You are on page 1of 12

SEMESTER 1 Chapter 4

OSI Transport Layer


V 4.0

4.1.1 What are the 4 primary Tracking the individual communication


responsibilities of the between applications on the source and
Transport Layer? destination hosts
Segmenting data and managing each piece
Reassembling the segments into streams of
application data
Identifying the different applications
4.1.1.3 What does the Transport Identifies the segment of data and provides for
Layer header provide? identification of the Transport Layer Protocol to
use
4.1.2 Describe the process of divides application data into blocks of data that
segmentation and are an appropriate size
reassembly? reassembles the data before sending it to the
destination application or service
How does the Transport Each of these applications or services is
Layer accomplish assigned an address known as a port so that
conversation multiplexing? the Transport layer can determine with which
application or service the data is identified.
What are the four additional Connection-oriented conversations
duties the Transport Layer Reliable delivery
can provide? Ordered data reconstruction
Flow control
4.1.2.2 What are the four processes Establishing a Session
that the Transport Layer Reliable Delivery
uses to control Same Order Delivery
conversations? Flow Control
4.1.3 What does reliability mean ensuring that each piece of data that the
to a network? source sends arrives at the destination.
What are the three basic tracking transmitted data
operations of reliability at acknowledging received data
the transport layer? retransmitting any unacknowledged data
What trade-off is necessary value of reliability and the burden it places on
to ensure reliability? the network
How is a best-effort protocol there is no acknowledgement that the data is
different than a reliable received at the destination.
protocol?
What is another term used unreliable
to describe a best-effort
protocol?
List some examples of databases, web pages, and e-mail
applications that require
reliable transmission.
Give an example of an Streaming video
application that can use
unreliable transmission.
Know the information in the
diagram that lists the
differences between
unreliable and reliable
transmissions.
4.1.4 What are the two most Transmission Control Protocol (TCP) and
common protocols at the User Datagram Protocol (UDP)
Transport Layer?
What is the advantage of Speed
using UDP?
What are the pieces of UDP Datagram
information called?
What are some applications Applications that use UDP include:
that use UDP? Domain Name System (DNS)
Video Streaming
Voice over IP (VoIP)
What are the 3 additional same order delivery, reliable delivery, and flow
functions that TCP offers? control.
How much overhead is 20 bytes
required to offer the 3
functions of TCP?
What are the pieces of TCP segments
information called?
What are some applications Applications that use TCP are:
that use TCP? Web Browsers
E-mail
File Transfers
4.1.5.1 What are the unique Port numbers
identifiers that define the
conversations called?
In the originating message number for this communication associated with
what is the source port? the originating application on the local host
In the originating message the number for this communication associated
what is the destination port? with the destination application on the remote
host
How do server processes Statically
have port numbers
assigned?
How do clients have port dynamically
numbers assigned?
What is another term Socket number
sometimes used instead of
port number?
For this course, what does a the source and destination IP addresses and
socket pair describe? port numbers, is also unique and identifies the
conversation between the two hosts
4.1.5.2 What organization is IANA Internet Assigned Numbers Authority
responsible for assigning
port numbers?
What is the range of Well 0 to 1023
Known Ports?
What are well known ports? reserved for services and applications.
What is the range of 1024 to 49151
Registered Ports?
What are registered ports? These port numbers are assigned to user
processes or applications. These processes
are primarily individual applications that a user
has chosen to install rather than common
applications that would receive a Well Known
Port. When not used for a server resource,
these ports may also be used dynamically
selected by a client as its source port.
What is the range for 49152 to 65535
Dynamic or Private Ports?
What are dynamic or private Also known as Ephemeral Ports, these are
ports? usually assigned dynamically to client
applications when initiating a connection. It is
not very common for a client to connect to a
service using a Dynamic or Private Port
(although some peer-to-peer file sharing
programs do).
Is it possible for a port yes
number to be used by both
TCP and UDP?
4.1.5.3 What is the utility that can Netstat
be used to view open
connections?
4.1.6.1 What are the two reasons ensures that data is transmitted within the
data is divided into pieces limits of the media and that data from different
before it is sent? applications can be multiplexed on to the
media.
What is provided in a UDP Port Numbers
header?
What is provided in a TCP Port, sequence, acknowledgement, and flow
header? control numbers
In which protocol do UDP
segments arrive in an
unspecified order?
4.1.6.2 Packet Tracer Activity.
Please pay close attention
to Task 2 and examine the
information about the
packets- it will help on the
test
4.2.1 What makes TCP a reliable connection-oriented sessions
protocol?
What do acknowledgements Let the sender know you received the data
do?
What happens if the it retransmits that data to the destination
acknowledgment does not
arrive in the predetermined
time?
What is the additional the necessity to keep track of which segments
overhead created in the are awaiting acknowledgement and by the
hosts by using TCP? retransmission process.
Make certain you roll over
each piece of the diagram.
4.2.2 Which device initiates the Client
communication process?
What can never happen in two services assigned to the same port
two server conversations? number within the same Transport layer
services.
The diagram does a very
good job at showing the
process of port assignment
4.2.3 Describe the steps in Establishes that the destination device is
establishing a three way present on the network
handshake. Verifies that the destination device has an
active service and is accepting requests on the
destination port number that the initiating client
intends to use for the session
Informs the destination device that the source
client intends to establish a communication
session on that port number
What are the three steps in 1. The initiating client sends a segment
TCP connection containing an initial sequence value, which
establishment? serves as a request to the server to begin a
communications session.

