Download
chapter 3 n.
Skip this Video
Loading SlideShow in 5 Seconds..
Chapter 3 PowerPoint Presentation

Chapter 3

98 Vues Download Presentation
Télécharger la présentation

Chapter 3

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Chapter 3 TransportLayer

  2. OBJECTIVES Understand the rationale for the existence of the transport layer. Understand the concept of application-to-application delivery. Understand the duties of the transport layer: packetizing, addressing, connection creation, and reliable delivery. Know which application layer program can use UDP and which can use TCP. Distinguish between the two transport-layer protocols used in the Internet: UDP and TCP. Understand the position of the transport layer in the Internet model. After reading this chapter, the reader should be able to:

  3. 3.1 APPLICATION-TO- APPLICATION DELIVERY

  4. Figure 3-1 Transport layer in the Internet model

  5. Figure 3-2 Application-to-application delivery

  6. 3.2 DUTIES

  7. Figure 3-3 Duties of the transport layer

  8. Figure 3-4 Connection establishment

  9. Figure 3-5 Connection termination

  10. Note: Connection is closely related to reliability: A connectionless protocol cannot be reliable because the relationship between packets provides reliability.

  11. Figure 3-6 Application programs

  12. Note: The addresses of client and server programs are defined at the transport layer. These addresses are local to the computer running the programs. The addresses must be unique locally but not universally.

  13. Figure 3-7 Port numbers

  14. Technical Focus:Range of Port Numbers The port numbers range from 0 to 65535 and are divided into three ranges: Well-known ports: 0 to 1023 Registered ports: 1,024 to 49,151 Temporary ports: 49,152 to 66,535

  15. SMTP: 25 TFTP: 69 HTTP: 80 FTP: 20 and 21 TELNET: 23 Business Focus:Well-Known Ports Some well-known port numbers are shown below:

  16. Note: A client uses a temporary port number; a server uses a well-known port number.

  17. Figure 3-8 Damage control

  18. Note: For reliable service, the transport layer needs to number packets belonging to a connection using sequence numbers.

  19. Note: A reliable transport protocol provides damage control, loss control, order control, and duplicate control even if the underlying networking technology and lower-level protocols are not reliable. This is done through sequence numbers, timers, error detection, and retransmission.

  20. 3.3 INTERNET PROTOCOLS

  21. Figure 3-9 UDP and TCP in the Internet model

  22. Figure 3-10 User datagram

  23. Technical Focus:User Datagram The fields in a user datagram are as follows: Source port number Destination port number Length Checksum

  24. Figure 3-11 Segment

  25. Source port number Destination port number Sequence number Header length Control flags Checksum Option Urgent pointer Technical Focus:Segment The fields in a segment are as follows: