Chapter 6 The Transport Layer The Transport Service
![Chapter 6 The Transport Layer Chapter 6 The Transport Layer](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-1.jpg)
![The Transport Service • • Services Provided to the Upper Layers Transport Service Primitives The Transport Service • • Services Provided to the Upper Layers Transport Service Primitives](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-2.jpg)
![Services Provided to the Upper Layers The network, transport, and application layers. Services Provided to the Upper Layers The network, transport, and application layers.](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-3.jpg)
![Transport Service Primitives The primitives for a simple transport service. Transport Service Primitives The primitives for a simple transport service.](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-4.jpg)
![Transport Service Primitives (2) The nesting of TPDUs, packets, and frames. Transport Service Primitives (2) The nesting of TPDUs, packets, and frames.](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-5.jpg)
![Transport Service Primitives (3) A state diagram for a simple connection management scheme. Transitions Transport Service Primitives (3) A state diagram for a simple connection management scheme. Transitions](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-6.jpg)
![Berkeley Sockets The socket primitives for TCP. Berkeley Sockets The socket primitives for TCP.](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-7.jpg)
![Socket Programming Example: Internet File Server 6 -6 -1 Client Code Socket Programming Example: Internet File Server 6 -6 -1 Client Code](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-8.jpg)
![Socket Programming Example: Internet File Server (2) Server Code Socket Programming Example: Internet File Server (2) Server Code](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-9.jpg)
![Transport Functions • • • Addressing Connection Establishment Connection Release Flow Control and Buffering Transport Functions • • • Addressing Connection Establishment Connection Release Flow Control and Buffering](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-10.jpg)
![Transport Protocol (a) Environment of the data link layer. (b) Environment of the transport Transport Protocol (a) Environment of the data link layer. (b) Environment of the transport](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-11.jpg)
![Addressing TSAPs, NSAPs and transport connections. Addressing TSAPs, NSAPs and transport connections.](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-12.jpg)
![Connection Establishment How a user process in host 1 establishes a connection with a Connection Establishment How a user process in host 1 establishes a connection with a](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-13.jpg)
![Connection Establishment (2) Three protocol scenarios for establishing a connection using a three-way handshake. Connection Establishment (2) Three protocol scenarios for establishing a connection using a three-way handshake.](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-14.jpg)
![Connection Release Abrupt disconnection with loss of data. Connection Release Abrupt disconnection with loss of data.](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-15.jpg)
![Connection Release (2) 6 -14, a, b Four protocol scenarios for releasing a connection. Connection Release (2) 6 -14, a, b Four protocol scenarios for releasing a connection.](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-16.jpg)
![Connection Release (3) 6 -14, c, d (c) Response lost. (d) Response lost and Connection Release (3) 6 -14, c, d (c) Response lost. (d) Response lost and](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-17.jpg)
![Flow Control and Buffering (a) Chained fixed-size buffers. (b) Chained variable-sized buffers. (c) One Flow Control and Buffering (a) Chained fixed-size buffers. (b) Chained variable-sized buffers. (c) One](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-18.jpg)
![Flow Control and Buffering (2) Dynamic buffer allocation. The arrows show the direction of Flow Control and Buffering (2) Dynamic buffer allocation. The arrows show the direction of](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-19.jpg)
![Multiplexing (a) Upward multiplexing. (b) Downward multiplexing. Multiplexing (a) Upward multiplexing. (b) Downward multiplexing.](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-20.jpg)
![Crash Recovery Different combinations of client and server strategy. Crash Recovery Different combinations of client and server strategy.](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-21.jpg)
![Position of UDP in the TCP/IP protocol suite Position of UDP in the TCP/IP protocol suite](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-22.jpg)
![UDP versus IP UDP versus IP](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-23.jpg)
![Port numbers Port numbers](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-24.jpg)
![IP addresses versus port numbers IP addresses versus port numbers](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-25.jpg)
![ICANN ranges ICANN ranges](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-26.jpg)
![Well-known ports used with UDP Well-known ports used with UDP](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-27.jpg)
![Socket address Socket address](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-28.jpg)
![UDP Header The UDP header. UDP Header The UDP header.](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-29.jpg)
![Pseudoheader for checksum calculation Pseudoheader for checksum calculation](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-30.jpg)
![UDP design UDP design](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-31.jpg)
![The control-block table The control-block table](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-32.jpg)
![Real-Time Protocol (RTP) § RTP: to transport audio and video data § RFC 1889 Real-Time Protocol (RTP) § RTP: to transport audio and video data § RFC 1889](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-33.jpg)
![RTP runs on top of UDP RTP libraries provide a transport-layer interface that extend RTP runs on top of UDP RTP libraries provide a transport-layer interface that extend](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-34.jpg)
![RTP over OS (a) The position of RTP in the protocol stack. (b) Packet RTP over OS (a) The position of RTP in the protocol stack. (b) Packet](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-35.jpg)
![RTP Header The RTP header. RTP Header The RTP header.](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-36.jpg)
![Payload Type (7 bits) Payload Type (7 bits)](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-37.jpg)
![RTP Header Format § Sequence Number (16 bits): Increments by one for each RTP RTP Header Format § Sequence Number (16 bits): Increments by one for each RTP](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-38.jpg)
- Slides: 38
![Chapter 6 The Transport Layer Chapter 6 The Transport Layer](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-1.jpg)
Chapter 6 The Transport Layer
![The Transport Service Services Provided to the Upper Layers Transport Service Primitives The Transport Service • • Services Provided to the Upper Layers Transport Service Primitives](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-2.jpg)
The Transport Service • • Services Provided to the Upper Layers Transport Service Primitives Berkeley Sockets An Example of Socket Programming: – An Internet File Server
![Services Provided to the Upper Layers The network transport and application layers Services Provided to the Upper Layers The network, transport, and application layers.](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-3.jpg)
Services Provided to the Upper Layers The network, transport, and application layers.