2. The server responds with a segment


containing an acknowledgement value equal to
the received sequence value plus 1, plus its
own synchronizing sequence value. The value
is one greater than the sequence number
because there is no data contained to be
acknowledged. This acknowledgement value
enables the client to tie the response back to
the original segment that it sent to the server.

3. Initiating client responds with an


acknowledgement value equal to the sequence
value it received plus one. This completes the
process of establishing the connection.
What are the six control bit URG - Urgent pointer field significant
fields possible and what do ACK - Acknowledgement field significant
they mean? PSH - Push function
RST - Reset the connection
SYN - Synchronize sequence numbers
FIN- No more data from sender
4.2.4 What is the Initial Sequence The initial value for the sequence number is
Number (ISN)? randomly chosen and is used to begin tracking
the flow of data from the client to the server for
this session
What happens to the ISN as The ISN in the header of each segment is
packets are sent? increased by one for each byte of data sent
from the client to the server as the data
conversation continues.
4.2.4.2 What is sent back to the the server sends a segment back to the client
client in step 2? with the ACK flag set indicating that the
Acknowledgment number is significant
What is the value of the equal to the client initial sequence number plus
acknowledgement number 1
field?
Explain what is meant by 2 one from the client to the server, and the other
one-way sessions exist in from the server to the client
TCP?
4.2.4.3 What is the final step in the The client responds with both the sequence
three-way hand shake? and acknowledgement bit set and no data
What are 3 ways in which Denying the establishment of TCP sessions
security can be added? Only allowing sessions to be established for
specific services
Only allowing traffic as a part of already
established sessions.
4.2.5 What must be sent to close FIN finish control flag
a TCP session?
What are the 4 exchanges 1. When the client has no more data to send in
needed to close a TCP the stream, it sends a segment with the FIN
conversation? flag set.
2. The server sends an ACK to acknowledge
the receipt of the FIN to terminate the session
from client to server.
3. The server sends a FIN to the client, to
terminate the server to client session.
4. The client responds with an ACK to
acknowledge the FIN from the server.
4.2.5.2 Packet Tracer Lab to better
understand the process of
TCP
4.3.1 How does TCP reassemble Sequence numbers are assigned in the header
packets into the original of each packet to achieve this goal
data file?
How are sequence numbers the sequence number is incremented by the
incremented? number of bytes that have been transmitted
What does the receiving The receiving TCP process places the data
process do with the TCP from a segment into a receiving buffer.
segment?
Where do the reassemble To the Application Layer
segments go?
What happens when all the Any segments that arrive with noncontiguous
segments do not arrive? sequence numbers are held for later
processing.
4.3.2 What is the relationship The sequence number indicates the relative
between sequence and number of bytes that have been transmitted in
acknowledgement numbers this session including the bytes in the current
work? segment. TCP uses the acknowledgement
number in segments sent back to the source to
indicate the next byte in this session that the
receiver expects to receive
What is the process TCP Expectational acknowledgement
uses with sequence and
acknowledgement numbers
called?
What does TCP do to multiple segments of data can be sent before
overcome the overhead of and acknowledged with a single TCP message
waiting for in the opposite direction
acknowledgements?
What is the name for the Window size
amount of data that can be
sent before an
acknowledgement is
received called?
4.3.3 How does TCP handle When TCP at the source host has not received
missing segments? an acknowledgement after a predetermined
amount of time, it will go back to the last
acknowledgement number that it received and
retransmit data from that point forward.
What do hosts implement If both hosts support Selective
today to improve the TCP Acknowledgements, it is possible for the
process? destination to acknowledge bytes in
discontinuous segments and the host would
only need to retransmit the missing data.
4.3.4.1 How does flow control by adjusting the effective rate of data flow
assist the reliability of TCP between the two services in the session. When
transmissions? the source is informed that the specified
amount of data in the segments is received, it
can continue sending more data for this
session.
What does window size the amount of data that can be transmitted
specify? before an acknowledgement must be received
How does TCP use window TCP feedback mechanism adjusts the effective
size to improve rate of data transmission to the maximum flow
communication? that the network and destination device can
support without loss. TCP attempts to manage
the rate of transmission so that all data will be
received and retransmissions will be
minimized.
4.3.4.2 What happens to window TCP can reduce the window size to require
size when network that received segments be acknowledged
resources are constrained? more frequently
What happens after periods the receiver will begin to increase the window
of transmission with no data field
losses or constrained
resources?
What do you think occurs The window size would get smaller
with window size on the
school network when a
major update occurs district
wide? (smaller, larger)
4.4.1 According to the first 2 Lower overhead
paragraphs, what is the
major advantage of using
UDP?
What are the key Domain Name System (DNS)
Application layer protocols Simple Network Management Protocol
that use UDP includes? (SNMP)
Dynamic Host Configuration Protocol (DHCP)
Routing Information Protocol (RIP)
Trivial File Transfer Protocol (TFTP)
Online games
Why do the processes The low overhead of UDP makes it very
above use UDP? desirable for such applications
4.4.2 What is UDP also referred Transaction based
to as?
How are segments put back the application will have to identify the proper
in order if the application sequence of the data and determine how the
requires a specific order? data should be processed
4.4.3 How are TCP and UDP They both use port numbers
similar?
4.4.4 Note: This is essentially the
same as TCP so it is very
testable. Understand how
port numbers are assigned.
What happens to port the source and destination port numbers in the
numbers in a response from datagram header are reversed
the server?
4.4.2 Packet Tracer Activity- look
at each packet and gain an
understanding of what UDP
is sending and receiving.

* The 2 common transport layer protocols and their features?


– User Datagram Protocol (UDP)
– UDP is a connectionless protocol, described in RFC 768.
– It providing for low overhead data delivery.
– The pieces of communication in UDP are called datagrams.
– each UDP segment only has 8 bytes of overhead.
– These datagrams are sent as "best effort".
– Applications that use UDP include:
• Domain Name System (DNS)
• Video Streaming
• Voice over IP (VoIP)
– delays would be more detrimental to the application than small data
losses.

– Transmission Control Protocol (TCP)


– TCP is a connection-oriented protocol, described in RFC 793.
– TCP incurs additional overhead to gain functions.
– Additional functions specified by TCP are the same order delivery,
reliable delivery, and flow control.
– Each TCP segment has 20 bytes of overhead in the header
encapsulating the Application layer data,
– Applications that use TCP are:
• Web Browsers
• E-mail
• File Transfers
– When services send data using TCP, segments may arrive at their destination
out of order.
– For the original message to be understood by the recipient, and
reassembled into the original order, sequence numbers are assigned in
the header of each packet.

