1 / 26

Intermediate TCP/IP Operations and Flow Control Explained

Learn about TCP synchronization, acknowledgments, flow control mechanisms, and UDP differences in this module overview. Understand the Port Numbering and Communication Protocols used in networking.

derin
Télécharger la présentation

Intermediate TCP/IP Operations and Flow Control Explained

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CCNA 2 v3.1 Module 10Intermediate TCP/IP

  2. Objectives

  3. TCP Operation The transport layer is responsible for the reliable transport of and regulation of data flow from source to destination.

  4. Synchronization or Three-Way Handshake • TCP is connection oriented • Communicating hosts go through a synchronization process to establish a virtual connection. • This synchronization process insures that both sides are ready for data transmission and allows the devices to determine the initial sequence numbers.

  5. Hacker initiates a SYN but spoofs the source IP address. • Target replies to the unreachable IP address and waits for final ACK. • Hackers floods target with false SYN requests tying up its connection resources, preventing it from responding to legitimate connection requests. Denial-of-Service Attacks

  6. TCP Sequence and Acknowledgment Numbers

  7. Positive ACK • Acknowledgement is a common step in the synchronization process which includes sliding windows and data sequencing.

  8. Sequence and ACK numbers • Each TCP segment is numbered before transmission so that the receiver will be able to properly reassemble the bytes _____________________. • They also identify missing data pieces so the sender can ____________ them. • Only the _________________ need to be re-transmitted. in their original order retransmit missing segments PositiveAcknowledgement and Retransmission TCP utilizes PAR to control data flow and confirm data delivery. • Source sends packet, starts timer, and waits for _____. • If timer expires before source receives ACK,source __________________ and ______________. ACK retransmits packet re-starts timer

  9. Acknowledgements

  10. Flow Control Flow control is usedto control the data flow between the connection. If for any reason one of the two hosts are unable to keep up with the data transfer, it is able to send special signals to the other end, asking it to either stop or slow down so it can keep up. Windowing is the number of data segments the transmitting machine is allowed to send without receiving an acknowledgment for them

  11. TCP Sliding Window

  12. Windowing and Window Size _______________ determines the amount of data that you can transmit before receiving an acknowledgment. Window size I didn’t get all of that, slow down. Fast enough for you? Sliding window refers to the fact that the window size is negotiated ___________ during the TCP session. dynamically Expectational acknowledgment means that the acknowledgment number refers to the octet that is ______________. next expected If the source receives no acknowledgment, it knows to retransmit at a ________ rate. slower

  13. TCP Segment Format Number of the calling port Number of the called port Used to ensure correct sequencing of the arriving data Next expected Segment Number of 32-bit words in the header set to zero Control setup and termination of session Number of octets sender is willing to accept Indicates the end of the urgent data Upper layer protocol data

  14. Protocol Graph: TCP/IP

  15. UDP • Applications that do not need guaranteed delivery use the faster UDP. • UDP has no windowing or acknowledgments, or error detection. • TCP and UDP: • TCP enables connection-oriented, ________ transmission. • TCP is used by ________________________ • UDP provides, ______________ non-guaranteed transmission. • UDP is used by __________________________. reliable FTP, HTTP, SMTP, and DNS. connectionless DNS, TFTP, SNMP, and DHCP

  16. Optional - used only if reply is expected Number of octets in the UDP segment Ensure that the data has not been damaged during transmission Specifies the application/protocol to which UDP needs to pass the data UDP Segment Format

  17. Port Numbers and Socket

  18. Port Numbers

  19. Telnet Port Numbers

  20. Ports for Clients • Whenever a client connects to a service on a server, a source and destination port must be specified. • TCP and UDP segments contain fields for source and destination ports.

  21. Source Port Destination Port • 1. Client requests a web page from server 2. Server responds to client Ports for Clients • The port number combines with the network address to form a socket. • Destination ports (services) are normally defined using the well-known ports. • Source ports set by the client are determined dynamically. • Usually source ports are randomly assigned a number above 1023. 1032 80 80 1032 Port numbers are 16-bit values ranging from 0 to 65535. This range is divided into three different categories: • Below 1023 are well-known ports. • 1024 to 49151 are registered ports (used by ordinary user processes). • Between 49152 and 65535 are defined as dynamic or private ports.

  22. Port Numbering and Well-Known Port Numbers • Port numbers are divided into three different categories: • Well-known ports • Registered ports • Dynamic or private ports

  23. Overview of Transport Layer Ports • Both _____ and _____ use port or socket numbers. TCP UDP • __________ work as source and destination addresses for TCP segments. Port Nos. appropriate service • Ports ensure packets reach the ______________________ on the server. destination port • The_________________ field determines which service the source is requesting. • TCP/IP associate ______ at the transport layer with certain applications. ports • Software developers have agreed on ____________ ports, for example: • a packet bound for an FTP server would use port ___. well-known 21 • Conversations that do not involve applications with well-known ports are assigned ports __________ selected from a specific range. randomly • Port numbers have the following assigned ranges: • Below 255 are reserved for ___________________. • From ___ - ____ assigned to companies for marketable applications. • Above 1023 are ____________. public applications 255 1023 unregulated • Source port numbers are dynamically assigned by the originating host, and are usually a number larger than _____. 1023 • Port numbers in the range of _____ - _____ are controlled by ICANN. 0 1023

  24. Reserved TCP and UDP Ports for Services

  25. Reserved TCP and UDP Port Numbers

  26. Summary

More Related