SlideShare a Scribd company logo
Transport-Layer Protocols
Dr.T.Abirami, Associate Professor, Department of IT , Kongu
Engineering College
USER DATAGRAM PROTOCOL
• The User Datagram Protocol (UDP) is a connectionless,
unreliable transport protocol.
• It does not add anything to the services of IP except for
providing process-to-process communication instead of host-to-
host communication.
• UDP is powerless
• UDP packets, called user datagrams,
Dr.T.Abirami, Associate Professor, Department of IT , Kongu
Engineering College
Why would a process want to use it?
• UDP is a very simple protocol using a minimum of overhead.
• If a process wants to send a small message and does not care
much about reliability, it can use UDP.
• Sending a small message using UDP takes much less
interaction between the sender and receiver than using TCP.
Dr.T.Abirami, Associate Professor, Department of IT , Kongu
Engineering College
User Datagram
• Use fixed-size header of 8 bytes made of four fields, each of 2 bytes
(16 bits).
Dr.T.Abirami, Associate Professor, Department of IT , Kongu
Engineering College
The following is the content of a UDP header in
hexadecimal format.
CB84000D001C001C
a. What is the source port number?
b. What is the destination port number?
c. What is the total length of the user datagram?
d. What is the length of the data?
e. Is the packet directed from a client to a server or vice versa?
f. What is the client process?
Dr.T.Abirami, Associate Professor, Department of IT , Kongu
Engineering College
Solution
a. The source port number is the first four hexadecimal digits (CB84)16, which means
that the source port number is 52100.
b. The destination port number is the second four hexadecimal digits (000D)16, which
means that the destination port number is 13.
c. The third four hexadecimal digits (001C)16 define the length of the whole UDP
packet as 28 bytes.
d. The length of the data is the length of the whole packet minus the length of the
header, or 28 − 8 = 20 bytes.
e. Since the destination port number is 13 (well-known port), the packet is from the
client to the server.
f. The client process is the Daytime.
Dr.T.Abirami, Associate Professor, Department of IT , Kongu
Engineering College
Hexadecimal Decimal
0 0
1 1
2 2
3 3
4 4
5 5
6 6
7 7
8 8
9 9
A 10
B 11
C 12
D 13
E 14
F 15
Hex to Decimal Formula
C = 12
B = 11
8 = 8
4 = 4
(CB84)16 = (12 x 163 + 11 × 162 + 8× 161 + 4 ×
160 )
= (52100)10
Dr.T.Abirami, Associate Professor, Department of IT , Kongu
Engineering College
Dr.T.Abirami, Associate Professor, Department of IT , Kongu
Engineering College
UDP Services
• UDP provides process-to-process communication using socket
addresses, a combination of IP addresses and port numbers
• UDP provides a connectionless service
• UDP is a very simple protocol. There is no flow control
• There is no error control mechanism in UDP except for the checksum
• UDP is used for interactive real-time transfer of audio and video.
• UDP protocol encapsulates and decapsulates messages.
• UDP, queues are associated with ports
• UDP multiplexes and demultiplexes.
Dr.T.Abirami, Associate Professor, Department of IT , Kongu
Engineering College
UDP Applications
• UDP is suitable for a process that requires simple request-response
communication with little concern for flow and error control. It is not usually
used for a process such as FTP that needs to send bulk data
• UDP is suitable for a process with internal flow- and error-control
mechanisms.
• For example, the Trivial File Transfer Protocol (TFTP) process includes flow
and error control. It can easily use UDP.
• UDP is a suitable transport protocol for multicasting. Multicasting capability
is embedded in the UDP software but not in the TCP software.
• UDP is used for management processes such as SNMP .
• UDP is used for some route updating protocols such as Routing Information
Protocol (RIP).
• UDP is normally used for interactive real-time applications that cannot
tolerate uneven delay between sections of a received message
Dr.T.Abirami, Associate Professor, Department of IT , Kongu
Engineering College
TRANSMISSION CONTROL PROTOCOL
• It is a connection-oriented, reliable protocol.
• TCP explicitly defines connection establishment, data transfer, and
connection teardown phases to provide a connection-oriented
service. TCP uses a combination of
• GBN and SR protocols to provide reliability
• TCP uses checksum (for error detection), retransmission of lost or
corrupted packets, cumulative and selective acknowledgments, and
