1 / 25

Chapter 3

Chapter 3. Transport Layer. O BJECTIVES. Understand the rationale for the existence of the transport layer. Understand the concept of application-to-application delivery. Understand the duties of the transport layer: packetizing, addressing, connection creation, and reliable delivery.

oro
Download Presentation

Chapter 3

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 3 TransportLayer

  2. OBJECTIVES Understand the rationale for the existence of the transport layer. Understand the concept of application-to-application delivery. Understand the duties of the transport layer: packetizing, addressing, connection creation, and reliable delivery. Know which application layer program can use UDP and which can use TCP. Distinguish between the two transport-layer protocols used in the Internet: UDP and TCP. Understand the position of the transport layer in the Internet model. After reading this chapter, the reader should be able to:

  3. 3.1 APPLICATION-TO- APPLICATION DELIVERY

  4. Figure 3-1 Transport layer in the Internet model

  5. Figure 3-2 Application-to-application delivery

  6. 3.2 DUTIES

  7. Figure 3-3 Duties of the transport layer

  8. Figure 3-4 Connection establishment

  9. Figure 3-5 Connection termination

  10. Note: Connection is closely related to reliability: A connectionless protocol cannot be reliable because the relationship between packets provides reliability.

  11. Figure 3-6 Application programs

  12. Note: The addresses of client and server programs are defined at the transport layer. These addresses are local to the computer running the programs. The addresses must be unique locally but not universally.

  13. Figure 3-7 Port numbers

  14. Technical Focus:Range of Port Numbers The port numbers range from 0 to 65535 and are divided into three ranges: Well-known ports: 0 to 1023 Registered ports: 1,024 to 49,151 Temporary ports: 49,152 to 66,535

  15. SMTP: 25 TFTP: 69 HTTP: 80 FTP: 20 and 21 TELNET: 23 Business Focus:Well-Known Ports Some well-known port numbers are shown below:

  16. Note: A client uses a temporary port number; a server uses a well-known port number.

  17. Figure 3-8 Damage control

  18. Note: For reliable service, the transport layer needs to number packets belonging to a connection using sequence numbers.

  19. Note: A reliable transport protocol provides damage control, loss control, order control, and duplicate control even if the underlying networking technology and lower-level protocols are not reliable. This is done through sequence numbers, timers, error detection, and retransmission.

  20. 3.3 INTERNET PROTOCOLS

  21. Figure 3-9 UDP and TCP in the Internet model

  22. Figure 3-10 User datagram

  23. Technical Focus:User Datagram The fields in a user datagram are as follows: Source port number Destination port number Length Checksum

  24. Figure 3-11 Segment

  25. Source port number Destination port number Sequence number Header length Control flags Checksum Option Urgent pointer Technical Focus:Segment The fields in a segment are as follows:

More Related