1
UNIT 07
Process – to – Process Delivery: UDP,TCP and SCTP
2
7-1 PROCESS-TO-PROCESS DELIVERY7-1 PROCESS-TO-PROCESS DELIVERY
The transport layer is responsible for process-to-The transport layer is responsible for process-to-process delivery—the delivery of a packet, part of a process delivery—the delivery of a packet, part of a message, from one process to another. Two processes message, from one process to another. Two processes communicate in a client/server relationship, as we will communicate in a client/server relationship, as we will see later. see later.
Client/Server ParadigmMultiplexing and DemultiplexingConnectionless Versus Connection-Oriented ServiceReliable Versus UnreliableThree Protocols
Topics discussed in this section:Topics discussed in this section:
3
The transport layer is responsible for process-to-process delivery.
Note
4
Figure .1 Types of data deliveries
5
Figure .2 Port numbers
6
Figure.3 IP addresses versus port numbers
7
Figure.4 IANA ranges
8
Figure.5 Socket address
9
Figure.6 Multiplexing and demultiplexing
10
Figure.7 Error control
11
Figure.8 Position of UDP, TCP, and SCTP in TCP/IP suite
12
7-2 USER DATAGRAM PROTOCOL (UDP)7-2 USER DATAGRAM PROTOCOL (UDP)
The User Datagram Protocol (UDP) is called a The User Datagram Protocol (UDP) is called a connectionless, unreliable transport protocol. It does connectionless, unreliable transport protocol. It does not add anything to the services of IP except to provide not add anything to the services of IP except to provide process-to-process communication instead of host-to-process-to-process communication instead of host-to-host communication. host communication.
Well-Known Ports for UDPUser DatagramChecksumUDP OperationUse of UDP
Topics discussed in this section:Topics discussed in this section:
13
Table .1 Well-known ports used with UDP
14
In UNIX, the well-known ports are stored in a file called /etc/services. Each line in this file gives the name of the server and the well-known port number. We can use thegrep utility to extract the line corresponding to the desired application. The following shows the port for FTP. Note that FTP can use port 21 with either UDP or TCP.
Example 7.1
15
Example .1 (continued)
SNMP uses two port numbers (161 and 162), each for a different purpose, as we will see in Chapter 28.
16
Figure .9 User datagram format
17
UDP length = IP length – IP header’s length
Note
18
Figure.10 Pseudoheader for checksum calculation
19
Figure.11 shows the checksum calculation for a very small user datagram with only 7 bytes of data. Because the number of bytes of data is odd, padding is added for checksum calculation. The pseudoheader as well as the padding will be dropped when the user datagram is delivered to IP.
Example.2
20
Figure .11 Checksum calculation of a simple UDP user datagram
21
Show the entries for the header of a UDP user datagram that carries a message from a TFTP client to a TFTP server. Fill the checksum with 0s. Choose an appropriate ephemeral port number and the correct well-known port number. The length of data is 40 bytes. Show the UDP packet format.
Example 23.2.1
22
A client has a packet of 68000 bytes, can this packet be transferred by a single UDP datagram?
Example.2
23
A UDP header in hexadecimal format 06 32 00 0D 00 1C E2 17
What is the source port number?What is the destination port number?What is the total length of the user datagram?What is the length of the data?Is packet directed from a client to server or vice versa?What is the client process?
Example 2.3
24
Figure .12 Queues in UDP
25
7-3 TCP7-3 TCP
TCP is a connection-oriented protocol; it creates a TCP is a connection-oriented protocol; it creates a virtual connection between two TCPs to send data. In virtual connection between two TCPs to send data. In addition, TCP uses flow and error control mechanisms addition, TCP uses flow and error control mechanisms at the transport level. at the transport level.
TCP ServicesTCP FeaturesSegmentA TCP ConnectionFlow ControlError Control
Topics discussed in this section:Topics discussed in this section:
26
Table .2 Well-known ports used by TCP
27
Figure.13 Stream delivery
28
Figure.14 Sending and receiving buffers
29
Figure.15 TCP segments
30
The bytes of data being transferred in each connection are numbered by TCP.The numbering starts with a randomly
generated number.
Note
31
The following shows the sequence number for each segment:
Example 7.3
32
The value in the sequence number field of a segment defines the
number of the first data byte contained in that segment.
Note
33
The value of the acknowledgment field in a segment defines
the number of the next byte a party expects to receive.
The acknowledgment number is cumulative.
Note
34
Figure.16 TCP segment format
35
Figure.17 Control field
36
Table.3 Description of flags in the control field
37
The following is a dump of a TCP header in hexadecimal format
05320017 00000001 00000000 500207FF 00000000
What is the source port number?What is the destination port number?What is sequence number?What is the acknowledgment number?What is the length of the header?What is the type of the segment?What is the window size?
Example.2.4
38
To make the initial sequence number a random number, most systems start the counter at 1 and increase the counter by 64000 every 0.5s, how long does it take for the counter to wrap around?
Example.2.5
39
Figure.18 Connection establishment using three-way handshaking
40
A SYN segment cannot carry data, but it consumes one sequence number.
Note
41
A SYN + ACK segment cannot carry data, but does consume one
sequence number.
Note
42
An ACK segment, if carrying no data, consumes no sequence number.
Note
43
TCP opens a connections using an initial sequence number (ISN) of 14534. The other party opens the connection with an ISN of 21732. Show the three TCP segment during the connection establishment.
Example 2.6
44
Figure.19 Data transfer
45
Figure.20 Connection termination using three-way handshaking
46
The FIN segment consumes one sequence number if it does
not carry data.
Note
47
The FIN + ACK segment consumes one sequence number if it
does not carry data.
Note
48
Figure.21 Half-close
49
Figure.22 Sliding window
50
A sliding window is used to make transmission more efficient as well asto control the flow of data so that the
destination does not becomeoverwhelmed with data.
TCP sliding windows are byte-oriented.
Note
51
What is the value of the receiver window (rwnd) for host A if the receiver, host B, has a buffer size of 5000 bytes and 1000 bytes of received and unprocessed data?
Example .4
SolutionThe value of rwnd = 5000 − 1000 = 4000. Host B can receive only 4000 bytes of data before overflowing its buffer. Host B advertises this value in its next segment to A.
52
What is the size of the window for host A if the value of rwnd is 3000 bytes and the value of cwnd is 3500 bytes?
Example.5
SolutionThe size of the window is the smaller of rwnd and cwnd, which is 3000 bytes.
53
Figure 23 shows an unrealistic example of a sliding window. The sender has sent bytes up to 202. We assume that cwnd is 20 (in reality this value is thousands of bytes). The receiver has sent an acknowledgment number of 200 with an rwnd of 9 bytes (in reality this value is thousands of bytes). The size of the sender window is the minimum of rwnd and cwnd, or 9 bytes. Bytes 200 to 202 are sent, but not acknowledged. Bytes 203 to 208 can be sent without worrying about acknowledgment. Bytes 209 and above cannot be sent.
Example.6
54
Figure.23 Example.6
Example Sliding Window
Credit Allocation
57
A TCP connection is using a window size of 10,000 bytes, and the previous acknowledgement number was 22,001. It receives a segment with acknowledgment number 24,001 and window size advertisement of 12,000. Draw a diagram to show the situation of the window before and after.
Example 24
58
A window holds bytes 2001 and 5000. The next byte to be sent is 3001. Draw a figure to show the situation of the window after the following two events:
1.An ACK segment with the acknowledgement number 25, 000 and window size advertisement 4,000 is received.2.A segment carrying 1000 bytes is sent.
Example 25
61
In modern implementations, a retransmission occurs if the
retransmission timer expires or three duplicate ACK segments have arrived.
Note
64
Figure.24 Normal operation
65
Figure.25 Lost segment
66
The receiver TCP delivers only ordered data to the process.
Note
67
Figure.26 Fast retransmission
68
7-4 SCTP7-4 SCTP
Stream Control Transmission Protocol (SCTP) is a Stream Control Transmission Protocol (SCTP) is a new reliable, message-oriented transport layer new reliable, message-oriented transport layer protocol. SCTP, however, is mostly designed for protocol. SCTP, however, is mostly designed for Internet applications that have recently been Internet applications that have recently been introduced. These new applications need a more introduced. These new applications need a more sophisticated service than TCP can provide. sophisticated service than TCP can provide.
SCTP Services and FeaturesPacket FormatAn SCTP AssociationFlow Control and Error Control
Topics discussed in this section:Topics discussed in this section:
69
SCTP is a message-oriented, reliable protocol that combines the best features
of UDP and TCP.
Note
70
Table.4 Some SCTP applications
71
Figure.27 Multiple-stream concept
72
An association in SCTP can involve multiple streams.
Note
73
Figure.28 Multihoming concept
74
SCTP association allows multiple IP addresses for each end.
Note
75
In SCTP, a data chunk is numbered using a TSN.
Note
76
To distinguish between different streams, SCTP uses an SI.
Note
77
To distinguish between different data chunks belonging to the same stream,
SCTP uses SSNs.
Note
78
TCP has segments; SCTP has packets.
Note
79
Figure.29 Comparison between a TCP segment and an SCTP packet
80
In SCTP, control information and data information are carried in separate
chunks.
Note
81
Figure.30 Packet, data chunks, and streams
82
Data chunks are identified by three items: TSN, SI, and SSN.
TSN is a cumulative number identifying the association; SI defines the stream;
SSN defines the chunk in a stream.
Note
83
In SCTP, acknowledgment numbers are used to acknowledge only data chunks;
control chunks are acknowledged by other control chunks if necessary.
Note
84
Figure.31 SCTP packet format
85
In an SCTP packet, control chunks come before data chunks.
Note
86
Figure.32 General header
87
Table .5 Chunks
88
A connection in SCTP is called an association.
Note
89
No other chunk is allowed in a packet carrying an INIT or INIT ACK chunk.A COOKIE ECHO or a COOKIE ACK
chunk can carry data chunks.
Note
90
Figure .33 Four-way handshaking
91
In SCTP, only DATA chunks consume TSNs;
DATA chunks are the only chunks that are acknowledged.
Note
92
Figure .34 Simple data transfer
93
The acknowledgment in SCTP defines the cumulative TSN, the TSN of the last
data chunk received in order.
Note
94
Figure.35 Association termination
95
Figure.36 Flow control, receiver site
96
Figure.37 Flow control, sender site
97
Figure.38 Flow control scenario
98
Figure.39 Error control, receiver site
99
Figure .40 Error control, sender site