SlideShare una empresa de Scribd logo
1 de 39
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 7:
Transport Layer
Introduction to Networking
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 7
7.0 Introduction
7.1 Transport Layer Protocols
7.2 TCP and UDP
7.3 Summary
Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 7: Objectives
 Describe the purpose of the transport layer in managing the
transportation of data in end-to-end communication.
 Describe characteristics of the TCP and UDP protocols, including
port numbers and their uses.
 Explain how TCP session establishment and termination
processes facilitate reliable communication.
 Explain how TCP protocol data units are transmitted and
acknowledged to guarantee delivery.
 Explain the UDP client processes to establish communication with
a server.
 Determine whether high-reliability TCP transmissions, or non-
guaranteed UDP transmissions, are best suited for common
applications.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4
7.1: Transport Layer
Protocols
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Transportation of Data
Role of the Transport Layer
The transport layer is responsible for establishing a temporary
communication session between two applications and delivering data
between them.
TCP/IP uses two protocols to achieve this:
 Transmission Control Protocol (TCP)
 User Datagram Protocol (UDP)
Primary Responsibilities of Transport Layer Protocols
 Tracking the individual communication between applications on the
source and destination hosts
 Segmenting data for manageability and reassembling segmented
data into streams of application data at the destination
 Identifying the proper application for each communication stream
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Transportation of Data
Role of the Transport Layer (Cont.)
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Transportation of Data
Conversation Multiplexing
Segmenting the Data
 Enables many different communications, from many different
users, to be interleaved (multiplexed) on the same network, at the
same time.
 Provides the means to both send and receive data when running
multiple applications.
 Header added to each segment to identify it.
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Transportation of Data
Conversation Multiplexing (Cont.)
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Transportation of Data
Conversation Multiplexing (Cont.)
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Transportation of Data
Transport Layer Reliability
Different applications have different transport reliability requirements.
TCP/IP provides two transport layer protocols, TCP and UDP.
TCP
 Provides reliable delivery ensuring that all of the data arrives at the
destination.
 Uses acknowledged delivery and other processes to ensure delivery
 Makes larger demands on the network – more overhead.
UDP
 Provides just the basic functions for delivery – no reliability.
 Less overhead.
TCP or UDP
 There is a trade-off between the value of reliability and the burden it
places on the network.
 Application developers choose the transport protocol based on the
requirements of their applications.
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Introducing TCP and UDP
Introducing TCP
 Defined in RFC 793
 Connection-oriented – Creates a session between the source and
destination
 Reliable delivery – Retransmits lost or corrupt data
 Ordered data reconstruction – Reconstructs numbering and
sequencing of segments
 Flow control – Regulates the amount of data transmitted
 Stateful protocol – Tracks the session
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Introducing TCP and UDP
Introducing UDP
 RFC 768
 Connectionless
 Unreliable delivery
 No ordered data
reconstruction
 No flow control
 Stateless protocol
Applications that use
UDP:
 Domain Name
System (DNS)
 Video Streaming
 VoIP
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Introducing TCP and UDP
Separating Multiple Communications
TCP and UDP use port numbers to differentiate between applications.
.
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Introducing TCP and UDP
TCP and UDP Port Addressing
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Introducing TCP and UDP
TCP and UDP Port Addressing (Cont.)
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Introducing TCP and UDP
TCP and UDP Port Addressing (Cont.)
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Introducing TCP and UDP
TCP and UDP Port Addressing (Cont.)
Netstat is used to examine TCP connections that are
open and running on a networked host.
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Introducing TCP and UDP
TCP and UDP Segmentation
The transport layer divides the data into pieces and adds
a header for delivery over the network
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 19
7.2 TCP and UDP
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
TCP Communication
TCP Server Processes
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
TCP Communication
TCP Server Processes (Cont.)
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
TCP Communication
TCP Connection, Establishment and Termination
Three-Way Handshake
 Establishes that the destination device is present on the network
 Verifies that the destination device has an active service and is
accepting requests on the destination port number that the
initiating client intends to use for the session
 Informs the destination device that the source client intends to
establish a communication session on that port number
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
TCP Communication
TCP Three-Way Handshake – Step 1
Step 1: The initiating client requests a client-to-server
communication session with the server
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
TCP Communication
TCP Three-Way Handshake – Step 2
Step 2: The server acknowledges the client-to-server communication
session and requests a server-to-client communication
session.
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
TCP Communication
TCP Three-Way Handshake – Step 3
Step 3: The initiating client acknowledges the server-to-client
communication session.
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
TCP Communication
TCP Session Termination
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliability and Flow Control
TCP Reliability – Ordered Delivery
Sequence numbers are used to reassemble segments into their
original order.
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliability and Flow Control
Acknowledgement and Window Size
The sequence number and acknowledgement number are used
together to confirm receipt.
The window size is the amount of data that a source can transmit
before an acknowledgement must be received.
Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliability and Flow Control
Window Size and Acknowledgements
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliability and Flow Control
TCP Flow Control – Congestion Avoidance
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliability and Flow Control
TCP Reliability - Acknowledgements
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
UDP Communication
UDP Low Overhead vs. Reliability
UDP
 Simple protocol that provides the basic transport layer function
 Used by applications that can tolerate small loss of data
 Used by applications that cannot tolerate delay
Used by
 DNS
 Simple Network Management Protocol (SNMP)
 Dynamic Host Configuration Protocol (DHCP)
 Trivial File Transfer Protocol (TFTP)
 IP telephony or VoIP
 Online games
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
UDP Communication
Datagram Reassembly
Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
UDP Communication
UDP Server and Client Processes
 UDP-based
server
applications
are assigned
well-known or
registered port
numbers.
 UDP client
process
randomly
selects port
number from
range of
dynamic port
numbers as the
source port.
Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
TCP or UDP
Applications that use TCP
Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
TCP or UDP
Applications That Use UDP
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 37
7.3 Summary
Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 7: Summary
In this chapter, you learned:
 The role of the transport layer is to provide three main services:
multiplexing, segmentation and reassembly, and error checking. It
does this by:
•Dividing data received from an application into segments.
•Adding a header to identify and manage each segment.
•Using the header information to reassemble the segments back
into application data.
•Passing the assembled data to the correct application.
 How TCP and UDP operate and which popular applications use
each protocol.
 Transport Layer functions are necessary to address issues in QoS
and security in networks.
 Ports provide a “tunnel” for data to get from the transport layer to
the appropriate application at the destination.
Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Más contenido relacionado

La actualidad más candente

CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsVuz Dở Hơi
 
Link Aggregation Group - LACP
Link Aggregation Group - LACPLink Aggregation Group - LACP
Link Aggregation Group - LACPPLVision
 
Mail Server Configuration with Cisco Packet Tracer
Mail Server Configuration with Cisco Packet TracerMail Server Configuration with Cisco Packet Tracer
Mail Server Configuration with Cisco Packet TracerMaksudujjaman
 
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4Vuz Dở Hơi
 
CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5Nil Menon
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationVuz Dở Hơi
 
Packet tracer practical guide
Packet tracer practical guidePacket tracer practical guide
Packet tracer practical guideNishant Gandhi
 
CCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
CCNAv5 - S1: Chapter 9 - Subnetting Ip NetworksCCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
CCNAv5 - S1: Chapter 9 - Subnetting Ip NetworksVuz Dở Hơi
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3Nil Menon
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02Irsandi Hasan
 
CCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and LicensingCCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and LicensingVuz Dở Hơi
 
Link Aggregation Control Protocol
Link Aggregation Control ProtocolLink Aggregation Control Protocol
Link Aggregation Control ProtocolKashif Latif
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6Nil Menon
 
GLBP (gateway load balancing protocol)
GLBP (gateway load balancing protocol)GLBP (gateway load balancing protocol)
GLBP (gateway load balancing protocol)Netwax Lab
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4Nil Menon
 
CCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The WanCCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The WanVuz Dở Hơi
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10Irsandi Hasan
 

La actualidad más candente (20)

CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communications
 
Link Aggregation Group - LACP
Link Aggregation Group - LACPLink Aggregation Group - LACP
Link Aggregation Group - LACP
 
Mail Server Configuration with Cisco Packet Tracer
Mail Server Configuration with Cisco Packet TracerMail Server Configuration with Cisco Packet Tracer
Mail Server Configuration with Cisco Packet Tracer
 
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
 
CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
 
Packet tracer practical guide
Packet tracer practical guidePacket tracer practical guide
Packet tracer practical guide
 
CCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
CCNAv5 - S1: Chapter 9 - Subnetting Ip NetworksCCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
CCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNA project-report
CCNA project-reportCCNA project-report
CCNA project-report
 
CCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and LicensingCCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and Licensing
 
Link Aggregation Control Protocol
Link Aggregation Control ProtocolLink Aggregation Control Protocol
Link Aggregation Control Protocol
 
Application layer
Application layerApplication layer
Application layer
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6
 
GLBP (gateway load balancing protocol)
GLBP (gateway load balancing protocol)GLBP (gateway load balancing protocol)
GLBP (gateway load balancing protocol)
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
 
Data link layer
Data link layerData link layer
Data link layer
 
CCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The WanCCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The Wan
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 

Destacado

CCNAv5 - S1: Chapter 8 - Ip Addressing
CCNAv5 - S1: Chapter 8 - Ip AddressingCCNAv5 - S1: Chapter 8 - Ip Addressing
CCNAv5 - S1: Chapter 8 - Ip AddressingVuz Dở Hơi
 
CCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A NetworkCCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A NetworkVuz Dở Hơi
 
CCNAv5 - S3: Chapter 7 EIGRP
CCNAv5 - S3: Chapter 7 EIGRPCCNAv5 - S3: Chapter 7 EIGRP
CCNAv5 - S3: Chapter 7 EIGRPVuz Dở Hơi
 
CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access Vuz Dở Hơi
 
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4Vuz Dở Hơi
 
CCNAv5 - S3: Chapter3 Link Aggregation
CCNAv5 - S3: Chapter3 Link AggregationCCNAv5 - S3: Chapter3 Link Aggregation
CCNAv5 - S3: Chapter3 Link AggregationVuz Dở Hơi
 
CCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan RedundancyCCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan RedundancyVuz Dở Hơi
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksVuz Dở Hơi
 
CCNA 1 Routing and Switching v5.0 Chapter 7
CCNA 1 Routing and Switching v5.0 Chapter 7CCNA 1 Routing and Switching v5.0 Chapter 7
CCNA 1 Routing and Switching v5.0 Chapter 7Nil Menon
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansVuz Dở Hơi
 
Automating for Monitoring and Troubleshooting your Cisco IOS Network
Automating for Monitoring and Troubleshooting your Cisco IOS NetworkAutomating for Monitoring and Troubleshooting your Cisco IOS Network
Automating for Monitoring and Troubleshooting your Cisco IOS NetworkCisco Canada
 
Network Application Performance
Network Application PerformanceNetwork Application Performance
Network Application PerformanceShumon Huque
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkVuz Dở Hơi
 
CCNAv5 - S2: Chapter 8 single area ospf
CCNAv5 - S2: Chapter 8 single area ospfCCNAv5 - S2: Chapter 8 single area ospf
CCNAv5 - S2: Chapter 8 single area ospfVuz Dở Hơi
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsVuz Dở Hơi
 
CCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingCCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingVuz Dở Hơi
 
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksCCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksVuz Dở Hơi
 

Destacado (20)

CCNAv5 - S1: Chapter 8 - Ip Addressing
CCNAv5 - S1: Chapter 8 - Ip AddressingCCNAv5 - S1: Chapter 8 - Ip Addressing
CCNAv5 - S1: Chapter 8 - Ip Addressing
 
CCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A NetworkCCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A Network
 
CCNAv5 - S3: Chapter 7 EIGRP
CCNAv5 - S3: Chapter 7 EIGRPCCNAv5 - S3: Chapter 7 EIGRP
CCNAv5 - S3: Chapter 7 EIGRP
 
CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access
 
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
 
CCNAv5 - S3: Chapter3 Link Aggregation
CCNAv5 - S3: Chapter3 Link AggregationCCNAv5 - S3: Chapter3 Link Aggregation
CCNAv5 - S3: Chapter3 Link Aggregation
 
CCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan RedundancyCCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan Redundancy
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
 
CCNA 1 Routing and Switching v5.0 Chapter 7
CCNA 1 Routing and Switching v5.0 Chapter 7CCNA 1 Routing and Switching v5.0 Chapter 7
CCNA 1 Routing and Switching v5.0 Chapter 7
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless Lans
 
Transport layer
Transport layerTransport layer
Transport layer
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
Transport Layer Description By Varun Tiwari
Transport Layer Description By Varun TiwariTransport Layer Description By Varun Tiwari
Transport Layer Description By Varun Tiwari
 
Automating for Monitoring and Troubleshooting your Cisco IOS Network
Automating for Monitoring and Troubleshooting your Cisco IOS NetworkAutomating for Monitoring and Troubleshooting your Cisco IOS Network
Automating for Monitoring and Troubleshooting your Cisco IOS Network
 
Network Application Performance
Network Application PerformanceNetwork Application Performance
Network Application Performance
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The Network
 
CCNAv5 - S2: Chapter 8 single area ospf
CCNAv5 - S2: Chapter 8 single area ospfCCNAv5 - S2: Chapter 8 single area ospf
CCNAv5 - S2: Chapter 8 single area ospf
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing Concepts
 
CCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingCCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan Routing
 
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksCCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networks
 

Similar a TCP/UDP Protocols and Transport Layer Functions

Ccna v5-S1-Chapter 7
Ccna v5-S1-Chapter 7Ccna v5-S1-Chapter 7
Ccna v5-S1-Chapter 7Hamza Malik
 
CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7Irsandi Hasan
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5Irsandi Hasan
 
Lecture Notes- Network Services - Copy.pptx
Lecture Notes- Network Services - Copy.pptxLecture Notes- Network Services - Copy.pptx
Lecture Notes- Network Services - Copy.pptxSaqibAhmedKhan4
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3Irsandi Hasan
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application LayerYaser Rahmati
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09Irsandi Hasan
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3Irsandi Hasan
 
OSI Transport Layer
OSI Transport LayerOSI Transport Layer
OSI Transport LayerSachii Dosti
 
cisco-nti-Day18
cisco-nti-Day18cisco-nti-Day18
cisco-nti-Day18eyad alaa
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4Irsandi Hasan
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsYaser Rahmati
 
Chapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsChapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsteknetir
 
CCNA Exploration 1 - Chapter 4
CCNA Exploration 1 - Chapter 4CCNA Exploration 1 - Chapter 4
CCNA Exploration 1 - Chapter 4Irsandi Hasan
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10Nil Menon
 
Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10Hamza Malik
 
Exploration network chapter4
Exploration network chapter4Exploration network chapter4
Exploration network chapter4r82093403
 
It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9newbie2019
 
CCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkCCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkVuz Dở Hơi
 

Similar a TCP/UDP Protocols and Transport Layer Functions (20)

Ccna v5-S1-Chapter 7
Ccna v5-S1-Chapter 7Ccna v5-S1-Chapter 7
Ccna v5-S1-Chapter 7
 
CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
Lecture Notes- Network Services - Copy.pptx
Lecture Notes- Network Services - Copy.pptxLecture Notes- Network Services - Copy.pptx
Lecture Notes- Network Services - Copy.pptx
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application Layer
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
 
OSI Transport Layer
OSI Transport LayerOSI Transport Layer
OSI Transport Layer
 
cisco-nti-Day18
cisco-nti-Day18cisco-nti-Day18
cisco-nti-Day18
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and Communications
 
Chapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsChapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communications
 
CCNA Exploration 1 - Chapter 4
CCNA Exploration 1 - Chapter 4CCNA Exploration 1 - Chapter 4
CCNA Exploration 1 - Chapter 4
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10
 
Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10
 
Exploration network chapter4
Exploration network chapter4Exploration network chapter4
Exploration network chapter4
 
It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9
 
CCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkCCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the network
 
Vo ip sip
Vo ip sipVo ip sip
Vo ip sip
 

Más de Vuz Dở Hơi

Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.Vuz Dở Hơi
 
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.Vuz Dở Hơi
 
Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.Vuz Dở Hơi
 
Cehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL InjectionCehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL InjectionVuz Dở Hơi
 
Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.Vuz Dở Hơi
 
Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.Vuz Dở Hơi
 
Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.Vuz Dở Hơi
 
Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.Vuz Dở Hơi
 
Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.Vuz Dở Hơi
 
Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.Vuz Dở Hơi
 
Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.Vuz Dở Hơi
 
Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.Vuz Dở Hơi
 
Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.Vuz Dở Hơi
 
Cehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: EnumerationCehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: EnumerationVuz Dở Hơi
 
Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.Vuz Dở Hơi
 
Cehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and ReconnaissanceCehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and ReconnaissanceVuz Dở Hơi
 
Cehv8 - Labs Module 00
Cehv8 - Labs Module 00Cehv8 - Labs Module 00
Cehv8 - Labs Module 00Vuz Dở Hơi
 
Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.Vuz Dở Hơi
 
Cehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testingCehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testingVuz Dở Hơi
 

Más de Vuz Dở Hơi (20)

Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.
 
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
 
Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.
 
Cehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL InjectionCehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL Injection
 
Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.
 
Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.
 
Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.
 
Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.
 
Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.
 
Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.
 
Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.
 
Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.
 
Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.
 
Cehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: EnumerationCehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: Enumeration
 
Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.
 
Cehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and ReconnaissanceCehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and Reconnaissance
 
Cehv8 - Labs Module 00
Cehv8 - Labs Module 00Cehv8 - Labs Module 00
Cehv8 - Labs Module 00
 
Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.
 
Cehv8 - references
Cehv8 - referencesCehv8 - references
Cehv8 - references
 
Cehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testingCehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testing
 

Último

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 

Último (20)

