฐานของระบบการสื่อสารข้อมูลtumetr1
 
พัฒนาเศรษฐกิจ
พัฒนาเศรษฐกิจพัฒนาเศรษฐกิจ
พัฒนาเศรษฐกิจtumetr1
 
ความยืดหยุ่น การแทรกแซงของรัฐ
ความยืดหยุ่น การแทรกแซงของรัฐความยืดหยุ่น การแทรกแซงของรัฐ
ความยืดหยุ่น การแทรกแซงของรัฐtumetr1
 

Más de tumetr1 (20)

ตัวอย่างประวัติผู้วิจัย เล่มโปรเจ็ค
ตัวอย่างประวัติผู้วิจัย เล่มโปรเจ็คตัวอย่างประวัติผู้วิจัย เล่มโปรเจ็ค
ตัวอย่างประวัติผู้วิจัย เล่มโปรเจ็ค
 
ตัวอย่างภาคผนวก เล่มโปรเจ็ค
ตัวอย่างภาคผนวก เล่มโปรเจ็คตัวอย่างภาคผนวก เล่มโปรเจ็ค
ตัวอย่างภาคผนวก เล่มโปรเจ็ค
 
ตัวอย่างบรรณานุกรม เล่มโปรเจ็ค
ตัวอย่างบรรณานุกรม เล่มโปรเจ็คตัวอย่างบรรณานุกรม เล่มโปรเจ็ค
ตัวอย่างบรรณานุกรม เล่มโปรเจ็ค
 
ตัวอย่างบทที่1 บทนำ เล่มโปรเจ็ค
ตัวอย่างบทที่1 บทนำ เล่มโปรเจ็คตัวอย่างบทที่1 บทนำ เล่มโปรเจ็ค
ตัวอย่างบทที่1 บทนำ เล่มโปรเจ็ค
 
ตัวอย่างสารบัญ เล่มโปรเจ็ค
ตัวอย่างสารบัญ เล่มโปรเจ็คตัวอย่างสารบัญ เล่มโปรเจ็ค
ตัวอย่างสารบัญ เล่มโปรเจ็ค
 
ตัวอย่างกิตติกรรมประกาศ เล่มโปรเจ็ค
ตัวอย่างกิตติกรรมประกาศ เล่มโปรเจ็คตัวอย่างกิตติกรรมประกาศ เล่มโปรเจ็ค
ตัวอย่างกิตติกรรมประกาศ เล่มโปรเจ็ค
 
ตัวอย่างบทคัดย่อเล่มโปรเจ็ค
ตัวอย่างบทคัดย่อเล่มโปรเจ็คตัวอย่างบทคัดย่อเล่มโปรเจ็ค
ตัวอย่างบทคัดย่อเล่มโปรเจ็ค
 
file transfer and access utilities
file transfer and access utilitiesfile transfer and access utilities
file transfer and access utilities
 
retrieving the mail
retrieving the mailretrieving the mail
retrieving the mail
 
connectivity utility
connectivity utilityconnectivity utility
connectivity utility
 
network hardware
network hardwarenetwork hardware
network hardware
 
ระบบเครือข่ายไร้สาย (wireless lan)
ระบบเครือข่ายไร้สาย (wireless lan)ระบบเครือข่ายไร้สาย (wireless lan)
ระบบเครือข่ายไร้สาย (wireless lan)
 
routing
routingrouting
routing
 
ระดับชั้นเน็ตเวิร์ก
ระดับชั้นเน็ตเวิร์กระดับชั้นเน็ตเวิร์ก
ระดับชั้นเน็ตเวิร์ก
 
ระดับชั้นดาต้าลิงค์
ระดับชั้นดาต้าลิงค์ระดับชั้นดาต้าลิงค์
ระดับชั้นดาต้าลิงค์
 
สถาปัตยกรรมเครือข่ายคอมพิวเตอร์และบริการ
สถาปัตยกรรมเครือข่ายคอมพิวเตอร์และบริการสถาปัตยกรรมเครือข่ายคอมพิวเตอร์และบริการ
สถาปัตยกรรมเครือข่ายคอมพิวเตอร์และบริการ
 
การส่งข้อมูลผ่านสายส่งและเทคนิคการส่งข้อมูลผ่านเครือข่าย
การส่งข้อมูลผ่านสายส่งและเทคนิคการส่งข้อมูลผ่านเครือข่ายการส่งข้อมูลผ่านสายส่งและเทคนิคการส่งข้อมูลผ่านเครือข่าย
การส่งข้อมูลผ่านสายส่งและเทคนิคการส่งข้อมูลผ่านเครือข่าย
 
ความรู้พื้นฐานของระบบการสื่อสารข้อมูล
ความรู้พื้นฐานของระบบการสื่อสารข้อมูลความรู้พื้นฐานของระบบการสื่อสารข้อมูล
ความรู้พื้นฐานของระบบการสื่อสารข้อมูล
 
พัฒนาเศรษฐกิจ
พัฒนาเศรษฐกิจพัฒนาเศรษฐกิจ
พัฒนาเศรษฐกิจ
 
ความยืดหยุ่น การแทรกแซงของรัฐ
ความยืดหยุ่น การแทรกแซงของรัฐความยืดหยุ่น การแทรกแซงของรัฐ
ความยืดหยุ่น การแทรกแซงของรัฐ
 

Último

ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 

Último (20)

ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 

the transport layer

  • 2. What You'll Learn in This Hour  Connections oriented and connectionless protocols  Ports and sockets  TCP  UDP
  • 3. At the completion of this hour, you will be able to  Describe the basic duties of the Transport layer  Explain the difference between a connection-oriented protocol and a connectionless protocol  Explain how Transport layer protocols provide an interface to network applications through ports and sockets  Describe the differences between TCP and UDP  Identify the fields that make up the TCP header  Describe how TCP opens and closes a connection  Describe how TCP sequences and acknowledges data transmissions  Identify the four fields that comprise the UDP header
  • 4.  the Transport layer protocols to provide the following: – Interface for network applications – A mechanism for multiplexing/demultiplexing – Error checking, flow control, and verification – Transport Control Protocol (TCP) – User Datagram Protocol (UDP)
  • 5. Transport Layer Concepts  Connection-oriented and connectionless protocols  Ports and sockets  Multiplexing
  • 6. Connection-Oriented and Connectionless Protocols Connection-Oriented Connectionless-Oriented
  • 7. Ports and Sockets  A port is a predefined internal address that serves as a pathway from the application to the Transport layer or from the Transport layer to the application.  A socket is an address formed by concatenating the IP address and the port number. For instance, the socket number 111.121.131.141.21 refers to port 21 on the computer with the IP address 111.121.131.141.
  • 10. Well-Known Port  A well-known port is a port number that is assigned to a specific application by ICANN  See more details in “Sams Teach Yourself TCP/IP in 24 Hours, Third Edition”  Or you can see in http://www.iss.net/ security_center/advice/ Exploits/Ports/default.htm
  • 11. Multiplexing/Demultiplexing  The socket addressing system enables TCP and UDP to perform another important Transport layer task: multiplexing and demultiplexing
  • 12. Multiplexing/Demultiplexing  Multiplexing/demultiplexing enables the lower levels of the TCP/IP stack to process data without regard to which application initiated that data.  All associations with the originating application are settled at the Transport layer, and data passes to and from the Internet layer in a single, application- independent pipeline.  The key to multiplexing and demultiplexing is the socket address. Because the socket address combines the IP number with the port number, it provides a unique identifier for a specific application on a specific machine.
  • 14. Multiplexing/Demultiplexing  See the Telnet server depicted in previous page  All client machines use the well-known port address TCP 23 to contact the Telnet server, but the destination socket for each of the connecting PCs is unique.  Likewise, all network applications running on the Telnet server use the server's IP address, but only the Telnet service uses the socket address, consisting of the server's IP address plus TCP port 23.
  • 15. TCP: The Connection-Oriented Transport Protocol  Stream-oriented processing— TCP processes data in a stream. In other words, TCP can accept data a byte at a time rather than as a preformatted block. TCP f ormats the data into variable-length segments, which it will pass to the Internet l ayer.  Resequencing— If data arrives at the destination out of order, the TCP module is capable of resequencing the data to restore the original order.  Flow control — TCP's flow control feature ensures that the data transmission won't outrun or overrun the destination machine's capability to receive the data. This is especially critical in a diverse environment in which there may be conside rable variation of processor speeds and buffer sizes.  Precedence and security— The Department of Defense specifications for TCP call for optional security and priority levels that can be set for TCP connections. Many TCP implementations, however, do not provide these security and priority features.  Graceful close— TCP is as careful about closing a connection as it is about opening a connection. The graceful close feature ensures that all segments hav e been sent and received before a connection is closed.
  • 16.
  • 17. TCP Header Format 192 bits 24 Bytes
  • 18. TCP Header  Source Port (16-bit)— The port number assigned to the application on the source machine.  Destination Port (16-bit)— The port number assigned to the application on the destination machine.  Sequence Number (32-bit)—The sequence number of the first byte in this particular segment, unless the SYN flag is set to 1. If the SYN flag is set to 1, the Sequence Number field provides the initial sequence number (ISN), which is used to synchronize sequence numbers. If the SYN flag is set to 1, the sequence number of the first octet is one greater than the number that a ppears in this field (in other words, ISN+1).  Acknowledgment Number (32-bit)— The acknowledgment number acknowledges a received segment. The value is the next sequence number the receiving computer is expecting to receive, in other words, the sequence number of the last byte received +1.  Data offset (4 bits) — A field that tells the receiving TCP software how long the header is and, therefore, where the data begins. The data offset is expressed as an integer number of 32-bit words.
  • 19. TCP Header  Reserved (6 bits)— Reserved for future use. The Reserved field provides room to accommodate future developments of TCP and must be all zeros  Control flags (1 bit each)— The control flags communicate special information about the segment. – URG— A value of 1 announces that the segment is urgent and the Urgent Pointer field is significant. – ACK— A value of 1 announces that the Acknowledgment Number field is significant. – PSH— A value of 1 tells the TCP software to push all the data sent so far through the pipeline to the receiving application. – RST— A value of 1 resets the connection. – SYN— A value of 1 announces that sequence numbers will be synchronized, marking the beginning of a connection. See the discussion of the three-way handshake, later in this hour. – FIN— A value of 1 signifies that the sending computer has no more data to transmit. This flag is used to close a connection.
  • 20. TCP Header  Window (16-bit)— A parameter used for flow control. The window defines the range of sequence numbers beyond the last acknowledged sequence n umber that the sending machine is free to transmit without further acknowle dgment.  Checksum (16-bit)— A field used to check the integrity of the segment. A receiving computer performs a checksum calculation based on the segment and compares the value to the value stored in this field. TCP and UDP include a pseudo-header with IP addressing information in the checksum calculation. See the discussion of the UDP pseudo-header later in this hour.  Urgent Pointer (16-bit)— An offset pointer pointing to the sequence number that marks the beginning of any urgent information.  Options— Specifies one of a small set of optional settings.  Padding— Extra zero bits (as needed) to ensure that the data begins on a 32-bit boundary.  Data— The data being transmitted with the segment.
  • 21. TCP Connection  Passive open— A given application process notifies TCP that it is prepared to receive incoming connectio ns through a TCP port. Thus, the pathway from TCP t o the application is opened in anticipation of an incom ing connection request.  Active open— An application requests that TCP initiate a connection with another computer that is in the passive open state. (Actually, TCP can also initiate a connection to a computer that is in the active open state, in case both computers are attempting to open a connection at once.)
  • 22. Establishing a Connection  This synchronization of sequence numbers is called a three-way handshake. The three-way handshake always occurs at the beginning of a TCP connection. The three steps of a three-way handshake are as follows:
  • 24.
  • 26. TCP Flow Control  The Window field in the TCP header provides a flow control mechanism for the connection.  The purpose of the Window field is to ensure that the sending computer doesn't send too much data too quickly, which could lead to a situation in which data is lost because the receiving computer can't process incoming segments as quickly as the sending computer can transmit them.  The flow control method used by TCP is called the sliding window method. The receiving computer uses the Window field (also known as the buffer size field) to define a window of sequence numbers beyond the last acknowledged sequence number that the sending computer is authorized to transmit.  The sending computer cannot transmit beyond that window until it receives the next acknowledgment.
  • 27. Sliding Window Stop and Wait Sliding Window
  • 28. Closing a Connection  When it is time to close the connection, the computer initiating the close, Computer A, places a segment in the queue with the FIN flag set to one.  The application then enters what is called the fin-wait state. In the fin-wait state, Computer A's TCP software continues to receive segments and processes the segments already in the queue, but no additional data is accepted from the application.  When Computer B receives the FIN segment, it returns an acknowledgment to the FIN, sends any remaining segments, and notifies the local application that a FIN was received.  Computer B sends a FIN segment to Computer A, which Computer A acknowledges, and the connection is closed
  • 30. Closing a Connection (Continue)
  • 31. UDP: The Connectionless Transport Protocol  UDP is much simpler than TCP, and it doesn't perform any of the functions listed in the preceding section..  First, although UDP is sometimes described as having no error-checking capabilities, in fact, it is capable of performing rudimentary error checking.  Second, UDP does not offer the resequencing of data provided by TCP.
  • 33. UDP Header  Source Port— This field occupies the first 16 bits of the UDP header. This field typically holds the UDP port number of the application sendin g this datagram.  Destination Port— This 16-bit field holds the port address to which the UDP software on the receiving machine will deliver this datagram.  Length— This 16-bit field identifies the length in octets of the UDP datagram. The length includes the UDP header as well as the UDP dat a payload.  Checksum— This 16-bit field is used to determine whether the datagram was corrupted during transmission. The checksums generated at the source and verified at the destination allow the client application to determine if the datagram has been corrupted.