SlideShare uma empresa Scribd logo
1 de 22
OSI Transport Layer

Network Fundamentals – Chapter 4

ITE I Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

1
Objectives


Identify Transport Layer protocols and services in
supporting communications across data networks



Identify the operation of TCP mechanisms that
support reliability



Identify the operation of TCP mechanisms that
support reassembly and manage data loss.



Identify the operation of UDP to support communicate
between two processes on end devices

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

2
Transport Layer Role and Services
 Shares the transport link between applications
 Ensure data reliability
 Handles errors and data losses

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

3
Transport Layer major functions
 Major functions of the transport layer in data networks
Tracking Individual Conversations
Segmenting Data
Reassembling Segments
Identifying the Applications

 Control conversation
Establishing a Session
Reliably delivery
Same order delivery
Flow Control

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

4
Transport Layer TCP (reliable), UDP (unreliable)
 Supports acknowledged Communication via TCP
 Supports unacknowledged Communications via UDP

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

5
Transport Layer Role and Services
 Basic characteristics of the TCP and UDP protocols

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

6
Transport Layer Port numbers
 Port numbers identify upper layer applications to the
Transport layer

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

7
Transport Layer Segments
 TCP segments contain sequence numbers for the order
of data reassembly
 UDP segments are not concerned with the order of
data reassembly

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

8
Transport layer TCP Segment
 TCP reliability mechanism works as part of a session

•Maximum Segment Size (MSS)
•Window Scaling
•Selective Acknowledgements
(SACK)
•Timestamps
ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Urgent pointer(high priority for
segment delivery to the server

Cisco Public

9
Port numbers in communications
 Client use well known port numbers to connect to the
server
 Servers use random port numbers to connect to the
client

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

10
TCP 3 way handshake
To establish a TCP communication channel a 3 way handshake is
implemented

SYN
SYN -ACK
ACK
Established

Once the channel is established the ACK bit remains set
for the remainder of the data exchange or until the data
channel is terminated
ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

11
TCP 3 way handshake
 To terminate a TCP communication channel a 3 way
handshake is implemented

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

12
TCP termination
 TCP is terminated when both sides have sent a FIN
segment and received an ACK segment.

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

13
Reconstructing TCP data streams
 TCP sequence numbers are used to reconstruct the
data stream with segments placed in the correct order

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

14
Managing TCP Sessions
 Sequence numbers and acknowledgement numbers
are used to manage exchanges in a conversation

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

15
Flow control TCP Sessions
 TCP manages the interrelationship between window size,
data loss and congestion during a session
Window size = The amount of segments a source can transmit
before it receives an acknowledgment

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

16
TCP Retransmission
 Retransmission. Remedy for lost data employed by
TCP

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

17
UDP Protocol
 UDP protocol and the types of communication for which
it is best suited

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

18
UDP Protocol
 UDP reassembly of PDUs at the destination device

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

19
UDP Protocol
 UDP server and Port numbers operate in the same way
as TCP port numbers

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

20
UDP Protocol
 UDP protocol and port numbers are utilized in clientserver communication.

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

21
Labs
 Lab 4.5.2 Transport Layer Protocols, Capturing
Transport sessions ( TCP sessions via FTP, UDP
sessions via TFTP)
 Lab 4.5.3 Examining Application and Transport Layer
Protocols, Capturing Transport session( TCP sessions
via HTTP , FTP via command line and FTP via a
Browser)

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

22

Mais conteúdo relacionado

Mais procurados

UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram ProtocolPeter R. Egli
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point ProtocolPhan Vuong
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)Kruti Niranjan
 
Arp (address resolution protocol)
Arp (address resolution protocol)Arp (address resolution protocol)
Arp (address resolution protocol)tigerbt
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of NetworkingMukesh Tekwani
 
TOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptTOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptshanthishyam
 
Internet protocol
Internet protocol Internet protocol
Internet protocol Bint Javed
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol Akhil .B
 
TCP - Transmission Control Protocol
TCP - Transmission Control ProtocolTCP - Transmission Control Protocol
TCP - Transmission Control ProtocolPeter R. Egli
 
Osi reference model
Osi reference modelOsi reference model
Osi reference modelSagar Gor
 
CCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - EthernetCCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - EthernetVuz Dở Hơi
 

Mais procurados (20)

OSI Model
OSI ModelOSI Model
OSI Model
 
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram Protocol
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
 
IPv4
IPv4IPv4
IPv4
 
Arp (address resolution protocol)
Arp (address resolution protocol)Arp (address resolution protocol)
Arp (address resolution protocol)
 