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 

TCP/UDP Protocols and Transport Layer Functions

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking
  • 2. Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 7 7.0 Introduction 7.1 Transport Layer Protocols 7.2 TCP and UDP 7.3 Summary
  • 3. Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 7: Objectives  Describe the purpose of the transport layer in managing the transportation of data in end-to-end communication.  Describe characteristics of the TCP and UDP protocols, including port numbers and their uses.  Explain how TCP session establishment and termination processes facilitate reliable communication.  Explain how TCP protocol data units are transmitted and acknowledged to guarantee delivery.  Explain the UDP client processes to establish communication with a server.  Determine whether high-reliability TCP transmissions, or non- guaranteed UDP transmissions, are best suited for common applications.
  • 4. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4 7.1: Transport Layer Protocols
  • 5. Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Transportation of Data Role of the Transport Layer The transport layer is responsible for establishing a temporary communication session between two applications and delivering data between them. TCP/IP uses two protocols to achieve this:  Transmission Control Protocol (TCP)  User Datagram Protocol (UDP) Primary Responsibilities of Transport Layer Protocols  Tracking the individual communication between applications on the source and destination hosts  Segmenting data for manageability and reassembling segmented data into streams of application data at the destination  Identifying the proper application for each communication stream
  • 6. Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Transportation of Data Role of the Transport Layer (Cont.)
  • 7. Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Transportation of Data Conversation Multiplexing Segmenting the Data  Enables many different communications, from many different users, to be interleaved (multiplexed) on the same network, at the same time.  Provides the means to both send and receive data when running multiple applications.  Header added to each segment to identify it.
  • 8. Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Transportation of Data Conversation Multiplexing (Cont.)
  • 9. Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Transportation of Data Conversation Multiplexing (Cont.)
  • 10. Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Transportation of Data Transport Layer Reliability Different applications have different transport reliability requirements. TCP/IP provides two transport layer protocols, TCP and UDP. TCP  Provides reliable delivery ensuring that all of the data arrives at the destination.  Uses acknowledged delivery and other processes to ensure delivery  Makes larger demands on the network – more overhead. UDP  Provides just the basic functions for delivery – no reliability.  Less overhead. TCP or UDP  There is a trade-off between the value of reliability and the burden it places on the network.  Application developers choose the transport protocol based on the requirements of their applications.
  • 11. Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Introducing TCP and UDP Introducing TCP  Defined in RFC 793  Connection-oriented – Creates a session between the source and destination  Reliable delivery – Retransmits lost or corrupt data  Ordered data reconstruction – Reconstructs numbering and sequencing of segments  Flow control – Regulates the amount of data transmitted  Stateful protocol – Tracks the session
  • 12. Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Introducing TCP and UDP Introducing UDP  RFC 768  Connectionless  Unreliable delivery  No ordered data reconstruction  No flow control  Stateless protocol Applications that use UDP:  Domain Name System (DNS)  Video Streaming  VoIP
  • 13. Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Introducing TCP and UDP Separating Multiple Communications TCP and UDP use port numbers to differentiate between applications. .
  • 14. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Introducing TCP and UDP TCP and UDP Port Addressing
  • 15. Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Introducing TCP and UDP TCP and UDP Port Addressing (Cont.)
  • 16. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Introducing TCP and UDP TCP and UDP Port Addressing (Cont.)
  • 17. Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Introducing TCP and UDP TCP and UDP Port Addressing (Cont.) Netstat is used to examine TCP connections that are open and running on a networked host.
  • 18. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Introducing TCP and UDP TCP and UDP Segmentation The transport layer divides the data into pieces and adds a header for delivery over the network
  • 19. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 19 7.2 TCP and UDP
  • 20. Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential TCP Communication TCP Server Processes
  • 21. Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential TCP Communication TCP Server Processes (Cont.)
  • 22. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential TCP Communication TCP Connection, Establishment and Termination Three-Way Handshake  Establishes that the destination device is present on the network  Verifies that the destination device has an active service and is accepting requests on the destination port number that the initiating client intends to use for the session  Informs the destination device that the source client intends to establish a communication session on that port number
  • 23. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential TCP Communication TCP Three-Way Handshake – Step 1 Step 1: The initiating client requests a client-to-server communication session with the server
  • 24. Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential TCP Communication TCP Three-Way Handshake – Step 2 Step 2: The server acknowledges the client-to-server communication session and requests a server-to-client communication session.
  • 25. Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential TCP Communication TCP Three-Way Handshake – Step 3 Step 3: The initiating client acknowledges the server-to-client communication session.
  • 26. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential TCP Communication TCP Session Termination
  • 27. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliability and Flow Control TCP Reliability – Ordered Delivery Sequence numbers are used to reassemble segments into their original order.
  • 28. Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliability and Flow Control Acknowledgement and Window Size The sequence number and acknowledgement number are used together to confirm receipt. The window size is the amount of data that a source can transmit before an acknowledgement must be received.
  • 29. Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliability and Flow Control Window Size and Acknowledgements
  • 30. Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliability and Flow Control TCP Flow Control – Congestion Avoidance
  • 31. Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliability and Flow Control TCP Reliability - Acknowledgements
  • 32. Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential UDP Communication UDP Low Overhead vs. Reliability UDP  Simple protocol that provides the basic transport layer function  Used by applications that can tolerate small loss of data  Used by applications that cannot tolerate delay Used by  DNS  Simple Network Management Protocol (SNMP)  Dynamic Host Configuration Protocol (DHCP)  Trivial File Transfer Protocol (TFTP)  IP telephony or VoIP  Online games
  • 33. Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential UDP Communication Datagram Reassembly
  • 34. Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential UDP Communication UDP Server and Client Processes  UDP-based server applications are assigned well-known or registered port numbers.  UDP client process randomly selects port number from range of dynamic port numbers as the source port.
  • 35. Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential TCP or UDP Applications that use TCP
  • 36. Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential TCP or UDP Applications That Use UDP
  • 37. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 37 7.3 Summary
  • 38. Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 7: Summary In this chapter, you learned:  The role of the transport layer is to provide three main services: multiplexing, segmentation and reassembly, and error checking. It does this by: •Dividing data received from an application into segments. •Adding a header to identify and manage each segment. •Using the header information to reassemble the segments back into application data. •Passing the assembled data to the correct application.  How TCP and UDP operate and which popular applications use each protocol.  Transport Layer functions are necessary to address issues in QoS and security in networks.  Ports provide a “tunnel” for data to get from the transport layer to the appropriate application at the destination.
  • 39. Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential