Transport Layer

Содержание

Слайд 2

Upon completion of this chapter, you will be able to:

Explain the need

Upon completion of this chapter, you will be able to: Explain the
for the Transport layer.
Identify the role of the Transport layer as it provides the end-to-end transfer of data between applications.
Describe the role of two TCP/IP Transport layer protocols: TCP and UDP.
Explain the key functions of the Transport layer, including reliability, port addressing, and segmentation.
Explain how TCP and UDP each handle key functions.
Identify when it is appropriate to use TCP or UDP and provide examples of applications that use each protocol.

Suleyman Demirel University, 2011

Слайд 3

Transport Layer

Suleyman Demirel University, 2011

Transport Layer Suleyman Demirel University, 2011

Слайд 4

Suleyman Demirel University, 2011

Purpose of Transport Layer

Suleyman Demirel University, 2011 Purpose of Transport Layer

Слайд 5

Tracking Individual Conversations

Any host may have multiple applications that are communicating across

Tracking Individual Conversations Any host may have multiple applications that are communicating
the network. Each of these applications will be communicating with one or more applications on remote hosts. It is the responsibility of the Transport layer to maintain the multiple communication streams between these applications.

Suleyman Demirel University, 2011

Слайд 6

Tracking Individual Conversations

Suleyman Demirel University, 2011

Tracking Individual Conversations Suleyman Demirel University, 2011

Слайд 7

Segmenting Data

The Transport layer protocols describe services that segment data from the

Segmenting Data The Transport layer protocols describe services that segment data from
Application layer.
This includes the encapsulation required on each piece of data.
Each piece of application data requires headers to be added at the Transport layer to indicate to which communication it is associated.

Suleyman Demirel University, 2011

Слайд 8

Segmentation

Suleyman Demirel University, 2011

Web Surfing

Network

data

data

data

data

data

data

Segment Header

Segment

Segmentation Suleyman Demirel University, 2011 Web Surfing Network data data data data

Слайд 9

Segmentation

Suleyman Demirel University, 2011

Network

segment

segment

segment

segment

segment

Segmentation Suleyman Demirel University, 2011 Network segment segment segment segment segment

Слайд 10

Reassembling Segments

At the receiving host, each piece of data may be directed

Reassembling Segments At the receiving host, each piece of data may be
to the appropriate application.
Additionally, these individual pieces of data must also be reconstructed into a complete data stream that is useful to the Application layer.
The protocols at the Transport layer describe the how the Transport layer header information is used to reassemble the data pieces into streams to be passed to the Application layer.

Suleyman Demirel University, 2011

Слайд 11

Reassembling Segments, Application Identification

Suleyman Demirel University, 2011

Web Surfing

Network

data

data

data

data

data

data

Segment Header

Reassembling Segments, Application Identification Suleyman Demirel University, 2011 Web Surfing Network data

Слайд 12

Controlling the Conversations

Suleyman Demirel University, 2011

Controlling the Conversations Suleyman Demirel University, 2011

Слайд 13

Establishing a Session

The Transport layer can provide this connection orientation by creating

Establishing a Session The Transport layer can provide this connection orientation by
a sessions between the applications. These connections prepare the applications to communicate with each other before any data is transmitted. Within these sessions, the data for a communication between the two applications can be closely managed.

Suleyman Demirel University, 2011

Слайд 14

Reliable Delivery

For many reasons, it is possible for a piece of data

Reliable Delivery For many reasons, it is possible for a piece of
to become corrupted, or lost completely, as it is transmitted over the network. The Transport layer can ensure that all pieces reach their destination by having the source device to retransmit any data that is lost.

Suleyman Demirel University, 2011

Слайд 15

Same Order Delivery

Because networks may provide multiple routes that can have different

Same Order Delivery Because networks may provide multiple routes that can have
transmission times, data can arrive in the wrong order. By numbering and sequencing the segments, the Transport layer can ensure that these segments are reassembled into the proper order.

Suleyman Demirel University, 2011

Слайд 16

Flow Control Mechanism

Network hosts have limited resources, such as memory or bandwidth.

Flow Control Mechanism Network hosts have limited resources, such as memory or
When Transport layer is aware that these resources are overtaxed, some protocols can request that the sending application reduce the rate of data flow. This is done at the Transport layer by regulating the amount of data the source transmits as a group. Flow control can prevent the loss of segments on the network and avoid the need for retransmission.

Suleyman Demirel University, 2011

Слайд 17

Transport Layer Protocols

Computers uses different types of Transport layers protocols by some

Transport Layer Protocols Computers uses different types of Transport layers protocols by
reasons.
What is the reason for it?

Suleyman Demirel University, 2011

Слайд 18

Question

What kind of Computer Network Communications do you know?

Suleyman Demirel University, 2011

Question What kind of Computer Network Communications do you know? Suleyman Demirel University, 2011

Слайд 19

Different kinds of Computer Networks

Web Browsing
File sharing
IP Telephony
Video Streaming (conference or online

Different kinds of Computer Networks Web Browsing File sharing IP Telephony Video
lesson)
Working with mail

Suleyman Demirel University, 2011

Слайд 20

Question

For which of them we need reliability in delivery?

Suleyman Demirel University, 2011

Question For which of them we need reliability in delivery? Suleyman Demirel University, 2011

Слайд 21

Question

For which of them we need Speed in delivery?

Suleyman Demirel University, 2011

Question For which of them we need Speed in delivery? Suleyman Demirel University, 2011

Слайд 22

Transport Layer Protocols

Suleyman Demirel University, 2011

Transport Layer Protocols Suleyman Demirel University, 2011

Слайд 23

TCP - Transmission Control Protocol and UDP – User Datagram Protocol

TCP
Web Browsers
E-mail

TCP - Transmission Control Protocol and UDP – User Datagram Protocol TCP

File Transfers
UDP
Video Streaming
Voice over IP (VoIP)

Suleyman Demirel University, 2011

Слайд 24

Identifying Conversations

Suleyman Demirel University, 2011

Network

segment

segment

segment

segment

segment

Identifying Conversations Suleyman Demirel University, 2011 Network segment segment segment segment segment

Слайд 25

Question

We can see visual different colors of segments, by using colors we

Question We can see visual different colors of segments, by using colors
separate segments.
How computers make separation between segments?

Suleyman Demirel University, 2011

Слайд 26

Answer

Computers use Port Addresses

Suleyman Demirel University, 2011

Answer Computers use Port Addresses Suleyman Demirel University, 2011

Слайд 27

Port Addressing

Ports are using to identify conversations

Suleyman Demirel University, 2011

Port Addressing Ports are using to identify conversations Suleyman Demirel University, 2011

Слайд 28

Port Addresses

Well Known Ports (Numbers 0 to 1023)
Registered Ports (Numbers 1024 to

Port Addresses Well Known Ports (Numbers 0 to 1023) Registered Ports (Numbers
49151)
Dynamic or Private Ports (Numbers 49152 to 65535)
NETSTAT is an important network utility that can be used to verify current connections

Suleyman Demirel University, 2011

Слайд 29

Well Known Ports

Are served for services and applications.
They are commonly used

Well Known Ports Are served for services and applications. They are commonly
for applications such as HTTP (web server) POP3/SMTP (e-mail server) and Telnet.

Suleyman Demirel University, 2011

Слайд 30

Registered Ports

Are assigned to user processes or applications.
These processes are primarily

Registered Ports Are assigned to user processes or applications. These processes are
individual applications that a user has chosen to install rather than common applications that would receive a Well Known Port.
When not used for a server resource, these ports may also be used dynamically selected by a client as its source port.

Suleyman Demirel University, 2011

Слайд 31

Dynamic or Private Ports

Also known as Ephemeral Ports, these are usually

Dynamic or Private Ports Also known as Ephemeral Ports, these are usually
assigned dynamically to client applications when initiating a connection.
It is not very common for a client to connect to a service using a Dynamic or Private Port (although some peer-to-peer file sharing programs do).

Suleyman Demirel University, 2011

Слайд 32

Question

How to view states of connection in your computer?

Suleyman Demirel University,

Question How to view states of connection in your computer? Suleyman Demirel University, 2011
2011

Слайд 33

Answer

Use Netstat

Suleyman Demirel University, 2011

Answer Use Netstat Suleyman Demirel University, 2011

Слайд 34

Netstat Snapshot

Suleyman Demirel University, 2011

Netstat Snapshot Suleyman Demirel University, 2011

Слайд 35

TCP and UDP Handle Segmentation Differently.

Suleyman Demirel University, 2011

TCP and UDP Handle Segmentation Differently. Suleyman Demirel University, 2011

Слайд 36

TCP Header

Suleyman Demirel University, 2011

TCP Header Suleyman Demirel University, 2011

Слайд 37

UDP Header

Suleyman Demirel University, 2011

UDP Header Suleyman Demirel University, 2011

Слайд 38

TCP in process

Suleyman Demirel University, 2011

TCP in process Suleyman Demirel University, 2011

Слайд 39

Clients Define Destination Ports

Suleyman Demirel University, 2011

Clients Define Destination Ports Suleyman Demirel University, 2011

Слайд 40

Clients Define Source Ports

Suleyman Demirel University, 2011

Clients Define Source Ports Suleyman Demirel University, 2011

Слайд 41

Server Defines Destination Ports

Suleyman Demirel University, 2011

Server Defines Destination Ports Suleyman Demirel University, 2011

Слайд 42

Server Defines Source Ports

Suleyman Demirel University, 2011

Server Defines Source Ports Suleyman Demirel University, 2011

Слайд 43

TCP CONNECTION ESTABLISHMENT AND TERMINATION

Suleyman Demirel University, 2011

TCP CONNECTION ESTABLISHMENT AND TERMINATION Suleyman Demirel University, 2011

Слайд 44

Question

Establishment?

Suleyman Demirel University, 2011

Question Establishment? Suleyman Demirel University, 2011

Слайд 45

Answer

Suleyman Demirel University, 2011

Answer Suleyman Demirel University, 2011

Слайд 46

Question

How me make handshake?

Suleyman Demirel University, 2011

Question How me make handshake? Suleyman Demirel University, 2011

Слайд 47

Answer

Suleyman Demirel University, 2011

Answer Suleyman Demirel University, 2011

Слайд 48

Question

How many way do we have in handshake process?

Suleyman Demirel University, 2011

Question How many way do we have in handshake process? Suleyman Demirel University, 2011

Слайд 49

Answer

Suleyman Demirel University, 2011

Answer Suleyman Demirel University, 2011

Слайд 50

TCP Have to do Establishment before it Starts Transmission

This process is called

TCP Have to do Establishment before it Starts Transmission This process is
3 way handshake

Suleyman Demirel University, 2011

Слайд 51

3 way handshake

Suleyman Demirel University, 2011

3 way handshake Suleyman Demirel University, 2011

Слайд 52

TCP Session Termination

Suleyman Demirel University, 2011

TCP Session Termination Suleyman Demirel University, 2011

Слайд 53

Question

How people say goodbye?

Suleyman Demirel University, 2011

Question How people say goodbye? Suleyman Demirel University, 2011

Слайд 54

Answer

Suleyman Demirel University, 2011

Answer Suleyman Demirel University, 2011

Слайд 55

REORDERING SEGMENTS AFTER RECEIVING

Suleyman Demirel University, 2011

REORDERING SEGMENTS AFTER RECEIVING Suleyman Demirel University, 2011

Слайд 56

Question

Why it is needed?

Suleyman Demirel University, 2011

Question Why it is needed? Suleyman Demirel University, 2011

Слайд 57

Answer

Segments can be delivered in wrong order

Suleyman Demirel University, 2011

Answer Segments can be delivered in wrong order Suleyman Demirel University, 2011

Слайд 58

Re-ordering segments

Suleyman Demirel University, 2011

Re-ordering segments Suleyman Demirel University, 2011

Слайд 59

Acknowledgement

is?

Suleyman Demirel University, 2011

Acknowledgement is? Suleyman Demirel University, 2011

Слайд 60

Computer Acknowledgment

Computers often sends acknowledgement to each other, to confirm that they

Computer Acknowledgment Computers often sends acknowledgement to each other, to confirm that
have received data.

Suleyman Demirel University, 2011

Слайд 61

Clients retransmit data if they don’t get acknowledgement

Suleyman Demirel University, 2011

Clients retransmit data if they don’t get acknowledgement Suleyman Demirel University, 2011

Слайд 62

Flow Control

Suleyman Demirel University, 2011

Flow Control Suleyman Demirel University, 2011

Слайд 63

Flow Control with problems

Suleyman Demirel University, 2011

Flow Control with problems Suleyman Demirel University, 2011

Слайд 64

UDP – USER DATAGRAM PROTOCOL

Suleyman Demirel University, 2011

UDP – USER DATAGRAM PROTOCOL Suleyman Demirel University, 2011

Слайд 65

UDP

UDP protocol is the protocol of OSI model’s 4th layer (transport layer),

UDP UDP protocol is the protocol of OSI model’s 4th layer (transport
is not reliable but very very very fast!!!

Suleyman Demirel University, 2011

Имя файла: Transport-Layer-.pptx
Количество просмотров: 230
Количество скачиваний: 0