* What is the purpose of OSI transport layer?


– Segmentation and Reassembly
– Conversation Multiplexing
– Connection-oriented conversations
– Reliable delivery
– Ordered data reconstruction
– Flow control

* What can you tell from the following output? TCP? UDP? Application?
(Find an old picture of TCP vs. UDP)

* There are some fields are unique for TCP and some fields are unique for UDP.
Therefore, you are expected to identify whether a segment is a TCP segment or a UDP
segment?

– In TCP, each segment header contains a sequence number. This sequence number
allows the Transport layer functions on the destination host to reassemble segments in
the order in which they were transmitted.
– In UDP header, there is no sequence number. UDP is a simpler design and generates
less overhead than TCP, resulting in a faster transfer of data.
– The reliability of TCP communication is performed using connection-oriented sessions.
(3 way handshake)
– TCP also provides mechanisms for flow control.
– The TCP services on the destination host acknowledge the data that it has received to
the source application.

* What are the fields that exist in both TCP and UDP segments?
 In the header of each segment or datagram, there is a source and destination
port.
 The source port number is the number for this communication associated with
the originating application on the local host.
 The destination port number is the number for this communication associated
with the destination application on the remote host.

* You need to memorize some of the popular port numbers and the application
associated with those ports:
- Port 23
- Port 53
- Port 80
- Port 110
- Port 443

* You should know the interaction between the source port and destination port and the
acknowledge number for out-going segment and the same fields of the returning
segment.
- The source port becomes the destination port.
- The destination port becomes the source port.
- Acknowledge number increment by the size of bytes received by the destination.

* You are expected to know and memorize the number of 3 distinct of IANA assigned
port number groups:
1. Well Known Ports (Numbers 0 to 1023)
 These numbers are reserved for services and applications.
2. Registered Ports (Numbers 1024 to 49151)
 When not used for a server resource, these ports may also be used
dynamically selected by a client as its source port.
3. Dynamic or Private Ports (Numbers 49152 to 65535)
 Also known as Ephemeral Ports, these are usually assigned
dynamically to client applications when initiating a connection

* What is the purpose of “port number”?


• In order to pass data streams to the proper applications, the Transport layer must
identify the target application.
• To accomplish this, the Transport layer assigns an application an identifier. The
TCP/IP protocols call this identifier a port number.
• Each software process that needs to access the network is assigned a port
number unique in that host.

* What is the process of a TCP application that misses the acknowledgement?


 A destination host service using TCP usually only acknowledges data for
contiguous sequence bytes.
 When TCP at the source host has not received an acknowledgement after a
predetermined amount of time, it will go back to the last acknowledgement
number that it received and retransmit data from that point forward.

* What is the purpose of “flow control” in TCP transmission?


– Flow control assists the reliability of TCP transmission by adjusting the effective
rate of data flow between the two services.
– When the source is informed that the specified amount of data in the segments is
received, it can continue sending more data.
– This Window Size field in the TCP header specifies the amount of data that can
be transmitted before an acknowledgement must be received.

* You are expected to know all 3 different stages of the 3-way handshake.
 A TCP client begins the 3-way handshake by sending a segment with the SYN
(Synchronize Sequence Number) control flag set, indicating an initial value in the
sequence number field in the header.
 The SYN control flag is set and the relative sequence number is at 0.

 TCP server needs to acknowledge the receipt of the SYN from the client to
establish the session from the client.
 The server sends a segment back to the client with the ACK flag set indicating
that the Acknowledgment number is significant
 The value of acknowledgment number is the initial sequence number plus 1.

 Finally, the TCP client responds with a segment containing an ACK that is the
response to the TCP SYN sent by the server.
 The value in the acknowledgment number field contains one more than the initial
sequence number received from the server.

* You are expected to know how to read the “netstat” command output.
 How many session of TCP are running at the machine?
 What is port 443? What is port 80? (What is port 110”)
 What are the ports: 1029, 1033, and …….?
 What situation will the connection generate the output for state:
“ESTABLISHED” and “TIME_WAIT”? What is relation between these states
and “3 way handshake”?

You might also like