Professional Documents
Culture Documents
Transport Layer
• Takes data from upper layer (i.e. Application layer) and then
breaks it into smaller size segments, numbers each byte, and hands
over to lower layer (Network Layer) for delivery.
Functions of Transport Layer:
• Process to Process Delivery
Transport layer must figure out which process to send the data to. To make
this possible, an additional addressing element is necessary. This address
allows a more specific location—a software process—to be
identified within a particular IP address.
In TCP/IP, this transport layer address is called a port address. Source and
destination addresses are found in the IP packet, belonging to the network
layer. A transport layer datagram or segment that uses port numbers is
wrapped into an IP packet and transported by it.
The network layer uses the IP packet information to transport the packet
across the network (routing). At the transport layer, we need a transport
layer address, called a port number, to choose among multiple processes
running on the destination host. The destination port number is needed
for delivery; the source port number is needed for the reply.
Port Address
• The destination port number is needed for delivery; the source port number
is needed for the reply.
• In the Internet model, the port numbers are 16-bit integers between 0 and
65,535.
• The client program defines itself with a port number, chosen randomly by the
transport layer software running on the client host. This is the ephemeral
port number.
• The server process should also defines itself with a port
number but this port is well known port number.
lANA Ranges
Connection is established.
Information is sent.
Connection is released (terminated)
User Datagram Protocol
• simplest Transport Layer communication protocol available
of the TCP/IP protocol suite.
• Checksum
• For error checking
Uses of UDP:
• UDP allows very simple data transmission without any error detection. So,
it can be used in networking applications like VOIP, streaming media, etc.
where loss of few packets can be tolerated and still function appropriately.
• TCP ensures that the data reaches intended destination in the same
order it was sent.
• TCP provides full duplex server, i.e. it can perform roles of both
receiver and sender.
Header
3-Way Handshaking
1. Connection establishment
2. Data Transfer
3. Connection termination
• ACK- Acknowledgement
Steps
1. First client send SYN message to server
• ACK- Acknowledgement
Steps
1. First client send FIN message to server
2. Server responds ACK to FIN from client and send FIN to
client
3. Client responds ACK to FIN and connection is established
Connection Termination (Handshaking)
Reliable vs. Unreliable
Traffic Shaping Algorithms
• Traffic shaping is a mechanism to control the amount and
the rate of the traffic sent to the network.
• The input rate can vary, but the output rate remains constant
• The system removes one token for every cell (or byte) of
data sent For example, if n is 100 and the host is idle for
100 ticks, the bucket collects 10,000 tokens. Now the host
can consume all these tokens in one tick with 10,000 cells,
or the host takes 1000 ticks with 10 cells per tick
Implementation:
1. Retransmission policy
2. Windowing policy
3. Acknowledge policy
4. Discard policy
5. Admission policy
• Retransmission Policy :Retransmission is sometimes unavoidable.
If the sender feels that a sent packet is lost or corrupted, the
packet needs to be retransmitted.
• Window Policy: when the timer for a packet times out, several
packets may be resent, although some may have arrived safe
and sound at the receiver. This duplication may make the
congestion worse
1. Back pressure
2. Choke packet
3. Implicit signalling
4. Explicit signalling
1. Back Pressure
• Backpressure refers to a congestion control mechanism in
which a congested node stops receiving data from the
immediate upstream node or nodes.
4. Explicit Signalling