You are on page 1of 39

COMPUTER COMMUNICATION

ECE & EEE

Class-13

- A.Sathish Kumar,ME,MBA
PROFESSIONAL GATE ACADEMY 1
Recap of Last Class

PROFESSIONAL GATE ACADEMY 2


Outline

❑ Transport Layer Protocols


❑ Network Layer Protocols
❑ Application Layer Protocols

PROFESSIONAL GATE ACADEMY 3


Transmission Control Protocol

✓ TCP is a connection-oriented protocol.

✓ It creates a virtual connection to send data.

✓ Connection establishment, data transfer, and connection


teardown phases

✓ TCP uses flow and error control mechanisms.

✓ TCP uses a combination of GBN and SR protocols to provide


reliability

✓ TCP uses checksum, retransmission, cumulative and selective


acknowledgments and timers.

PROFESSIONAL GATE ACADEMY 4


Table 23.2 Well-known ports used by TCP

PROFESSIONAL GATE ACADEMY 5


Figure 23.13 Stream delivery

PROFESSIONAL GATE ACADEMY 6


Figure 23.16 TCP Header format

PROFESSIONAL GATE ACADEMY 7


Figure 23.17 Control field

PROFESSIONAL GATE ACADEMY 8


Figure 23.18 Connection establishment using three-way handshaking

PROFESSIONAL GATE ACADEMY 9


Figure 23.19 Data transfer

PROFESSIONAL GATE ACADEMY 10


Figure 23.20 Connection termination using three-way handshaking

PROFESSIONAL GATE ACADEMY 11


Figure 23.21 Half-close

PROFESSIONAL GATE ACADEMY 12


Note

In modern implementations, a
retransmission occurs if the
retransmission timer expires or three
duplicate ACK segments have arrived.
The receiver TCP delivers only ordered
data to the process.

PROFESSIONAL GATE ACADEMY 13


Figure 23.26 Fast retransmission

PROFESSIONAL GATE ACADEMY 14


USER DATAGRAM PROTOCOL

✓ Process-to-Process Communication
✓ Connectionless Services
✓ It is unreliable transport protocol.
✓ Flow Control – No flow control
✓ Error Control – Checksum used
✓ Congestion Control -- does not provide Congestion Control
✓ Encapsulation and Decapsulation -- To send a message from
one process to another
✓ Queuing -- queues are associated with ports
✓ Multiplexing and Demultiplexing
PROFESSIONAL GATE ACADEMY 15
Figure 23.5 Socket address

PROFESSIONAL GATE ACADEMY 16


Figure 23.9 User datagram format

PROFESSIONAL GATE ACADEMY 17


PROFESSIONAL GATE ACADEMY 18
Figure 23.10 Pseudoheader for checksum calculation

PROFESSIONAL GATE ACADEMY 19


Example 23.2

Figure 23.11 shows the checksum calculation for a very


small user datagram with only 7 bytes of data. Because
the number of bytes of data is odd, padding is added for
checksum calculation. The pseudoheader as well as the
padding will be dropped when the user datagram is
delivered to IP.

PROFESSIONAL GATE ACADEMY 20


Figure 23.11 Checksum calculation of a simple UDP user datagram

PROFESSIONAL GATE ACADEMY 21


Summary

PROFESSIONAL GATE ACADEMY 35


MCQs
1) The maximum size of the TCP header is
A. 20 bytes
B. 40 bytes
C. 60 bytes
D. 80 bytes

PROFESSIONAL GATE ACADEMY 36


MCQs
2) The minimum size of a UDP datagram would be
A. 4 bytes
B. 8 bytes
C. 20 bytes
D. 28 bytes

PROFESSIONAL GATE ACADEMY 37


MCQs
3) The connection establishment in TCP is called
A. Three- way Handshaking
B. Three-way Data transfer
C. Two-way Handshaking
D. Two-way data transfer

PROFESSIONAL GATE ACADEMY 38


MCQs
4) Transmission Control Protocol (TCP), implements an error
control mechanism to provide
A. Unreliability
B. Availability
C. Security
D. reliability

PROFESSIONAL GATE ACADEMY 39


MCQs
5) There is no flow control and hence no window mechanism in
A. UDP
B. TCP
C. TCP/IP
D. ICMP

PROFESSIONAL GATE ACADEMY 40


MCQs
6) Stream Control Transmission Protocol (SCTP) is a new
A. Message-oriented transport layer protocol
B. Connectionless protocol
C. Connection oriented protocol
D. Stream oriented protocol

PROFESSIONAL GATE ACADEMY 41


MCQs
7) The most common way that is used to achieve process-to-process
communication is
A. Node/host paradigm
B. client/server paradigm
C. Network/transport paradigm
D. Process/Program paradigm

PROFESSIONAL GATE ACADEMY 42


MCQs
8)

PROFESSIONAL GATE ACADEMY 43

You might also like