![Transport Service Primitives The primitives for a simple transport service Transport Service Primitives The primitives for a simple transport service.](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-4.jpg)
Transport Service Primitives The primitives for a simple transport service.
![Transport Service Primitives 2 The nesting of TPDUs packets and frames Transport Service Primitives (2) The nesting of TPDUs, packets, and frames.](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-5.jpg)
Transport Service Primitives (2) The nesting of TPDUs, packets, and frames.
![Transport Service Primitives 3 A state diagram for a simple connection management scheme Transitions Transport Service Primitives (3) A state diagram for a simple connection management scheme. Transitions](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-6.jpg)
Transport Service Primitives (3) A state diagram for a simple connection management scheme. Transitions labeled in italics are caused by packet arrivals. The solid lines show the client's state sequence. The dashed lines show the server's state sequence.
![Berkeley Sockets The socket primitives for TCP Berkeley Sockets The socket primitives for TCP.](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-7.jpg)
Berkeley Sockets The socket primitives for TCP.
![Socket Programming Example Internet File Server 6 6 1 Client Code Socket Programming Example: Internet File Server 6 -6 -1 Client Code](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-8.jpg)
Socket Programming Example: Internet File Server 6 -6 -1 Client Code
![Socket Programming Example Internet File Server 2 Server Code Socket Programming Example: Internet File Server (2) Server Code](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-9.jpg)
Socket Programming Example: Internet File Server (2) Server Code
![Transport Functions Addressing Connection Establishment Connection Release Flow Control and Buffering Transport Functions • • • Addressing Connection Establishment Connection Release Flow Control and Buffering](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-10.jpg)
Transport Functions • • • Addressing Connection Establishment Connection Release Flow Control and Buffering Multiplexing Crash Recovery
![Transport Protocol a Environment of the data link layer b Environment of the transport Transport Protocol (a) Environment of the data link layer. (b) Environment of the transport](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-11.jpg)
Transport Protocol (a) Environment of the data link layer. (b) Environment of the transport layer.
![Addressing TSAPs NSAPs and transport connections Addressing TSAPs, NSAPs and transport connections.](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-12.jpg)
Addressing TSAPs, NSAPs and transport connections.
![Connection Establishment How a user process in host 1 establishes a connection with a Connection Establishment How a user process in host 1 establishes a connection with a](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-13.jpg)
Connection Establishment How a user process in host 1 establishes a connection with a time-of-day server in host 2.
![Connection Establishment 2 Three protocol scenarios for establishing a connection using a threeway handshake Connection Establishment (2) Three protocol scenarios for establishing a connection using a three-way handshake.](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-14.jpg)
Connection Establishment (2) Three protocol scenarios for establishing a connection using a three-way handshake. CR denotes CONNECTION REQUEST. (a) Normal operation, (b) Old CONNECTION REQUEST appearing out of nowhere. (c) Duplicate CONNECTION REQUEST and duplicate ACK.
![Connection Release Abrupt disconnection with loss of data Connection Release Abrupt disconnection with loss of data.](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-15.jpg)
Connection Release Abrupt disconnection with loss of data.
![Connection Release 2 6 14 a b Four protocol scenarios for releasing a connection Connection Release (2) 6 -14, a, b Four protocol scenarios for releasing a connection.](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-16.jpg)
Connection Release (2) 6 -14, a, b Four protocol scenarios for releasing a connection. (a) Normal case of a three-way handshake. (b) final ACK lost.
![Connection Release 3 6 14 c d c Response lost d Response lost and Connection Release (3) 6 -14, c, d (c) Response lost. (d) Response lost and](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-17.jpg)
Connection Release (3) 6 -14, c, d (c) Response lost. (d) Response lost and subsequent DRs lost.
![Flow Control and Buffering a Chained fixedsize buffers b Chained variablesized buffers c One Flow Control and Buffering (a) Chained fixed-size buffers. (b) Chained variable-sized buffers. (c) One](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-18.jpg)
Flow Control and Buffering (a) Chained fixed-size buffers. (b) Chained variable-sized buffers. (c) One large circular buffer per connection.
![Flow Control and Buffering 2 Dynamic buffer allocation The arrows show the direction of Flow Control and Buffering (2) Dynamic buffer allocation. The arrows show the direction of](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-19.jpg)
Flow Control and Buffering (2) Dynamic buffer allocation. The arrows show the direction of transmission. An ellipsis (…) indicates a lost TPDU.
![Multiplexing a Upward multiplexing b Downward multiplexing Multiplexing (a) Upward multiplexing. (b) Downward multiplexing.](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-20.jpg)
Multiplexing (a) Upward multiplexing. (b) Downward multiplexing.
![Crash Recovery Different combinations of client and server strategy Crash Recovery Different combinations of client and server strategy.](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-21.jpg)
Crash Recovery Different combinations of client and server strategy.
![Position of UDP in the TCPIP protocol suite Position of UDP in the TCP/IP protocol suite](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-22.jpg)
Position of UDP in the TCP/IP protocol suite
![UDP versus IP UDP versus IP](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-23.jpg)
UDP versus IP
![Port numbers Port numbers](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-24.jpg)
Port numbers
![IP addresses versus port numbers IP addresses versus port numbers](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-25.jpg)
IP addresses versus port numbers
![ICANN ranges ICANN ranges](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-26.jpg)
ICANN ranges
![Wellknown ports used with UDP Well-known ports used with UDP](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-27.jpg)
Well-known ports used with UDP
![Socket address Socket address](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-28.jpg)
Socket address
![UDP Header The UDP header UDP Header The UDP header.](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-29.jpg)
UDP Header The UDP header.
![Pseudoheader for checksum calculation Pseudoheader for checksum calculation](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-30.jpg)
Pseudoheader for checksum calculation
![UDP design UDP design](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-31.jpg)
UDP design
![The controlblock table The control-block table](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-32.jpg)
The control-block table
![RealTime Protocol RTP RTP to transport audio and video data RFC 1889 Real-Time Protocol (RTP) § RTP: to transport audio and video data § RFC 1889](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-33.jpg)
Real-Time Protocol (RTP) § RTP: to transport audio and video data § RFC 1889 § RTP packet provides – payload type identification – packet sequence numbering – timestamp § RTP runs in the end systems § RTP packets are encapsulated in UDP segments § Interoperability: If two Internet phone applications run RTP, then they may be able to work together
![RTP runs on top of UDP RTP libraries provide a transportlayer interface that extend RTP runs on top of UDP RTP libraries provide a transport-layer interface that extend](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-34.jpg)
RTP runs on top of UDP RTP libraries provide a transport-layer interface that extend UDP: • port numbers, IP addresses • payload type identification • packet sequence numbering • timestamp
![RTP over OS a The position of RTP in the protocol stack b Packet RTP over OS (a) The position of RTP in the protocol stack. (b) Packet](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-35.jpg)
RTP over OS (a) The position of RTP in the protocol stack. (b) Packet nesting.
![RTP Header The RTP header RTP Header The RTP header.](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-36.jpg)
RTP Header The RTP header.
![Payload Type 7 bits Payload Type (7 bits)](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-37.jpg)
Payload Type (7 bits)
![RTP Header Format Sequence Number 16 bits Increments by one for each RTP RTP Header Format § Sequence Number (16 bits): Increments by one for each RTP](https://slidetodoc.com/presentation_image_h/a38a34edabb047e8bba1e85c280535fb/image-38.jpg)
RTP Header Format § Sequence Number (16 bits): Increments by one for each RTP packet sent, and may be used to detect packet loss and to restore packet sequence. § Timestamp field (32 bits): Reflects the sampling instant of the first byte in the RTP data packet. – For audio, timestamp clock typically increments by one for each sampling period (for example, each 125 usecs for a 8 KHz sampling clock) – if application generates chunks of 160 encoded samples, then timestamp increases by 160 for each RTP packet when source is active. Timestamp clock continues to increase at constant rate when source is inactive. § SSRC field (32 bits): Identifies the source of the RTP stream. Each stream in a RTP session should have a distinct SSRC.
Secure socket layer and transport layer security
Secure socket layer and transport layer security
Secure socket layer and transport layer security
Secure socket layer and transport layer security
Chapter 3 transport layer
Pigmented layer and neural layer
Git layers
Presentation layer functions
Layer 2 e layer 3
Layer-by-layer assembly
Layer 2 vs layer 3 bitstream
Transport layer handles multiplexing and demultiplexing
Atamont fair
Principles of reliable data transfer in transport layer
Crash recovery in transport layer geeksforgeeks
Upward multiplexing
Wireless transport layer security
Tcp reliable data transfer
Reliable data transfer in transport layer
Multiplexing and demultiplexing in transport layer
Dns transport layer protocol
Transport layer
Mobile transport layer
Transport layer
Tcp connection management finite state machine
Transport layer
Carsten griwodz
Transport layer
Iup handshake
Design goals of transport layer protocol
Multiplexed transport layer security
Transport layer
Transport layer ppt
Transport layer.
Maximum segment size
Peran transport layer
Selective repeat dilemma
Service mesh
Primary vs secondary active transport