Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

29 Design Issues, Process To Process Delivery, User Datagram Protocol R1 703-715

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 27

Design issues, Process to Process delivery, User Datagram

29 R1 703-715
Protocol

30 TCP, TCP services, TCP features R1 715-720

31 Segment, TCP connection   721-726


Transport Layer

32 flow/error /congestion control R1 726-735

33 Data traffic, congestion, congestion control R1 761-767

Congestion control in TCP, Quality of services, technique to improve


34 R1 769-780
QOS
III

35 remote procedure call, Data Compression Technique R3 526-529


Session Layer,
Presentation Layer
36 Cryptography R1 931-950

37 Domain Name System, HTTP R1 797-811,851-868

38 Application Layer Electronic Mail R1 824-839

39 File Transfer R1 840-844

40 Network Management System R1 873-877

23.1
General Properties of Transport Layer

 End to End connection


 Flow Control(SR)
 Error Control
 Segmentation
 Multiplexing
 Congestion Control

23.2
23-1 PROCESS-TO-PROCESS DELIVERY

The transport layer is responsible for process-to-


process delivery—the delivery of a packet, part of a
message, from one process to another. Two processes
communicate in a client/server relationship, as we will
see later.

23.3
Note

The transport layer is responsible for


process-to-process delivery.

23.4
Figure 23.1 Types of data deliveries

23.5
Figure 23.2 Port numbers

23.6
Figure 23.3 IP addresses versus port numbers

23.7
Figure 23.4 IANA ranges

23.8
Figure 23.5 Socket address

23.9
Figure 23.6 Multiplexing and demultiplexing

23.10
23.11
23.12
23.13
Figure 23.7 Error control

23.14
23-2 USER DATAGRAM PROTOCOL (UDP)

The User Datagram Protocol (UDP) is called a


connectionless, unreliable transport protocol. It does
not add anything to the services of IP except to provide
process-to-process communication instead of host-to-
host communication.
Topics discussed in this section:
Well-Known Ports for UDP
User Datagram
Checksum
UDP Operation
Use of UDP
23.15
Table 23.1 Well-known ports used with UDP

23.16
Figure 23.9 User datagram format

23.17
23.18
23.19
Note

UDP length
= IP length – IP header’s length

23.20
Figure 23.10 Pseudoheader for checksum calculation

23.21
Example 23.2

Figure 23.11 shows the checksum calculation for a very


small user datagram with only 7 bytes of data. Because
the number of bytes of data is odd, padding is added for
checksum calculation. The pseudoheader as well as the
padding will be dropped when the user datagram is
delivered to IP.

23.22
Figure 23.11 Checksum calculation of a simple UDP user datagram

23.23
23.24
23.25
Figure 23.12 Queues in UDP

23.26
23.27

You might also like