timers.
• TCP is the most common transport-layer protocol in the Internet
Dr.T.Abirami, Associate Professor, Department of IT , Kongu
Engineering College
TRANSMISSION CONTROL PROTOCOL
• TCP provides Full Duplex service, i.e., the data flow in both the
directions at the same time.
• To achieve Full Duplex service, each TCP should have sending and
receiving buffers so that the segments can flow in both the directions.
• Establish a connection between two TCPs.
• Data is exchanged in both the directions.
• The Connection is terminated.
Dr.T.Abirami, Associate Professor, Department of IT , Kongu
Engineering College
TCP Services
• TCP provides process-to-process communication using port numbers
• It allows the sending process to deliver data as a stream of bytes and
allows the receiving process to obtain data as a stream of bytes
Dr.T.Abirami, Associate Professor, Department of IT , Kongu
Engineering College
Segments
• TCP groups a number of bytes together into a packet called a segment.
• TCP adds a header to each segment (for control purposes) and delivers
the segment to the network layer for transmission.
• The segments are encapsulated in an IP datagram and transmitted.
• segments are not necessarily all the same size
Dr.T.Abirami, Associate Professor, Department of IT , Kongu
Engineering College
TCP Services
• TCP performs multiplexing at the sender and demultiplexing at the
receiver
• TCP is a reliable transport protocol. It uses an acknowledgment
mechanism to check the safe and sound arrival of data.
Dr.T.Abirami, Associate Professor, Department of IT , Kongu
Engineering College
TCP Features
• Numbering System
• TCP numbers all data bytes (octets) that are transmitted in a connection.
Numbering is independent in each direction.
• Acknowledgment Number
Dr.T.Abirami, Associate Professor, Department of IT , Kongu
Engineering College
Dr.T.Abirami, Associate Professor, Department of IT , Kongu
Engineering College
total six types of flags in control field:
•URG: indicates that the data in a segment is urgent.
•ACK: it validates the acknowledgement number.
•PSH: used to inform the sender that higher throughput is needed so if possible,
data must be pushed with higher throughput.
•RST: used to reset the TCP connection when there is any confusion occurs in
the sequence numbers.
•SYN: used to synchronize the sequence numbers in three types of segments:
connection request, connection confirmation ( with the ACK bit set ), and
confirmation acknowledgement.
•FIN: used to inform the receiving TCP module that the sender has finished sending
data. It is used in connection termination in three types of segments: termination
request, termination confirmation, and acknowledgement of termination confirmation.
• Window Size: The window is a 16-bit field that defines the size of the window.
• Checksum: The checksum is a 16-bit field used in error detection.
• Urgent pointer: is set to 1, then this 16-bit field is an offset from the sequence
number indicating that it is a last urgent data byte.
• Options and padding: convey the additional information to the receiver.
Dr.T.Abirami, Associate Professor, Department of IT , Kongu
Engineering College
A TCP Connection
Connection Establishment /three-way handshaking
The client sends the
first segment, SYN
segment
The server sends the
second segment, a
SYN + ACK segment
The client sends the
third segment. just
an ACK segment
Dr.T.Abirami, Associate Professor, Department of IT , Kongu
Engineering College
Data
Transfer
Dr.T.Abirami, Associate Professor, Department of IT , Kongu
Engineering College
Connection
Termination
The FIN segment
consumes one
sequence number if it
does not carry data.
Three-Way
Handshaking
Dr.T.Abirami, Associate Professor, Department of IT , Kongu
Engineering College
Basis for
Comparison
TCP UDP
Definition TCP establishes a virtual circuit
before transmitting the data.
UDP transmits the data directly
to the destination computer
without verifying whether the
receiver is ready to receive or
not.
Connection Type It is a Connection-Oriented
protocol
It is a Connectionless protocol
Speed slow high
Reliability It is a reliable protocol. It is an unreliable protocol.
Header size 20 bytes 8 bytes
acknowledgement It waits for the
acknowledgement of data and
has the ability to resend the lost
packets.
It neither takes the
acknowledgement, nor it
retransmits the damaged frame.
Dr.T.Abirami, Associate Professor, Department of IT , Kongu
Engineering College
Ad

