SlideShare uma empresa Scribd logo
1 de 30
Chapter 5: 
Transport Layer 
Network Fundamentals 
© 2008 Cisco Systems, Inc. All Presentation_ID rights reserved. Cisco Confidential 1
Chapter 5 
5.1 Transport Layer Protocols 
5.2 TCP and UDP 
5.3 Summary 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Chapter 5: Objectives 
 Explain the need for the transport layer. 
 Identify the role of the transport layer as it provides the 
end-to-end transfer of data between applications. 
 Describe the role of two TCP/IP transport layer protocols: 
TCP and UDP. 
 Explain the key functions of the transport layer, including 
reliability, port addressing, and segmentation. 
 Explain how TCP and UDP each handle key functions. 
 Identify when it is appropriate to use TCP or UDP and 
provide examples of applications that use each protocol 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
Role of the Transport Layer 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
Transportation of Data 
Role of the Transport Layer 
The Transport Layer is responsible for establishing a temporary 
communication session between two applications and delivering data 
between them. TCP/IP uses two protocols to achieve this: 
 Transmission Control Protocol (TCP) 
 User Datagram Protocol (UDP) 
Primary Responsibilities of Transport layer Protocols 
 Tracking the individual communication between applications on the 
source and destination hosts 
 Segmenting data for manageability and reassembling segmented 
data into streams of application data at the destination 
 Identifying the proper application for each communication stream 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
Transportation of Data 
Conversation Multiplexing 
Segmenting the data 
 Enables many different 
communications, from many 
different users, to be 
interleaved (multiplexed) on 
the same network, at the 
same time. 
 Provides the means to both 
send and receive data when 
running multiple applications. 
 Header added to each 
segment to identify it. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Transportation of Data 
Transport Layer Reliability 
TCP/IP provides two transport layer protocols, TCP and UDP 
Transmission Control Protocol (TCP) 
 Provides reliable delivery ensuring that all of the data arrives at the 
destination. 
 Uses acknowledged delivery and other processes to ensure 
delivery. 
 Makes larger demands on the network – more overhead. 
User Datagram Protocol (UDP) 
 Provides just the basic functions for delivery – no reliability. 
 Less overhead. 
TCP or UDP 
 There is a trade-off between the value of reliability and the burden it 
places on the network. 
 Application developers choose the transport protocol based on the 
requirements of their applications. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
Introducing TCP and UDP 
Introducing TCP 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Introducing TCP and UDP 
Introducing TCP 
Transmission Control Protocol (TCP) 
 RFC 793 
 Connection-oriented – creating a session between 
source and destination 
 Reliable delivery – retransmitting lost or corrupt data 
 Ordered data reconstruction – numbering and 
sequencing of segments 
 Flow control - regulating the amount of data transmitted 
 Stateful protocol – keeping track of the session 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Introducing TCP and UDP 
Introducing UDP 
User Datagram Protocol (UDP) 
 RFC 768 
 Connectionless 
 Unreliable delivery 
 No ordered data reconstruction 
 No flow control 
 Stateless protocol 
Applications that use UDP: 
 Domain Name System (DNS) 
 Video Streaming 
 Voice over IP (VoIP) 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Introducing TCP and UDP 
Separating Multiple Communications 
Port Numbers are used by TCP and UDP to differentiate between 
applications. 
. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Introducing TCP and UDP 
TCP and UDP Port Addressing 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Introducing TCP and UDP 
TCP and UDP Port Addressing 
Netstat 
 Used to examine TCP connections that are open and 
running on a networked host 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
TCP Communication 
TCP Server Processes 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
TCP Communication 
TCP Connection, Establishment and 
Termination 
Three-Way Handshake 
 Establishes that the destination device is present on the 
network 
 Verifies that the destination device has an active 
service and is accepting requests on the destination 
port number that the initiating client intends to use for 
the session 
 Informs the destination device that the source client 
intends to establish a communication session on that 
port number 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
TCP Communication 
TCP Three-Way Handshake – Step 1 
 Step 1: The initiating client requests a client-to-server 
communication session with the server. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
TCP Communication 
TCP Three-Way Handshake – Step 2 
 Step 2: The server acknowledges the client-to-server 
communication session and requests a 
server-to-client communication session. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
TCP Communication 
TCP Three-Way Handshake – Step 3 
 Step 3: The initiating client acknowledges the 
server-to-client communication session. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
Protocol Data Units??? Is this correct title?? 
TCP Reliability – Ordered Delivery 
Sequence numbers used to reassemble segments into 
original order 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
TCP Reliability – Acknowledgement and 
Window Size 
The sequence number and acknowledgement number 
are used together to confirm receipt. 
Window Size - The amount of data that a source can 
transmit before an acknowledgement must be received. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
Protocol Data Units 
TCP Reliability and Flow Control 
Data Loss and Retransmission 
 When TCP at the source host has not received an 
acknowledgement after a predetermined amount of time, it will go 
back to the last acknowledgement number that it received and 
retransmit data from that point forward 
Flow Control 
 Uses the window size field in the TCP header to specify the 
amount of data that can be transmitted before an acknowledgement 
must be received. 
 Adjusts the effective rate of data transmission to the maximum flow 
that the network and destination device can support without loss. 
 Manages the rate of transmission so that all data will be received 
and retransmissions will be minimized. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
Protocol Data Units 
TCP Flow Control – Congestion Avoidance 
Using Dynamic Window Sizes 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
TCP and UDP 
TCP Reliability - Acknowledgements 
 TCP uses a combination of sequence numbers and 
acknowledgements to ensure all requested data has 
been received. 
 Can be inefficient when there is loss of one or more 
segments 
 Selective Acknowledgements (SACK) – 
implementation of TCP that overcomes the inefficiency 
of TCP acknowledgements 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
UDP Communication 
UDP Low Overhead vs. Reliability 
UDP 
 Simple protocol that provides the basic transport layer function 
 Used by applications that can tolerate small loss of data 
 Used by applications that cannot tolerate delay 
Used by 
 Domain Name System (DNS) 
 Simple Network Management Protocol (SNMP) 
 Dynamic Host Configuration Protocol (DHCP) 
 Trivial File Transfer Protocol (TFTP) 
 IP telephony or Voice over IP (VoIP) 
 Online games 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
UDP Communication 
Datagram Reassembly 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
UDP Communication 
UDP Server and Client Processes 
 UDP-based server applications are assigned well-known 
or registered port numbers. 
 UDP client process randomly selects port number from 
range of dynamic port numbers as the source port. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
TCP or UDP 
Applications that use TCP 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
TCP or UDP 
Applications that use UDP 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
Chapter 5: Summary 
 The role of the Transport layer is to provide three main 
functions: multiplexing, segmentation and reassembly, 
and error checking. 
 These functions are necessary in order to address 
issues in quality of service and security on networks. 
 Knowing how TCP and UDP operate and which popular 
applications use each protocol will allow the 
implementation of quality of service and build more 
reliable networks. 
 Ports provide a “tunnel” for data to get from the Transport 
layer to the appropriate application at the destination. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30

Mais conteúdo relacionado

Mais procurados

CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6Nil Menon
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08Irsandi Hasan
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3Nil Menon
 
IP Multimedia Subsystem architecture overview
IP Multimedia Subsystem architecture overviewIP Multimedia Subsystem architecture overview
IP Multimedia Subsystem architecture overviewNarasimham Settipalli
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2Nil Menon
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04Irsandi Hasan
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationVuz Dở Hơi
 
CCNA Product Overview.pptx
CCNA Product Overview.pptxCCNA Product Overview.pptx
CCNA Product Overview.pptxKISHOYIANKISH
 
CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9Nil Menon
 
CCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the networkCCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the networkMuhd Mu'izuddin
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4Nil Menon
 
ELECTRONIC COMMUNICATIONS (Beasley).pdf
ELECTRONIC COMMUNICATIONS (Beasley).pdfELECTRONIC COMMUNICATIONS (Beasley).pdf
ELECTRONIC COMMUNICATIONS (Beasley).pdfivan ion
 
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...Vikas Shokeen
 
CCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
CCNAv5 - S1: Chapter 9 - Subnetting Ip NetworksCCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
CCNAv5 - S1: Chapter 9 - Subnetting Ip NetworksVuz Dở Hơi
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6Nil Menon
 
CCNAv5 - S1: Chapter 2 - Configuring a network operating system
CCNAv5 - S1: Chapter 2 - Configuring a network operating systemCCNAv5 - S1: Chapter 2 - Configuring a network operating system
CCNAv5 - S1: Chapter 2 - Configuring a network operating systemVuz Dở Hơi
 

Mais procurados (20)

CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
IP Multimedia Subsystem architecture overview
IP Multimedia Subsystem architecture overviewIP Multimedia Subsystem architecture overview
IP Multimedia Subsystem architecture overview
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
 
CCNA Product Overview.pptx
CCNA Product Overview.pptxCCNA Product Overview.pptx
CCNA Product Overview.pptx
 
CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9
 
CCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the networkCCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the network
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4
 
ELECTRONIC COMMUNICATIONS (Beasley).pdf
ELECTRONIC COMMUNICATIONS (Beasley).pdfELECTRONIC COMMUNICATIONS (Beasley).pdf
ELECTRONIC COMMUNICATIONS (Beasley).pdf
 
IMS ENUM & DNS Mechanism
IMS ENUM & DNS MechanismIMS ENUM & DNS Mechanism
IMS ENUM & DNS Mechanism
 
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
 
CCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
CCNAv5 - S1: Chapter 9 - Subnetting Ip NetworksCCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
CCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6
 
CCNAv5 - S1: Chapter 2 - Configuring a network operating system
CCNAv5 - S1: Chapter 2 - Configuring a network operating systemCCNAv5 - S1: Chapter 2 - Configuring a network operating system
CCNAv5 - S1: Chapter 2 - Configuring a network operating system
 

Destaque

CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6Irsandi Hasan
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3Irsandi Hasan
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2Irsandi Hasan
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11Irsandi Hasan
 
CCNA Exploration 1 - Chapter 5
CCNA Exploration 1 - Chapter 5CCNA Exploration 1 - Chapter 5
CCNA Exploration 1 - Chapter 5Irsandi Hasan
 
Best Practice TLS for IBM Domino
Best Practice TLS for IBM DominoBest Practice TLS for IBM Domino
Best Practice TLS for IBM DominoJared Roberts
 
CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10Irsandi Hasan
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1Irsandi Hasan
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9Irsandi Hasan
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4Irsandi Hasan
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8Irsandi Hasan
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10Irsandi Hasan
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4Irsandi Hasan
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - OverviewIrsandi Hasan
 
Aplication and Transport layer- a practical approach
Aplication and Transport layer-  a practical approachAplication and Transport layer-  a practical approach
Aplication and Transport layer- a practical approachSarah R. Dowlath
 
Advanced Crypto Service Provider – cryptography as a service
Advanced Crypto Service Provider – cryptography as a serviceAdvanced Crypto Service Provider – cryptography as a service
Advanced Crypto Service Provider – cryptography as a serviceSmart Coders
 
Recover A RSA Private key from a TLS session with perfect forward secrecy
Recover A RSA Private key from a TLS session with perfect forward secrecyRecover A RSA Private key from a TLS session with perfect forward secrecy
Recover A RSA Private key from a TLS session with perfect forward secrecyPriyanka Aash
 
F5 Networks Adds To Oracle Database
F5 Networks Adds To Oracle DatabaseF5 Networks Adds To Oracle Database
F5 Networks Adds To Oracle DatabaseF5 Networks
 
F5 Networks: миграция c Microsoft TMG
F5 Networks: миграция c Microsoft TMGF5 Networks: миграция c Microsoft TMG
F5 Networks: миграция c Microsoft TMGDmitry Tikhovich
 
20071015 Architecting Enterprise Security
20071015  Architecting Enterprise Security20071015  Architecting Enterprise Security
20071015 Architecting Enterprise SecurityDavid Chou
 

Destaque (20)

CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
CCNA Exploration 1 - Chapter 5
CCNA Exploration 1 - Chapter 5CCNA Exploration 1 - Chapter 5
CCNA Exploration 1 - Chapter 5
 
Best Practice TLS for IBM Domino
Best Practice TLS for IBM DominoBest Practice TLS for IBM Domino
Best Practice TLS for IBM Domino
 
CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
Aplication and Transport layer- a practical approach
Aplication and Transport layer-  a practical approachAplication and Transport layer-  a practical approach
Aplication and Transport layer- a practical approach
 
Advanced Crypto Service Provider – cryptography as a service
Advanced Crypto Service Provider – cryptography as a serviceAdvanced Crypto Service Provider – cryptography as a service
Advanced Crypto Service Provider – cryptography as a service
 
Recover A RSA Private key from a TLS session with perfect forward secrecy
Recover A RSA Private key from a TLS session with perfect forward secrecyRecover A RSA Private key from a TLS session with perfect forward secrecy
Recover A RSA Private key from a TLS session with perfect forward secrecy
 
F5 Networks Adds To Oracle Database
F5 Networks Adds To Oracle DatabaseF5 Networks Adds To Oracle Database
F5 Networks Adds To Oracle Database
 
F5 Networks: миграция c Microsoft TMG
F5 Networks: миграция c Microsoft TMGF5 Networks: миграция c Microsoft TMG
F5 Networks: миграция c Microsoft TMG
 
20071015 Architecting Enterprise Security
20071015  Architecting Enterprise Security20071015  Architecting Enterprise Security
20071015 Architecting Enterprise Security
 

Semelhante a CCNA RS_NB - Chapter 5

CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7Irsandi Hasan
 
Ccna v5-S1-Chapter 7
Ccna v5-S1-Chapter 7Ccna v5-S1-Chapter 7
Ccna v5-S1-Chapter 7Hamza Malik
 
CCNA 1 Routing and Switching v5.0 Chapter 7
CCNA 1 Routing and Switching v5.0 Chapter 7CCNA 1 Routing and Switching v5.0 Chapter 7
CCNA 1 Routing and Switching v5.0 Chapter 7Nil Menon
 
Chapter 07 - Transport Layer
Chapter 07 - Transport LayerChapter 07 - Transport Layer
Chapter 07 - Transport LayerYaser Rahmati
 
Chapter 7 : Transport layer
Chapter 7 : Transport layerChapter 7 : Transport layer
Chapter 7 : Transport layerteknetir
 
CCNAv5 - S1: Chapter 7 - Transport Layer
CCNAv5 - S1: Chapter 7 - Transport LayerCCNAv5 - S1: Chapter 7 - Transport Layer
CCNAv5 - S1: Chapter 7 - Transport LayerVuz Dở Hơi
 
محمد مشاري
محمد مشاريمحمد مشاري
محمد مشاريmaherrrrz
 
OSI Transport Layer
OSI Transport LayerOSI Transport Layer
OSI Transport LayerSachii Dosti
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09Irsandi Hasan
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsVuz Dở Hơi
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application LayerYaser Rahmati
 
CCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerCCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerVuz Dở Hơi
 
Chapter 10 : Application layer
Chapter 10 : Application layerChapter 10 : Application layer
Chapter 10 : Application layerteknetir
 
Exploration network chapter4
Exploration network chapter4Exploration network chapter4
Exploration network chapter4r82093403
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10Nil Menon
 
CCNA Exploration 1 - Chapter 4
CCNA Exploration 1 - Chapter 4CCNA Exploration 1 - Chapter 4
CCNA Exploration 1 - Chapter 4Irsandi Hasan
 
cisco-nti-Day18
cisco-nti-Day18cisco-nti-Day18
cisco-nti-Day18eyad alaa
 
Lecture Notes- Network Services - Copy.pptx
Lecture Notes- Network Services - Copy.pptxLecture Notes- Network Services - Copy.pptx
Lecture Notes- Network Services - Copy.pptxSaqibAhmedKhan4
 
It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9newbie2019
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3Irsandi Hasan
 

Semelhante a CCNA RS_NB - Chapter 5 (20)

CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7
 
Ccna v5-S1-Chapter 7
Ccna v5-S1-Chapter 7Ccna v5-S1-Chapter 7
Ccna v5-S1-Chapter 7
 
CCNA 1 Routing and Switching v5.0 Chapter 7
CCNA 1 Routing and Switching v5.0 Chapter 7CCNA 1 Routing and Switching v5.0 Chapter 7
CCNA 1 Routing and Switching v5.0 Chapter 7
 
Chapter 07 - Transport Layer
Chapter 07 - Transport LayerChapter 07 - Transport Layer
Chapter 07 - Transport Layer
 
Chapter 7 : Transport layer
Chapter 7 : Transport layerChapter 7 : Transport layer
Chapter 7 : Transport layer
 
CCNAv5 - S1: Chapter 7 - Transport Layer
CCNAv5 - S1: Chapter 7 - Transport LayerCCNAv5 - S1: Chapter 7 - Transport Layer
CCNAv5 - S1: Chapter 7 - Transport Layer
 
محمد مشاري
محمد مشاريمحمد مشاري
محمد مشاري
 
OSI Transport Layer
OSI Transport LayerOSI Transport Layer
OSI Transport Layer
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point Connections
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application Layer
 
CCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerCCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application Layer
 
Chapter 10 : Application layer
Chapter 10 : Application layerChapter 10 : Application layer
Chapter 10 : Application layer
 
Exploration network chapter4
Exploration network chapter4Exploration network chapter4
Exploration network chapter4
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10
 
CCNA Exploration 1 - Chapter 4
CCNA Exploration 1 - Chapter 4CCNA Exploration 1 - Chapter 4
CCNA Exploration 1 - Chapter 4
 
cisco-nti-Day18
cisco-nti-Day18cisco-nti-Day18
cisco-nti-Day18
 
Lecture Notes- Network Services - Copy.pptx
Lecture Notes- Network Services - Copy.pptxLecture Notes- Network Services - Copy.pptx
Lecture Notes- Network Services - Copy.pptx
 
It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3
 

Mais de Irsandi Hasan

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01Irsandi Hasan
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11Irsandi Hasan
 
CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9Irsandi Hasan
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8Irsandi Hasan
 
CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6Irsandi Hasan
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5Irsandi Hasan
 

Mais de Irsandi Hasan (11)

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
 
CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8
 
CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5
 

Último

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Último (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

CCNA RS_NB - Chapter 5

  • 1. Chapter 5: Transport Layer Network Fundamentals © 2008 Cisco Systems, Inc. All Presentation_ID rights reserved. Cisco Confidential 1
  • 2. Chapter 5 5.1 Transport Layer Protocols 5.2 TCP and UDP 5.3 Summary Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
  • 3. Chapter 5: Objectives  Explain the need for the transport layer.  Identify the role of the transport layer as it provides the end-to-end transfer of data between applications.  Describe the role of two TCP/IP transport layer protocols: TCP and UDP.  Explain the key functions of the transport layer, including reliability, port addressing, and segmentation.  Explain how TCP and UDP each handle key functions.  Identify when it is appropriate to use TCP or UDP and provide examples of applications that use each protocol Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
  • 4. Role of the Transport Layer Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
  • 5. Transportation of Data Role of the Transport Layer The Transport Layer is responsible for establishing a temporary communication session between two applications and delivering data between them. TCP/IP uses two protocols to achieve this:  Transmission Control Protocol (TCP)  User Datagram Protocol (UDP) Primary Responsibilities of Transport layer Protocols  Tracking the individual communication between applications on the source and destination hosts  Segmenting data for manageability and reassembling segmented data into streams of application data at the destination  Identifying the proper application for each communication stream Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
  • 6. Transportation of Data Conversation Multiplexing Segmenting the data  Enables many different communications, from many different users, to be interleaved (multiplexed) on the same network, at the same time.  Provides the means to both send and receive data when running multiple applications.  Header added to each segment to identify it. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
  • 7. Transportation of Data Transport Layer Reliability TCP/IP provides two transport layer protocols, TCP and UDP Transmission Control Protocol (TCP)  Provides reliable delivery ensuring that all of the data arrives at the destination.  Uses acknowledged delivery and other processes to ensure delivery.  Makes larger demands on the network – more overhead. User Datagram Protocol (UDP)  Provides just the basic functions for delivery – no reliability.  Less overhead. TCP or UDP  There is a trade-off between the value of reliability and the burden it places on the network.  Application developers choose the transport protocol based on the requirements of their applications. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
  • 8. Introducing TCP and UDP Introducing TCP Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
  • 9. Introducing TCP and UDP Introducing TCP Transmission Control Protocol (TCP)  RFC 793  Connection-oriented – creating a session between source and destination  Reliable delivery – retransmitting lost or corrupt data  Ordered data reconstruction – numbering and sequencing of segments  Flow control - regulating the amount of data transmitted  Stateful protocol – keeping track of the session Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
  • 10. Introducing TCP and UDP Introducing UDP User Datagram Protocol (UDP)  RFC 768  Connectionless  Unreliable delivery  No ordered data reconstruction  No flow control  Stateless protocol Applications that use UDP:  Domain Name System (DNS)  Video Streaming  Voice over IP (VoIP) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
  • 11. Introducing TCP and UDP Separating Multiple Communications Port Numbers are used by TCP and UDP to differentiate between applications. . Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
  • 12. Introducing TCP and UDP TCP and UDP Port Addressing Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
  • 13. Introducing TCP and UDP TCP and UDP Port Addressing Netstat  Used to examine TCP connections that are open and running on a networked host Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
  • 14. TCP Communication TCP Server Processes Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
  • 15. TCP Communication TCP Connection, Establishment and Termination Three-Way Handshake  Establishes that the destination device is present on the network  Verifies that the destination device has an active service and is accepting requests on the destination port number that the initiating client intends to use for the session  Informs the destination device that the source client intends to establish a communication session on that port number Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
  • 16. TCP Communication TCP Three-Way Handshake – Step 1  Step 1: The initiating client requests a client-to-server communication session with the server. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
  • 17. TCP Communication TCP Three-Way Handshake – Step 2  Step 2: The server acknowledges the client-to-server communication session and requests a server-to-client communication session. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
  • 18. TCP Communication TCP Three-Way Handshake – Step 3  Step 3: The initiating client acknowledges the server-to-client communication session. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
  • 19. Protocol Data Units??? Is this correct title?? TCP Reliability – Ordered Delivery Sequence numbers used to reassemble segments into original order Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
  • 20. TCP Reliability – Acknowledgement and Window Size The sequence number and acknowledgement number are used together to confirm receipt. Window Size - The amount of data that a source can transmit before an acknowledgement must be received. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
  • 21. Protocol Data Units TCP Reliability and Flow Control Data Loss and Retransmission  When TCP at the source host has not received an acknowledgement after a predetermined amount of time, it will go back to the last acknowledgement number that it received and retransmit data from that point forward Flow Control  Uses the window size field in the TCP header to specify the amount of data that can be transmitted before an acknowledgement must be received.  Adjusts the effective rate of data transmission to the maximum flow that the network and destination device can support without loss.  Manages the rate of transmission so that all data will be received and retransmissions will be minimized. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
  • 22. Protocol Data Units TCP Flow Control – Congestion Avoidance Using Dynamic Window Sizes Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
  • 23. TCP and UDP TCP Reliability - Acknowledgements  TCP uses a combination of sequence numbers and acknowledgements to ensure all requested data has been received.  Can be inefficient when there is loss of one or more segments  Selective Acknowledgements (SACK) – implementation of TCP that overcomes the inefficiency of TCP acknowledgements Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
  • 24. UDP Communication UDP Low Overhead vs. Reliability UDP  Simple protocol that provides the basic transport layer function  Used by applications that can tolerate small loss of data  Used by applications that cannot tolerate delay Used by  Domain Name System (DNS)  Simple Network Management Protocol (SNMP)  Dynamic Host Configuration Protocol (DHCP)  Trivial File Transfer Protocol (TFTP)  IP telephony or Voice over IP (VoIP)  Online games Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
  • 25. UDP Communication Datagram Reassembly Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
  • 26. UDP Communication UDP Server and Client Processes  UDP-based server applications are assigned well-known or registered port numbers.  UDP client process randomly selects port number from range of dynamic port numbers as the source port. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
  • 27. TCP or UDP Applications that use TCP Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
  • 28. TCP or UDP Applications that use UDP Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
  • 29. Chapter 5: Summary  The role of the Transport layer is to provide three main functions: multiplexing, segmentation and reassembly, and error checking.  These functions are necessary in order to address issues in quality of service and security on networks.  Knowing how TCP and UDP operate and which popular applications use each protocol will allow the implementation of quality of service and build more reliable networks.  Ports provide a “tunnel” for data to get from the Transport layer to the appropriate application at the destination. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
  • 30. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30