Upload
raul-gooden
View
218
Download
0
Tags:
Embed Size (px)
Citation preview
Objectives• Take a look at some other forms of logical
addressing.• Examine the process of encapsulation.• Take a closer look at flow control.• Examine error correction/detection in detail.• See how the Transport layer controls
congestion on the network.
The Transport Layer
• The responsibilities of the Transport Layer are:– Handle end-to-end addressing– Repackage long message into smaller segments for
transmission– At the receiving end, rebuild packets into the original
message– Monitor flow control of data– Handle end-to-end error detection and recovery– Handle congestion control on the network
The Transport Layer
• Why do we need transport layer?– Network layer is focused on
the routers. It provides logical communication between hosts.
– Transport layer runs on end-user devices. It provides logical communication between processes
Household analogy:
12 kids sending letters to 12 kids
processes = kids
app messages = letters in envelopes
hosts = houses
transport protocol = John and Bill
network-layer protocol = postal service
Addressing in the Transport Layer
• Ports and sockets can tell the OS what data is intended for what applications.– Ports are 16-bit numbers that identify applications
or processes.– Sockets are a logical address consisting of a
combination of a port and an IP address.
Ports• Well-known ports– Assigned by Internet Assigned Number Authority
(IANA)– Occupy ports 0 through 1023
• Ephemeral ports– Used by the client software to establish a link
between applications– Generally assigned by the application when it
launches
Some Commonly Used Ports
Port Protocol20 FTP, File Transfer Protocol, data
21 FTP, File Transfer Protocol, control
23 Telnet
25 SMTP, Simple Mail Transfer Protocol
80 HTTP, HyperText Transfer Protocol
109 POP, Post Office Protocol, version 2
110 POP, Post Office Protocol, version 3
666 Doom, ID software
Transport Layer Connections
• Connectionless connections– No virtual connection is created.– Data is basically thrown out onto the wire and the
transmitting workstation assumes it will arrive safely.– The UDP is an example of a connectionless service
• Connection-oriented connections– A virtual connection is created.– For every packet transmitted, either an ACK or a NACK must
be returned.– The TCP is an example of connection-oriented service
UDP•often used for
streaming multimedia apps
▸loss tolerant▸rate sensitive
•other UDP uses▸DNS
source port # dest port #
32 bits
data
UDP segment format
length checksumLength, in
bytes of UDPsegment,including
header
The Real-Time Transport Protocol
•RFC 1889•Basic function of RTP is to Multiplex several
real-time data streams onto a single UDP stream•(a) The position of RTP in the protocol stack.
(b) Packet nesting.
TCP segment structure
source port # dest port #
32 bits
applicationdata
(variable length)
sequence number
acknowledgement number
Receive window
Urg data pnterchecksum
FSRPAUheadlen
notused
Options (variable length)
source port # dest port #
32 bits
applicationdata
(variable length)
sequence number
acknowledgement number
Receive window
Urg data pnterchecksum
FSRPAUheadlen
notused
Options (variable length)
URG: urgent data (generally not used)
ACK: ACK #valid
PSH: push data now(generally not used)
RST, SYN, FIN:Connection’ estab
(setup, teardowncommands)
# bytes rcvr willing
to accept
countingby bytes
of data(not segments!)
Internetchecksum(as in UDP)
TCP segment structure
– A 32-bit sequence number keeps packets in order.– A 32-bit acknowledgement number is used to verify the
packet.– 4-bit Header Length – Indicate the size of the entire TCP
header the receiver– URG – 0 or 1. When set to 1, this bit indicate the urgent
pointer field is valid and should be considered.– ACK – 0 or 1. When set to 1, this bit indicates that
acknowledgement number field is valid and being used
TCP segment structure• A window sized field dictates how many packets will be
sent before waiting for ACKS.– PSH – 0 or 1. When set to 1, this bit tells the receiver to
pass all data received at the point to the receiving application immediately.
– RST – 0 or 1. This bit indicates an error condition has been detected and notify the receiver to reset the connection
TCP segment structure
– SYN – 0 or 1. This bit synchronizes the sequence numbers in order to establish a connection
– 16 bit TCP checksum – ensure that the TCP header has not been modified in transmit
– 16-bit Urgent Pointer – This pointer is added to the sequence number field to yield the sequence number of urgent data.
Flow Control
• Buffer overflow– Memory fills; transmission stops
• Stop and wait– Send a frame and wait for the reply
• Neither methods very useful for busy networks
• Rarely used
socketdoor
TCPsend buffer
TCPreceive buffer
socketdoor
segment
applicationwrites data
applicationreads data
Advanced Flow Control• Static window– A fixed number of frames are transmitted.– The transmitting station waits for the replies.– No adjustments in transmission speed can be made.
• Sliding window– It starts with a higher number of frames.– As failures occur, the number of frames transmitted drops.– If a frame is dropped, that frame and all frames following
it will get retransmitted.
MORE Flow Control• Selectively repeat– A number of
frames are transmitted.
– If a failure occurs, only the bad packets need to be transmitted.
MORE Flow Control• Go Back N– It is similar to sliding
window except that a single ACK is sent for all frames in a window.
– If a failure occurs, the protocol counts back the correct number of frames and retransmits all.
Error Control in Transport
• The error correction in Data Link was bit-level error correction.– If user data was corrupted, the error was detected
and, if possible, fixed.
• Transport layer error correction is end-to-end.– There may have error during encapsulation– If a packet is lost or corrupted, the error is fixed.
Error Control in Transport
• Packet level errors can include packet loss, packet corruption, and packet duplication. The network uses– three-way handshake– sequence number – time-out for each packet
TCP Connection Establishment
• Recall: TCP sender, receiver establish connection before exchanging data segments
• initialize TCP variables:▸seq. #s▸buffers, flow control info
(e.g. RcvWindow)
Three way handshake:
Step 1: client host sends TCP SYN segment to server
specifies initial seq#
no data
Step 2: server host receives SYN, replies with SYNACK
segment
server allocates buffers
specifies server initial seq. #
Step 3: client receives SYNACK, replies with ACK segment,
which may contain data
TCP Connection Establishment
• (a) TCP connection establishment in the normal case.
• (b) Call collision. – only one connection is established
TCP Connection Close• Closing a connection:• Step 1: client end system
sends TCP FIN control segment to server
• Step 2: server receives FIN, replies with ACK. Closes connection, sends FIN.
• Step 3: client receives FIN, replies with ACK.
• Step 4: server, receives ACK. Connection closed.
client
FIN
server
ACK
ACK
FIN
close
close
closed
timed
wait
client
FIN
server
ACK
ACK
FIN
close
close
closed
timed
wait
Principles of Congestion Control• Congestion:–informally: too many sources sending too much data
too fast for network to handle –different from flow control!
• manifestations:▸lost packets (buffer overflow at routers)▸long delays (queueing in router buffers)
• a top-10 problem!
Congestion Control
• (a) A fast network feeding a low capacity receiver.
• (b) A slow network feeding a high-capacity receiver.
Congestion Control
• No single device can control overall network congestion.
• Therefore, Transport does what it can to make sure THIS DEVICE does not contribute to congestion.
• Connections requiring excessive retransmission of data are dropped.
Approaches towards congestion control
• End-end congestion control:▸no explicit feedback from network ▸congestion inferred from end-system observed loss,
delay▸approach taken by TCP
• Network-assisted congestion control:▸routers provide feedback to end systems▸single bit indicating congestion (SNA, DECbit, TCP/IP
ECN, ATM)▸explicit rate sender should send at
Two broad approaches towards congestion control:
TCP Congestion Control• Slow start (Jacobson 1998)– Start with the maximum segment size– If this is acknowledge then double the window size– Send two maximum segemnt size– Repeat
• When the CongWin = threshold, increase linearly.– Threshold = 1/2 of CongWin value before timeout.
– Initially 64KB in addition to receiver flow control and congestion control window
• When timeout occur – reduce threshold to half of the congestion window– Congestion window is reset to 1 segment
Slow Start• When connection
begins, increase rate exponentially until threshold:
• double CongWin every RTT
• done by incrementing CongWin for every ACK received
• Summary: initial rate is slow but ramps up exponentially fast
Host A
one segment
RTT
Host B
timetime
two segments
four segments
Summary: TCP Congestion Control• When CongWin is below Threshold, sender in
slow-start phase, window grows exponentially.• When CongWin is above Threshold, sender is in
congestion-avoidance phase, window grows linearly.
• When timeout occurs, Threshold set to CongWin/2 and CongWin is set to 1 MSS.
TCP Round Trip Time and Timeout•Q: how to set TCP timeout value?
▸longer than RTT▸but RTT varies▸too short: premature timeout–unnecessary retransmissions▸too long: slow reaction to segment loss
▸Q: how to estimate RTT?▸SampleRTT: measured time from segment transmission until
ACK receipt▸ignore retransmissions▸SampleRTT will vary, want estimated RTT smoother ▸average several recent measurements, not just current
SampleRTT
TCP Timer Management• Variable Retransmission based on RTT• Timeout based on Round Trip Time (RTT)– RTT = αRTT + (1-α)M– M is the time the ack received– α is smoothing factor typically 7/8
• A better estimate– Timeout = RTT + 4xD– D = αD + (1-α)|RTT-M|
• Karn’s Algorithm– Do not use RTT if retransmission happens– Time out is doubled on every failure