More Related Content

What's hot (20)

TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
Kruti Niranjan
 
Network Layer
Network LayerNetwork Layer
Network Layer
Dr Shashikant Athawale
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
Ramola Dhande
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
k33a
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
N.Jagadish Kumar
 
Congestion control
Congestion controlCongestion control
Congestion control
Aman Jaiswal
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
Shivani Godha
 
switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networking
Harshita Yadav
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
Naiyan Noor
 
Data link control
Data link controlData link control
Data link control
Iffat Anjum
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
VijayaLakshmi514
 
Transport layer
Transport layerTransport layer
Transport layer
Sri Manakula Vinayagar Engineering College
 
Computer Networks: Quality of service
Computer Networks: Quality of serviceComputer Networks: Quality of service
Computer Networks: Quality of service
Kongu Engineering College, Perundurai, Erode
 
Introduction to switching & circuit switching
Introduction to switching & circuit switchingIntroduction to switching & circuit switching
Introduction to switching & circuit switching
Dr Rajiv Srivastava
 
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
Elambaruthi Elambaruthi
 
QOS (Quality of Services) - Computer Networks
 QOS (Quality of Services) - Computer Networks QOS (Quality of Services) - Computer Networks
QOS (Quality of Services) - Computer Networks
IIIT Manipur
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
Merlin Florrence
 
Mobile Transport layer
Mobile Transport layerMobile Transport layer
Mobile Transport layer
Pallepati Vasavi
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
Renu Kewalramani
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link control
Vishal kakade
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
Kruti Niranjan
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
Ramola Dhande
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
k33a
 
Congestion control
Congestion controlCongestion control
Congestion control
Aman Jaiswal
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
Shivani Godha
 
switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networking
Harshita Yadav
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
Naiyan Noor
 
Data link control
Data link controlData link control
Data link control
Iffat Anjum
 
Introduction to switching & circuit switching
Introduction to switching & circuit switchingIntroduction to switching & circuit switching
Introduction to switching & circuit switching
Dr Rajiv Srivastava
 
QOS (Quality of Services) - Computer Networks
 QOS (Quality of Services) - Computer Networks QOS (Quality of Services) - Computer Networks
QOS (Quality of Services) - Computer Networks
IIIT Manipur
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
Renu Kewalramani
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link control
Vishal kakade
 

Similar to Transport layer protocols : TCP and UDP (20)

Transport layer services
Transport layer servicesTransport layer services
Transport layer services
Melvin Cabatuan
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
Kongu Engineering College, Perundurai, Erode
 
Computer networks transport layer
Computer networks  transport layerComputer networks  transport layer
Computer networks transport layer
jamunaashok
 
Unit 6 NAHI aa rha hai na ki koi baat nhi hai
Unit 6 NAHI aa rha hai na ki koi baat nhi haiUnit 6 NAHI aa rha hai na ki koi baat nhi hai
Unit 6 NAHI aa rha hai na ki koi baat nhi hai
swapnilyadav3165
 
LECTURE-Transport-Layer_lec.ppt
LECTURE-Transport-Layer_lec.pptLECTURE-Transport-Layer_lec.ppt
LECTURE-Transport-Layer_lec.ppt
MonirHossain707319
 
CN Unit 4 - cs8591.pptx
CN Unit 4 - cs8591.pptxCN Unit 4 - cs8591.pptx
CN Unit 4 - cs8591.pptx
shamkevin
 
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & AnomaliesREMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
Rhydham Joshi
 
Unit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptxUnit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptx
DESTROYER39
 
Unit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptxUnit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptx
sarosh32
 
Mobile computing unit-5
Mobile computing unit-5Mobile computing unit-5
Mobile computing unit-5
Ramesh Babu
 
TCP and UDP comparison and itsi application.pptx
TCP and UDP comparison and itsi application.pptxTCP and UDP comparison and itsi application.pptx
TCP and UDP comparison and itsi application.pptx
Mugabo4
 
Unit 5.Transport Layer.pptx
Unit 5.Transport Layer.pptxUnit 5.Transport Layer.pptx
Unit 5.Transport Layer.pptx
1136NayanSonawane
 
TCP Vs UDP
TCP Vs UDP TCP Vs UDP
TCP Vs UDP
Ahmed Elnaggar
 
Chapter 3 - Transport Layer for VN Students
Chapter 3 - Transport Layer for VN StudentsChapter 3 - Transport Layer for VN Students
Chapter 3 - Transport Layer for VN Students
alberttochiro
 
2-CN_UDP_TCP_f7a922763a77c5ea2bc334f8e36c71f8.ppt
2-CN_UDP_TCP_f7a922763a77c5ea2bc334f8e36c71f8.ppt2-CN_UDP_TCP_f7a922763a77c5ea2bc334f8e36c71f8.ppt
2-CN_UDP_TCP_f7a922763a77c5ea2bc334f8e36c71f8.ppt
vihashni2310922
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdf
mashiur
 
Understand Transmission Control Protocol
Understand Transmission Control ProtocolUnderstand Transmission Control Protocol
Understand Transmission Control Protocol
UmangManandhar1
 
TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP Protocols
Danial Mirza
 
Unit 4.pptxenhdgjkslkxnjhjijnbhndnernjdxcndf
Unit 4.pptxenhdgjkslkxnjhjijnbhndnernjdxcndfUnit 4.pptxenhdgjkslkxnjhjijnbhndnernjdxcndf
Unit 4.pptxenhdgjkslkxnjhjijnbhndnernjdxcndf
KeerthanaS217434
 
User Datagram Protocol
User Datagram ProtocolUser Datagram Protocol
User Datagram Protocol
Purushottam Kamble
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
Melvin Cabatuan
 
Computer networks transport layer
Computer networks  transport layerComputer networks  transport layer
Computer networks transport layer
jamunaashok
 
Unit 6 NAHI aa rha hai na ki koi baat nhi hai
Unit 6 NAHI aa rha hai na ki koi baat nhi haiUnit 6 NAHI aa rha hai na ki koi baat nhi hai
Unit 6 NAHI aa rha hai na ki koi baat nhi hai
swapnilyadav3165
 
LECTURE-Transport-Layer_lec.ppt
LECTURE-Transport-Layer_lec.pptLECTURE-Transport-Layer_lec.ppt
LECTURE-Transport-Layer_lec.ppt
MonirHossain707319
 
CN Unit 4 - cs8591.pptx
CN Unit 4 - cs8591.pptxCN Unit 4 - cs8591.pptx
CN Unit 4 - cs8591.pptx
shamkevin
 
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & AnomaliesREMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
Rhydham Joshi
 
Unit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptxUnit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptx
DESTROYER39
 
Unit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptxUnit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptx
sarosh32
 
Mobile computing unit-5
Mobile computing unit-5Mobile computing unit-5
Mobile computing unit-5
Ramesh Babu
 
TCP and UDP comparison and itsi application.pptx
TCP and UDP comparison and itsi application.pptxTCP and UDP comparison and itsi application.pptx
TCP and UDP comparison and itsi application.pptx
Mugabo4
 
Chapter 3 - Transport Layer for VN Students
Chapter 3 - Transport Layer for VN StudentsChapter 3 - Transport Layer for VN Students
Chapter 3 - Transport Layer for VN Students
alberttochiro
 
2-CN_UDP_TCP_f7a922763a77c5ea2bc334f8e36c71f8.ppt
2-CN_UDP_TCP_f7a922763a77c5ea2bc334f8e36c71f8.ppt2-CN_UDP_TCP_f7a922763a77c5ea2bc334f8e36c71f8.ppt
2-CN_UDP_TCP_f7a922763a77c5ea2bc334f8e36c71f8.ppt
vihashni2310922
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdf
mashiur
 
Understand Transmission Control Protocol
Understand Transmission Control ProtocolUnderstand Transmission Control Protocol
Understand Transmission Control Protocol
UmangManandhar1
 
Unit 4.pptxenhdgjkslkxnjhjijnbhndnernjdxcndf
Unit 4.pptxenhdgjkslkxnjhjijnbhndnernjdxcndfUnit 4.pptxenhdgjkslkxnjhjijnbhndnernjdxcndf
Unit 4.pptxenhdgjkslkxnjhjijnbhndnernjdxcndf
KeerthanaS217434
 
Ad

More from Kongu Engineering College, Perundurai, Erode (20)

Introduction to Generative AI refers to a subset of artificial intelligence
Introduction to Generative AI refers to a subset of artificial intelligenceIntroduction to Generative AI refers to a subset of artificial intelligence
Introduction to Generative AI refers to a subset of artificial intelligence
Kongu Engineering College, Perundurai, Erode
 
Introduction to Microsoft Power BI is a business analytics service
Introduction to Microsoft Power BI is a business analytics serviceIntroduction to Microsoft Power BI is a business analytics service
Introduction to Microsoft Power BI is a business analytics service
Kongu Engineering College, Perundurai, Erode
 