Data Link Layer
Data Link LayerData Link Layer
Data Link Layer
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of Networking
 
TOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptTOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.ppt
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
 
Internet protocol
Internet protocol Internet protocol
Internet protocol
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol
 
OSI Model
OSI ModelOSI Model
OSI Model
 
TCP - Transmission Control Protocol
TCP - Transmission Control ProtocolTCP - Transmission Control Protocol
TCP - Transmission Control Protocol
 
IPv6
IPv6IPv6
IPv6
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
CCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - EthernetCCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - Ethernet
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 

Destaque

Destaque (20)

Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Transport layer (computer networks)
Transport layer (computer networks)Transport layer (computer networks)
Transport layer (computer networks)
 
Osi model
Osi modelOsi model
Osi model
 
Exploration network chapter3
Exploration network chapter3Exploration network chapter3
Exploration network chapter3
 
chapter_3
chapter_3chapter_3
chapter_3
 
Chapter1
Chapter1Chapter1
Chapter1
 
Chapter11
Chapter11Chapter11
Chapter11
 
Chapter2
Chapter2Chapter2
Chapter2
 
Unit 1 network models & typical examples(part a)
Unit 1 network models & typical examples(part a)Unit 1 network models & typical examples(part a)
Unit 1 network models & typical examples(part a)
 
osi vs tcp/ip
osi vs tcp/iposi vs tcp/ip
osi vs tcp/ip
 
Chap 11 udp
Chap 11 udpChap 11 udp
Chap 11 udp
 
Chapter8
Chapter8 Chapter8
Chapter8
 
Entorno natural
Entorno naturalEntorno natural
Entorno natural
 
Normas técnicas de gestión calidad s.c
Normas técnicas de gestión calidad s.cNormas técnicas de gestión calidad s.c
Normas técnicas de gestión calidad s.c
 
Castillos medievales
Castillos medievalesCastillos medievales
Castillos medievales
 
How consumers are using the smartphones
How consumers are using the smartphonesHow consumers are using the smartphones
How consumers are using the smartphones
 
01 a-salinan-permendikbud-no-54-tahun-2013-ttg-skl
01 a-salinan-permendikbud-no-54-tahun-2013-ttg-skl01 a-salinan-permendikbud-no-54-tahun-2013-ttg-skl
01 a-salinan-permendikbud-no-54-tahun-2013-ttg-skl
 
Actividad 7
Actividad 7Actividad 7
Actividad 7
 
Presentation1
Presentation1Presentation1
Presentation1
 
Presentation1
Presentation1Presentation1
Presentation1
 

Semelhante a OSI Transport Layer

CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5Irsandi Hasan
 
CCNA Exploration 1 - Chapter 4
CCNA Exploration 1 - Chapter 4CCNA Exploration 1 - Chapter 4
CCNA Exploration 1 - Chapter 4Irsandi Hasan
 
CCNA 1 Routing and Switching v5.0 Chapter 7
CCNA 1 Routing and Switching v5.0 Chapter 7CCNA 1 Routing and Switching v5.0 Chapter 7
CCNA 1 Routing and Switching v5.0 Chapter 7Nil Menon
 
Exploration network chapter4
Exploration network chapter4Exploration network chapter4
Exploration network chapter4r82093403
 
Ccna v5-S1-Chapter 7
Ccna v5-S1-Chapter 7Ccna v5-S1-Chapter 7
Ccna v5-S1-Chapter 7Hamza Malik
 
Chapter 07 - Transport Layer
Chapter 07 - Transport LayerChapter 07 - Transport Layer
Chapter 07 - Transport LayerYaser Rahmati
 
Chapter 7 : Transport layer
Chapter 7 : Transport layerChapter 7 : Transport layer
Chapter 7 : Transport layerteknetir
 
CCNAv5 - S1: Chapter 7 - Transport Layer
CCNAv5 - S1: Chapter 7 - Transport LayerCCNAv5 - S1: Chapter 7 - Transport Layer
CCNAv5 - S1: Chapter 7 - Transport LayerVuz Dở Hơi
 
محمد مشاري
محمد مشاريمحمد مشاري
محمد مشاريmaherrrrz
 
CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7Irsandi Hasan
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsYaser Rahmati
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsVuz Dở Hơi
 
Chapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsChapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsteknetir
 
Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and ProtocolsSachii Dosti
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09Irsandi Hasan
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsVuz Dở Hơi
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3Nil Menon
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10Irsandi Hasan
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3Irsandi Hasan
 
CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5Nil Menon
 

Semelhante a OSI Transport Layer (20)

CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
CCNA Exploration 1 - Chapter 4
CCNA Exploration 1 - Chapter 4CCNA Exploration 1 - Chapter 4
CCNA Exploration 1 - Chapter 4
 
CCNA 1 Routing and Switching v5.0 Chapter 7
CCNA 1 Routing and Switching v5.0 Chapter 7CCNA 1 Routing and Switching v5.0 Chapter 7
CCNA 1 Routing and Switching v5.0 Chapter 7
 
Exploration network chapter4
Exploration network chapter4Exploration network chapter4
Exploration network chapter4
 
Ccna v5-S1-Chapter 7
Ccna v5-S1-Chapter 7Ccna v5-S1-Chapter 7
Ccna v5-S1-Chapter 7
 
Chapter 07 - Transport Layer
Chapter 07 - Transport LayerChapter 07 - Transport Layer
Chapter 07 - Transport Layer
 
Chapter 7 : Transport layer
Chapter 7 : Transport layerChapter 7 : Transport layer
Chapter 7 : Transport layer
 
CCNAv5 - S1: Chapter 7 - Transport Layer
CCNAv5 - S1: Chapter 7 - Transport LayerCCNAv5 - S1: Chapter 7 - Transport Layer
CCNAv5 - S1: Chapter 7 - Transport Layer
 
محمد مشاري
محمد مشاريمحمد مشاري
محمد مشاري
 
CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and Communications
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communications
 
Chapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsChapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communications
 
Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and Protocols
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point Connections
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3
 
CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5
 

Mais de Sachii Dosti

Network technology Paper 2
Network technology Paper 2Network technology Paper 2
Network technology Paper 2Sachii Dosti
 
Network technology paper
Network technology paperNetwork technology paper
Network technology paperSachii Dosti
 
Subneting and vlsm ntpg
Subneting and vlsm ntpgSubneting and vlsm ntpg
Subneting and vlsm ntpgSachii Dosti
 
Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Sachii Dosti
 
Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11Sachii Dosti
 
Addressing the Network – IPv4
Addressing the Network – IPv4Addressing the Network – IPv4
Addressing the Network – IPv4Sachii Dosti
 
Exploration routing chapter 4
Exploration routing chapter 4Exploration routing chapter 4
Exploration routing chapter 4Sachii Dosti
 
Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2Sachii Dosti
 
Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1Sachii Dosti
 

Mais de Sachii Dosti (12)

Network technology Paper 2
Network technology Paper 2Network technology Paper 2
Network technology Paper 2
 
Network technology paper
Network technology paperNetwork technology paper
Network technology paper
 
Subneting and vlsm ntpg
Subneting and vlsm ntpgSubneting and vlsm ntpg
Subneting and vlsm ntpg
 
Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)
 
Static Routing
Static RoutingStatic Routing
Static Routing
 
ip v6
ip v6ip v6
ip v6
 
Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11
 
Ethernet
EthernetEthernet
Ethernet
 
Addressing the Network – IPv4
Addressing the Network – IPv4Addressing the Network – IPv4
Addressing the Network – IPv4
 
Exploration routing chapter 4
Exploration routing chapter 4Exploration routing chapter 4
Exploration routing chapter 4
 
Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2
 
Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1
 

Último

How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 

Último (20)

How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 

OSI Transport Layer

  • 1. OSI Transport Layer Network Fundamentals – Chapter 4 ITE I Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1
  • 2. Objectives  Identify Transport Layer protocols and services in supporting communications across data networks  Identify the operation of TCP mechanisms that support reliability  Identify the operation of TCP mechanisms that support reassembly and manage data loss.  Identify the operation of UDP to support communicate between two processes on end devices ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2
  • 3. Transport Layer Role and Services  Shares the transport link between applications  Ensure data reliability  Handles errors and data losses ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3
  • 4. Transport Layer major functions  Major functions of the transport layer in data networks Tracking Individual Conversations Segmenting Data Reassembling Segments Identifying the Applications  Control conversation Establishing a Session Reliably delivery Same order delivery Flow Control ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4
  • 5. Transport Layer TCP (reliable), UDP (unreliable)  Supports acknowledged Communication via TCP  Supports unacknowledged Communications via UDP ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5
  • 6. Transport Layer Role and Services  Basic characteristics of the TCP and UDP protocols ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6
  • 7. Transport Layer Port numbers  Port numbers identify upper layer applications to the Transport layer ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7
  • 8. Transport Layer Segments  TCP segments contain sequence numbers for the order of data reassembly  UDP segments are not concerned with the order of data reassembly ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8
  • 9. Transport layer TCP Segment  TCP reliability mechanism works as part of a session •Maximum Segment Size (MSS) •Window Scaling •Selective Acknowledgements (SACK) •Timestamps ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Urgent pointer(high priority for segment delivery to the server Cisco Public 9
  • 10. Port numbers in communications  Client use well known port numbers to connect to the server  Servers use random port numbers to connect to the client ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10
  • 11. TCP 3 way handshake To establish a TCP communication channel a 3 way handshake is implemented SYN SYN -ACK ACK Established Once the channel is established the ACK bit remains set for the remainder of the data exchange or until the data channel is terminated ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11
  • 12. TCP 3 way handshake  To terminate a TCP communication channel a 3 way handshake is implemented ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12
  • 13. TCP termination  TCP is terminated when both sides have sent a FIN segment and received an ACK segment. ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13
  • 14. Reconstructing TCP data streams  TCP sequence numbers are used to reconstruct the data stream with segments placed in the correct order ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14
  • 15. Managing TCP Sessions  Sequence numbers and acknowledgement numbers are used to manage exchanges in a conversation ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15
  • 16. Flow control TCP Sessions  TCP manages the interrelationship between window size, data loss and congestion during a session Window size = The amount of segments a source can transmit before it receives an acknowledgment ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16
  • 17. TCP Retransmission  Retransmission. Remedy for lost data employed by TCP ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17
  • 18. UDP Protocol  UDP protocol and the types of communication for which it is best suited ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 18
  • 19. UDP Protocol  UDP reassembly of PDUs at the destination device ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 19
  • 20. UDP Protocol  UDP server and Port numbers operate in the same way as TCP port numbers ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 20
  • 21. UDP Protocol  UDP protocol and port numbers are utilized in clientserver communication. ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 21
  • 22. Labs  Lab 4.5.2 Transport Layer Protocols, Capturing Transport sessions ( TCP sessions via FTP, UDP sessions via TFTP)  Lab 4.5.3 Examining Application and Transport Layer Protocols, Capturing Transport session( TCP sessions via HTTP , FTP via command line and FTP via a Browser) ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 22

Notas do Editor

  1. The processes described in the OSI Transport layer accept data from the Application layer and prepare it for addressing at the Network layer. The Transport layer is responsible for the overall end-to-end transfer of application data. The Transport layer also encompasses these functions: Enables multiple applications to communicate over the network at the same time on a single device Ensures that, if required, all the data is received reliably and in order by the correct application Employs error handling mechanisms
  2. The Transport layer provides for the segmentation of data and the control necessary to reassemble these pieces into the various communication streams. Its primary responsibilities to accomplish this are: Tracking the individual communication between applications on the source and destination hosts Segmenting data and managing each piece Reassembling the segments into streams of application data Identifying the different applications Control conversation Establishing a Session Reliably delivery Same order delivery Flow Control
  3. A Transport layer protocol can implement is a method to ensure reliable delivery of the data. In networking terms, reliability means ensuring that each piece of data that the source sends arrives at the destination. At the Transport layer the three basic operations of reliability are: tracking transmitted data acknowledging received data retransmitting any unacknowledged data This requires the processes of Transport layer of the source to keep track of all the data pieces of each conversation and the retransmit any of data that did were not acknowledged by the destination. The Transport layer of the receiving host must also track the data as it is received and acknowledge the receipt of the data.
  4. User Datagram Protocol (UDP) UDP is a simple, connectionless protocol, described in RFC 768. It has the advantage of providing for low overhead data delivery. The pieces of communication in UDP are called datagrams. These datagrams are sent as "best effort" by this Transport layer protocol. Applications that use UDP include: Domain Name System (DNS) Video Streaming Voice over IP (VoIP) Transmission Control Protocol (TCP) TCP is a connection-oriented protocol, described in RFC 793. TCP incurs additional overhead to gain functions. Additional functions specified by TCP are the same order delivery, reliable delivery, and flow control. Each TCP segment has 20 bytes of overhead in the header encapsulating the Application layer data, whereas each UDP segment only has 8 bytes of overhead. See the figure for a comparison. Applications that use TCP are: Web Browsers E-mail File Transfers
  5. Consider the earlier example of a computer simultaneously receiving and sending e-mail, instant messages, web pages, and a VoIP phone call. The TCP and UDP based services keep track of the various applications that are communicating. To differentiate the segments and datagrams for each application, both TCP and UDP have header fields that can uniquely identify these applications. These unique identifiers are the port numbers, Well Known Ports (Numbers 0 to 1023) - These numbers are reserved for services and applications. Registered Ports (Numbers 1024 to 49151) - These port numbers are assigned to user processes or applications. Dynamic or Private Ports (Numbers 49152 to 65535) - Also known as Ephemeral Ports, these are usually assigned dynamically to client applications when initiating a connection.
  6. Dividing application data into pieces both ensures that data is transmitted within the limits of the media and that data from different applications can be multiplexed on to the media. TCP and UDP Handle Segmentation Differently. In TCP, each segment header contains a sequence number. This sequence number allows the Transport layer functions on the destination host to reassemble segments in the order in which they were transmitted. This ensures that the destination application has the data in the exact form the sender intended. Although services using UDP also track the conversations between applications, they are not concerned with the order in which the information was transmitted, or in maintaining a connection. There is no sequence number in the UDP header. UDP is a simpler design and generates less overhead than TCP, resulting in a faster transfer of data.
  7. Resequencing Segments to Order Transmitted When services send data using TCP, segments may arrive at their destination out of order. For the original message to be understood by the recipient, the data in these segments is reassembled into the original order. Sequence numbers are assigned in the header of each packet to achieve this goal. During session setup, an initial sequence number (ISN) is set. This initial sequence number represents the starting value for the bytes for this session that will be transmitted to the receiving application. As data is transmitted during the session, the sequence number is incremented by the number of bytes that have been transmitted. This tracking of data byte enables each segment to be uniquely identified and acknowledged. Missing segments can be identified.
  8. The segment header sequence number and acknowledgement number are used together to confirm receipt of the bytes of data contained in the segments. The sequence number indicates the relative number of bytes that have been transmitted in this session including the bytes in the current segment. TCP uses the acknowledgement number in segments sent back to the source to indicate the next byte in this session that the receiver expects to receive. This is called expectational acknowledgement.
  9. Sliding Window
  10. A destination host service using TCP usually only acknowledges data for contiguous sequence bytes. If one or more segments are missing, only the data in the segments that complete the stream are acknowledged. For example, if segments with sequence numbers 1500 to 3000 and 3400 to 3500 were received, the acknowledgement number would be 3001. This is because there are segments with the sequence numbers 3001 to 3399 that have not been received. When TCP at the source host has not received an acknowledgement after a predetermined amount of time, it will go back to the last acknowledgement number that it received and retransmit data from that point forward.
  11. Although the total amount of UDP traffic found on a typical network is often relatively low, key Application layer protocols that use UDP include: Domain Name System (DNS) Simple Network Management Protocol (SNMP) Dynamic Host Configuration Protocol (DHCP) Routing Information Protocol (RIP) Trivial File Transfer Protocol (TFTP) Online games
  12. Many applications that use UDP send small amounts of data that can fit in one segment. However, some applications will send larger amounts of data that must be split into multiple segments The UDP PDU is referred to as a datagram, although the terms segment and datagram are sometimes used interchangeably to describe a Transport layer PDU. When multiple datagrams are sent to a destination, they may take different paths and arrive in the wrong order. UDP does not keep track of sequence numbers the way TCP does. UDP has no way to reorder the datagrams into their transmission order. See the figure. Therefore, UDP simply reassembles the data in the order that it was received and forwards it to the application. If the sequence of the data is important to the application, the application will have to identify the proper sequence of the data and determine how the data should be processed.
  13. Like TCP-based applications, UDP-based server applications are assigned Well Known or Registered port numbers. When these applications or processes are running, they will accept the data matched with the assigned port number. When UDP receives a datagram destined for one of these ports, it forwards the application data to the appropriate application based on its port number.
  14. As with TCP, client/server communication is initiated by a client application that is requesting data from a server process. The UDP client process randomly selects a port number from the dynamic range of port numbers and uses this as the source port for the conversation. The destination port will usually be the Well Known or Registered port number assigned to the server process. Randomized source port numbers also help with security. If there is a predictable pattern for destination port selection, an intruder can more easily simulate access to a client by attempting to connect to the port number most likely to be open. Because there is no session to be created with UDP, as soon as the data is ready to be sent and the ports identified, UDP can form the datagram and pass it to the Network layer to be addressed and sent on the network. Remember, once a client has chosen the source and destination ports, the same pair of ports is used in the header of all datagrams used in the transaction. For the data returning to the client from the server, the source and destination port numbers in the datagram header are reversed.