Connect to NoSQL Database (MongoDB) using Node JS & Connect Node.js with NoSQ...
Connect to NoSQL Database (MongoDB) using Node JS & Connect Node.js with NoSQ...Connect to NoSQL Database (MongoDB) using Node JS & Connect Node.js with NoSQ...
Connect to NoSQL Database (MongoDB) using Node JS & Connect Node.js with NoSQ...
Kongu Engineering College, Perundurai, Erode
 
concept of server-side JavaScript / JS Framework: NODEJS
concept of server-side JavaScript / JS Framework: NODEJSconcept of server-side JavaScript / JS Framework: NODEJS
concept of server-side JavaScript / JS Framework: NODEJS
Kongu Engineering College, Perundurai, Erode
 
Node.js web-based Example :Run a local server in order to start using node.js...
Node.js web-based Example :Run a local server in order to start using node.js...Node.js web-based Example :Run a local server in order to start using node.js...
Node.js web-based Example :Run a local server in order to start using node.js...
Kongu Engineering College, Perundurai, Erode
 
Concepts of Satellite Communication and types and its applications
Concepts of Satellite Communication  and types and its applicationsConcepts of Satellite Communication  and types and its applications
Concepts of Satellite Communication and types and its applications
Kongu Engineering College, Perundurai, Erode
 
Concepts of Mobile Communication Wireless LANs, Bluetooth , HiperLAN
Concepts of Mobile Communication Wireless LANs, Bluetooth , HiperLANConcepts of Mobile Communication Wireless LANs, Bluetooth , HiperLAN
Concepts of Mobile Communication Wireless LANs, Bluetooth , HiperLAN
Kongu Engineering College, Perundurai, Erode
 
Web Technology Introduction framework.pptx
Web Technology Introduction framework.pptxWeb Technology Introduction framework.pptx
Web Technology Introduction framework.pptx
Kongu Engineering College, Perundurai, Erode
 
Computer Network - Unicast Routing Distance vector Link state vector
Computer Network - Unicast Routing Distance vector Link state vectorComputer Network - Unicast Routing Distance vector Link state vector
Computer Network - Unicast Routing Distance vector Link state vector
Kongu Engineering College, Perundurai, Erode
 
Android SQLite database oriented application development
Android SQLite database oriented application developmentAndroid SQLite database oriented application development
Android SQLite database oriented application development
Kongu Engineering College, Perundurai, Erode
 
Android Application Development Programming
Android Application Development ProgrammingAndroid Application Development Programming
Android Application Development Programming
Kongu Engineering College, Perundurai, Erode
 
Introduction to Spring & Spring BootFramework
Introduction to Spring  & Spring BootFrameworkIntroduction to Spring  & Spring BootFramework
Introduction to Spring & Spring BootFramework
Kongu Engineering College, Perundurai, Erode
 
A REST API (also called a RESTful API or RESTful web API) is an application p...
A REST API (also called a RESTful API or RESTful web API) is an application p...A REST API (also called a RESTful API or RESTful web API) is an application p...
A REST API (also called a RESTful API or RESTful web API) is an application p...
Kongu Engineering College, Perundurai, Erode
 
SOA and Monolith Architecture - Micro Services.pptx
SOA and Monolith Architecture - Micro Services.pptxSOA and Monolith Architecture - Micro Services.pptx
SOA and Monolith Architecture - Micro Services.pptx
Kongu Engineering College, Perundurai, Erode
 
Application Layer.pptx
Application Layer.pptxApplication Layer.pptx
Application Layer.pptx
Kongu Engineering College, Perundurai, Erode
 
Connect to NoSQL Database using Node JS.pptx
Connect to NoSQL Database using Node JS.pptxConnect to NoSQL Database using Node JS.pptx
Connect to NoSQL Database using Node JS.pptx
Kongu Engineering College, Perundurai, Erode
 
Node_basics.pptx
Node_basics.pptxNode_basics.pptx
Node_basics.pptx
Kongu Engineering College, Perundurai, Erode
 
Navigation Bar.pptx
Navigation Bar.pptxNavigation Bar.pptx
Navigation Bar.pptx
Kongu Engineering College, Perundurai, Erode
 
Bootstarp installation.pptx
Bootstarp installation.pptxBootstarp installation.pptx
Bootstarp installation.pptx
Kongu Engineering College, Perundurai, Erode
 
nested_Object as Parameter & Recursion_Later_commamd.pptx
nested_Object as Parameter  & Recursion_Later_commamd.pptxnested_Object as Parameter  & Recursion_Later_commamd.pptx
nested_Object as Parameter & Recursion_Later_commamd.pptx
Kongu Engineering College, Perundurai, Erode
 
Ad

Recently uploaded (20)

vtc2018fall_otfs_tutorial_presentation_1.pdf
vtc2018fall_otfs_tutorial_presentation_1.pdfvtc2018fall_otfs_tutorial_presentation_1.pdf
vtc2018fall_otfs_tutorial_presentation_1.pdf
RaghavaGD1
 
AI Chatbots & Software Development Teams
AI Chatbots & Software Development TeamsAI Chatbots & Software Development Teams
AI Chatbots & Software Development Teams
Joe Krall
 
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software ApplicationsJacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia
 
Deepfake Phishing: A New Frontier in Cyber Threats
Deepfake Phishing: A New Frontier in Cyber ThreatsDeepfake Phishing: A New Frontier in Cyber Threats
Deepfake Phishing: A New Frontier in Cyber Threats
RaviKumar256934
 
Physical and Physic-Chemical Based Optimization Methods: A Review
Physical and Physic-Chemical Based Optimization Methods: A ReviewPhysical and Physic-Chemical Based Optimization Methods: A Review
Physical and Physic-Chemical Based Optimization Methods: A Review
Journal of Soft Computing in Civil Engineering
 
Machine foundation notes for civil engineering students
Machine foundation notes for civil engineering studentsMachine foundation notes for civil engineering students
Machine foundation notes for civil engineering students
DYPCET
 
Working with USDOT UTCs: From Conception to Implementation
Working with USDOT UTCs: From Conception to ImplementationWorking with USDOT UTCs: From Conception to Implementation
Working with USDOT UTCs: From Conception to Implementation
Alabama Transportation Assistance Program
 
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
PawachMetharattanara
 
Frontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend EngineersFrontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend Engineers
Michael Hertzberg
 
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink DisplayHow to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
CircuitDigest
 
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdfLittle Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
gori42199
 
Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control Monthly May 2025Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control
 
Modeling the Influence of Environmental Factors on Concrete Evaporation Rate
Modeling the Influence of Environmental Factors on Concrete Evaporation RateModeling the Influence of Environmental Factors on Concrete Evaporation Rate
Modeling the Influence of Environmental Factors on Concrete Evaporation Rate
Journal of Soft Computing in Civil Engineering
 
Applications of Centroid in Structural Engineering
Applications of Centroid in Structural EngineeringApplications of Centroid in Structural Engineering
Applications of Centroid in Structural Engineering
suvrojyotihalder2006
 
Automatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and BeyondAutomatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and Beyond
NU_I_TODALAB
 
Slide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptxSlide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptx
vvsasane
 
Construction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil EngineeringConstruction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil Engineering
Lavish Kashyap
 
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdfML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
rameshwarchintamani
 
acid base ppt and their specific application in food
acid base ppt and their specific application in foodacid base ppt and their specific application in food
acid base ppt and their specific application in food
Fatehatun Noor
 
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
Guru Nanak Technical Institutions
 
vtc2018fall_otfs_tutorial_presentation_1.pdf
vtc2018fall_otfs_tutorial_presentation_1.pdfvtc2018fall_otfs_tutorial_presentation_1.pdf
vtc2018fall_otfs_tutorial_presentation_1.pdf
RaghavaGD1
 
AI Chatbots & Software Development Teams
AI Chatbots & Software Development TeamsAI Chatbots & Software Development Teams
AI Chatbots & Software Development Teams
Joe Krall
 
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software ApplicationsJacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia
 
Deepfake Phishing: A New Frontier in Cyber Threats
Deepfake Phishing: A New Frontier in Cyber ThreatsDeepfake Phishing: A New Frontier in Cyber Threats
Deepfake Phishing: A New Frontier in Cyber Threats
RaviKumar256934
 
Machine foundation notes for civil engineering students
Machine foundation notes for civil engineering studentsMachine foundation notes for civil engineering students
Machine foundation notes for civil engineering students
DYPCET
 
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
PawachMetharattanara
 
Frontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend EngineersFrontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend Engineers
Michael Hertzberg
 
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink DisplayHow to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
CircuitDigest
 
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdfLittle Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
gori42199
 
Applications of Centroid in Structural Engineering
Applications of Centroid in Structural EngineeringApplications of Centroid in Structural Engineering
Applications of Centroid in Structural Engineering
suvrojyotihalder2006
 
Automatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and BeyondAutomatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and Beyond
NU_I_TODALAB
 
Slide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptxSlide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptx
vvsasane
 
Construction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil EngineeringConstruction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil Engineering
Lavish Kashyap
 
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdfML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
rameshwarchintamani
 
acid base ppt and their specific application in food
acid base ppt and their specific application in foodacid base ppt and their specific application in food
acid base ppt and their specific application in food
Fatehatun Noor
 

Transport layer protocols : TCP and UDP

  • 1. Transport-Layer Protocols Dr.T.Abirami, Associate Professor, Department of IT , Kongu Engineering College
  • 2. USER DATAGRAM PROTOCOL • The User Datagram Protocol (UDP) is a connectionless, unreliable transport protocol. • It does not add anything to the services of IP except for providing process-to-process communication instead of host-to- host communication. • UDP is powerless • UDP packets, called user datagrams, Dr.T.Abirami, Associate Professor, Department of IT , Kongu Engineering College
  • 3. Why would a process want to use it? • UDP is a very simple protocol using a minimum of overhead. • If a process wants to send a small message and does not care much about reliability, it can use UDP. • Sending a small message using UDP takes much less interaction between the sender and receiver than using TCP. Dr.T.Abirami, Associate Professor, Department of IT , Kongu Engineering College
  • 4. User Datagram • Use fixed-size header of 8 bytes made of four fields, each of 2 bytes (16 bits). Dr.T.Abirami, Associate Professor, Department of IT , Kongu Engineering College
  • 5. The following is the content of a UDP header in hexadecimal format. CB84000D001C001C a. What is the source port number? b. What is the destination port number? c. What is the total length of the user datagram? d. What is the length of the data? e. Is the packet directed from a client to a server or vice versa? f. What is the client process? Dr.T.Abirami, Associate Professor, Department of IT , Kongu Engineering College
  • 6. Solution a. The source port number is the first four hexadecimal digits (CB84)16, which means that the source port number is 52100. b. The destination port number is the second four hexadecimal digits (000D)16, which means that the destination port number is 13. c. The third four hexadecimal digits (001C)16 define the length of the whole UDP packet as 28 bytes. d. The length of the data is the length of the whole packet minus the length of the header, or 28 − 8 = 20 bytes. e. Since the destination port number is 13 (well-known port), the packet is from the client to the server. f. The client process is the Daytime. Dr.T.Abirami, Associate Professor, Department of IT , Kongu Engineering College
  • 7. Hexadecimal Decimal 0 0 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 A 10 B 11 C 12 D 13 E 14 F 15 Hex to Decimal Formula C = 12 B = 11 8 = 8 4 = 4 (CB84)16 = (12 x 163 + 11 × 162 + 8× 161 + 4 × 160 ) = (52100)10 Dr.T.Abirami, Associate Professor, Department of IT , Kongu Engineering College
  • 8. Dr.T.Abirami, Associate Professor, Department of IT , Kongu Engineering College
  • 9. UDP Services • UDP provides process-to-process communication using socket addresses, a combination of IP addresses and port numbers • UDP provides a connectionless service • UDP is a very simple protocol. There is no flow control • There is no error control mechanism in UDP except for the checksum • UDP is used for interactive real-time transfer of audio and video. • UDP protocol encapsulates and decapsulates messages. • UDP, queues are associated with ports • UDP multiplexes and demultiplexes. Dr.T.Abirami, Associate Professor, Department of IT , Kongu Engineering College
  • 10. UDP Applications • UDP is suitable for a process that requires simple request-response communication with little concern for flow and error control. It is not usually used for a process such as FTP that needs to send bulk data • UDP is suitable for a process with internal flow- and error-control mechanisms. • For example, the Trivial File Transfer Protocol (TFTP) process includes flow and error control. It can easily use UDP. • UDP is a suitable transport protocol for multicasting. Multicasting capability is embedded in the UDP software but not in the TCP software. • UDP is used for management processes such as SNMP . • UDP is used for some route updating protocols such as Routing Information Protocol (RIP). • UDP is normally used for interactive real-time applications that cannot tolerate uneven delay between sections of a received message Dr.T.Abirami, Associate Professor, Department of IT , Kongu Engineering College
  • 11. TRANSMISSION CONTROL PROTOCOL • It is a connection-oriented, reliable protocol. • TCP explicitly defines connection establishment, data transfer, and connection teardown phases to provide a connection-oriented service. TCP uses a combination of • GBN and SR protocols to provide reliability • TCP uses checksum (for error detection), retransmission of lost or corrupted packets, cumulative and selective acknowledgments, and timers. • TCP is the most common transport-layer protocol in the Internet Dr.T.Abirami, Associate Professor, Department of IT , Kongu Engineering College
  • 12. TRANSMISSION CONTROL PROTOCOL • TCP provides Full Duplex service, i.e., the data flow in both the directions at the same time. • To achieve Full Duplex service, each TCP should have sending and receiving buffers so that the segments can flow in both the directions. • Establish a connection between two TCPs. • Data is exchanged in both the directions. • The Connection is terminated. Dr.T.Abirami, Associate Professor, Department of IT , Kongu Engineering College
  • 13. TCP Services • TCP provides process-to-process communication using port numbers • It allows the sending process to deliver data as a stream of bytes and allows the receiving process to obtain data as a stream of bytes Dr.T.Abirami, Associate Professor, Department of IT , Kongu Engineering College
  • 14. Segments • TCP groups a number of bytes together into a packet called a segment. • TCP adds a header to each segment (for control purposes) and delivers the segment to the network layer for transmission. • The segments are encapsulated in an IP datagram and transmitted. • segments are not necessarily all the same size Dr.T.Abirami, Associate Professor, Department of IT , Kongu Engineering College
  • 15. TCP Services • TCP performs multiplexing at the sender and demultiplexing at the receiver • TCP is a reliable transport protocol. It uses an acknowledgment mechanism to check the safe and sound arrival of data. Dr.T.Abirami, Associate Professor, Department of IT , Kongu Engineering College
  • 16. TCP Features • Numbering System • TCP numbers all data bytes (octets) that are transmitted in a connection. Numbering is independent in each direction. • Acknowledgment Number Dr.T.Abirami, Associate Professor, Department of IT , Kongu Engineering College
  • 17. Dr.T.Abirami, Associate Professor, Department of IT , Kongu Engineering College
  • 18. total six types of flags in control field: •URG: indicates that the data in a segment is urgent. •ACK: it validates the acknowledgement number. •PSH: used to inform the sender that higher throughput is needed so if possible, data must be pushed with higher throughput. •RST: used to reset the TCP connection when there is any confusion occurs in the sequence numbers. •SYN: used to synchronize the sequence numbers in three types of segments: connection request, connection confirmation ( with the ACK bit set ), and confirmation acknowledgement. •FIN: used to inform the receiving TCP module that the sender has finished sending data. It is used in connection termination in three types of segments: termination request, termination confirmation, and acknowledgement of termination confirmation. • Window Size: The window is a 16-bit field that defines the size of the window. • Checksum: The checksum is a 16-bit field used in error detection. • Urgent pointer: is set to 1, then this 16-bit field is an offset from the sequence number indicating that it is a last urgent data byte. • Options and padding: convey the additional information to the receiver. Dr.T.Abirami, Associate Professor, Department of IT , Kongu Engineering College
  • 19. A TCP Connection Connection Establishment /three-way handshaking The client sends the first segment, SYN segment The server sends the second segment, a SYN + ACK segment The client sends the third segment. just an ACK segment Dr.T.Abirami, Associate Professor, Department of IT , Kongu Engineering College
  • 20. Data Transfer Dr.T.Abirami, Associate Professor, Department of IT , Kongu Engineering College
  • 21. Connection Termination The FIN segment consumes one sequence number if it does not carry data. Three-Way Handshaking Dr.T.Abirami, Associate Professor, Department of IT , Kongu Engineering College
  • 22. Basis for Comparison TCP UDP Definition TCP establishes a virtual circuit before transmitting the data. UDP transmits the data directly to the destination computer without verifying whether the receiver is ready to receive or not. Connection Type It is a Connection-Oriented protocol It is a Connectionless protocol Speed slow high Reliability It is a reliable protocol. It is an unreliable protocol. Header size 20 bytes 8 bytes acknowledgement It waits for the acknowledgement of data and has the ability to resend the lost packets. It neither takes the acknowledgement, nor it retransmits the damaged frame. Dr.T.Abirami, Associate Professor, Department of IT , Kongu Engineering College
  翻译: