SlideShare a Scribd company logo
1 of 16
TRANSPORT LAYER &
TCP
CONTENTS
•Introduction
•UDP header format
•Per-Segment Checksum
•TCP: Connection management
•Reliability of data transfer
•TCP Flow control & congestion control
•TCP Header Format
INTRODUCTION
• It is recognized in OSI as well
as TCP/IP model
• It is responsible for source to
destination delivery of entire
message
• Transport layer ensures that
the whole message arrives
intact and in order,
overseeing both flow and
error control at source as
well as destination level
• Transport Layer is
responsible for delivery of
entire message from one
process running on source to
another process running on
destination.
UDP Header Format
•The transport layer is represented by two protocols: TCP and UDP.
•UDP is a part of the Internet Protocol suite, referred to as UDP/IP suite. Unlike
TCP, it is an unreliable and connectionless protocol.
•So, there is no need to establish a connection prior to data transfer.
•The UDP helps to establish low-latency and loss-tolerating connections establish
over the network.
•The UDP enables process to process communication.
UDP Header Format
•UDP header is an 8-bytes fixed and simple header, while for TCP it may vary
from 20 bytes to 60 bytes.
•The first 8 Bytes contains all necessary header information and the remaining
part consist of data.
•UDP port number fields are each 16 bits long, therefore the range for port
numbers is defined from 0 to 65535
•Port number 0 is reserved
• Port numbers help to distinguish different user requests or processes.
UDP Header
Format
• Source Port: Source Port is a 2 Byte
long field used to identify the port
number of the source.
• Destination Port: It is a 2 Byte long
field, used to identify the port of the
destined packet.
• Length: Length is the length of UDP
including the header and the data. It is
a 16-bits field.
• Checksum: Checksum is 2 Bytes long
field. It is the 16-bit one’s complement
of the one’s complement sum of the
UDP header, the pseudo-header of
information from the IP header, and
the data, padded with zero octets at
the end (if necessary) to make a
multiple of two octets.
Per-Segment
Checksum
• UDP Checksum calculation is similar to
TCP Checksum computation. It’s also a
16-bit field of one’s complement of
one’s complement sum of a pseudo
UDP header + UDP datagram.
• Here the checksum includes three
sections: a pseudo header, the UDP
header, and the data coming from the
application layer.
• The pseudo header is the part of the
header of the IP packet in which the
user datagram is to be encapsulated
with some fields filled with 0s If the
checksum does not include the pseudo
header, a user datagram may arrive
safe and sound. However, if the IP
header is corrupted, it may be
delivered to the wrong host.
Per-Segment Checksum
• Sender side:
• It treats segment contents as sequence of 16-bit integers.
• All segments are added. Let's call it sum.
• Checksum: 1's complement of sum.(In 1's complement all 0s are converted into 1s and all 1s are
converted into 0s).
• Sender puts this checksum value in UDP checksum field.
Per-Segment Checksum
• Receiver side:
• Calculate checksum
• All segments are added and then sum is added with sender's checksum.
• Check that any 0 bit is presented in checksum. If receiver side checksum contains any 0 then
error is detected. So the packet is discarded by receiver.
TCP: Connection management
Connection establishment is
performed by using the three-way
handshake mechanism. A three-way
handshake synchronies both ends of a
network by enabling both sides to
agree upon original sequence
numbers.
This mechanism also provides that
both sides are ready to transmit data
and learn that the other side is
available to communicate.
Reliability and Data Transfer
It uses a checksum to detect errors. The receiver sends
acknowledgement message if the message is complete,
and if the message is incomplete, it sends a negative
acknowledgement message and requests the data
again.
Four functions of reliable data transfer are:-
Receive data
Encapsulate data prior to sending
Unencapsulate data upon receipt
Send data
TCP Flow control
Flow control deals with the amount of data sent to the receiver side without
receiving any acknowledgment. It makes sure that the receiver will not be
overwhelmed with data. It's a kind of speed synchronization process between
the sender and the receiver.
Congestion Control
A state occurring in network layer when the message traffic is so heavy that
it slows down network response time.
Imagine a bucket with a small hole in the bottom . No matter at what rate
water enters the bucket, the outflow is at constant rate . When the bucket is
full with water additional water entering spills over the sides and is lost.
Similarly, each network interface contains a leaky bucket and the
following steps are involved in leaky bucket algorithm:
1. When host wants to send packet, packet is thrown into the bucket.
2. The bucket leaks at a constant rate, meaning the network interface
transmits packets at a constant rate.
3. Bursty traffic is converted to a uniform traffic by the leaky bucket.
4. In practice the bucket is a finite queue that outputs at a finite rate.
TCP Header format
GROUP
• UTKARSH LODHI
• SUDHIR GEED
• SRAJAL JAIN
• ROHIT RAGHUWANSHI
• ROHAN MAHAJAN
• ROOPALI BHASKAR
• YATI VISHNOI
• SATYA PRAKASH SINGH RATHOR
• RIYA JAISWAL
THANK YOU

More Related Content

Similar to TRANSPORT LAYER ppt.pptx

TCP_NISCHAYBAHL.pptx
TCP_NISCHAYBAHL.pptxTCP_NISCHAYBAHL.pptx
TCP_NISCHAYBAHL.pptxNischayBahl1
 
Computer networks transport layer
Computer networks  transport layerComputer networks  transport layer
Computer networks transport layerjamunaashok
 
Unit-4 (1).pptx
Unit-4 (1).pptxUnit-4 (1).pptx
Unit-4 (1).pptxpoonamsngr
 
TCPIP SLIDES.ppt
TCPIP SLIDES.pptTCPIP SLIDES.ppt
TCPIP SLIDES.pptaymenshykh
 
Unit 4 tansport layer in the internat
Unit 4 tansport layer in the internatUnit 4 tansport layer in the internat
Unit 4 tansport layer in the internatKritika Purohit
 
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & AnomaliesREMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & AnomaliesRhydham Joshi
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationsAnyapuPranav
 
UDP and TCP Protocol & Encrytion and its algorithm
UDP and TCP Protocol & Encrytion and its algorithmUDP and TCP Protocol & Encrytion and its algorithm
UDP and TCP Protocol & Encrytion and its algorithmAyesha Tahir
 
Transport protocols
Transport protocolsTransport protocols
Transport protocolsOnline
 

Similar to TRANSPORT LAYER ppt.pptx (20)

Tcp ip presentation
Tcp ip presentationTcp ip presentation
Tcp ip presentation
 
Transport layer.pptx
Transport layer.pptxTransport layer.pptx
Transport layer.pptx
 
TCP_NISCHAYBAHL.pptx
TCP_NISCHAYBAHL.pptxTCP_NISCHAYBAHL.pptx
TCP_NISCHAYBAHL.pptx
 
Computer networks transport layer
Computer networks  transport layerComputer networks  transport layer
Computer networks transport layer
 
Unit-4 (1).pptx
Unit-4 (1).pptxUnit-4 (1).pptx
Unit-4 (1).pptx
 
TCPIP SLIDES.ppt
TCPIP SLIDES.pptTCPIP SLIDES.ppt
TCPIP SLIDES.ppt
 
Unit 4 tansport layer in the internat
Unit 4 tansport layer in the internatUnit 4 tansport layer in the internat
Unit 4 tansport layer in the internat
 
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & AnomaliesREMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
 
TCP /IP
TCP /IPTCP /IP
TCP /IP
 
Transport layer
Transport layerTransport layer
Transport layer
 
Udp vs-tcp
Udp vs-tcpUdp vs-tcp
Udp vs-tcp
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunications
 
UDP and TCP Protocol & Encrytion and its algorithm
UDP and TCP Protocol & Encrytion and its algorithmUDP and TCP Protocol & Encrytion and its algorithm
UDP and TCP Protocol & Encrytion and its algorithm
 
TCP Vs UDP
TCP Vs UDP TCP Vs UDP
TCP Vs UDP
 
Tcp vs udp
Tcp vs udpTcp vs udp
Tcp vs udp
 
計概
計概計概
計概
 
Unit 5.Transport Layer.pptx
Unit 5.Transport Layer.pptxUnit 5.Transport Layer.pptx
Unit 5.Transport Layer.pptx
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
Tcp
TcpTcp
Tcp
 
TCP/IP and UDP protocols
TCP/IP and UDP protocolsTCP/IP and UDP protocols
TCP/IP and UDP protocols
 

Recently uploaded

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 

TRANSPORT LAYER ppt.pptx

  • 2. CONTENTS •Introduction •UDP header format •Per-Segment Checksum •TCP: Connection management •Reliability of data transfer •TCP Flow control & congestion control •TCP Header Format
  • 3. INTRODUCTION • It is recognized in OSI as well as TCP/IP model • It is responsible for source to destination delivery of entire message • Transport layer ensures that the whole message arrives intact and in order, overseeing both flow and error control at source as well as destination level • Transport Layer is responsible for delivery of entire message from one process running on source to another process running on destination.
  • 4. UDP Header Format •The transport layer is represented by two protocols: TCP and UDP. •UDP is a part of the Internet Protocol suite, referred to as UDP/IP suite. Unlike TCP, it is an unreliable and connectionless protocol. •So, there is no need to establish a connection prior to data transfer. •The UDP helps to establish low-latency and loss-tolerating connections establish over the network. •The UDP enables process to process communication.
  • 5. UDP Header Format •UDP header is an 8-bytes fixed and simple header, while for TCP it may vary from 20 bytes to 60 bytes. •The first 8 Bytes contains all necessary header information and the remaining part consist of data. •UDP port number fields are each 16 bits long, therefore the range for port numbers is defined from 0 to 65535 •Port number 0 is reserved • Port numbers help to distinguish different user requests or processes.
  • 6. UDP Header Format • Source Port: Source Port is a 2 Byte long field used to identify the port number of the source. • Destination Port: It is a 2 Byte long field, used to identify the port of the destined packet. • Length: Length is the length of UDP including the header and the data. It is a 16-bits field. • Checksum: Checksum is 2 Bytes long field. It is the 16-bit one’s complement of the one’s complement sum of the UDP header, the pseudo-header of information from the IP header, and the data, padded with zero octets at the end (if necessary) to make a multiple of two octets.
  • 7. Per-Segment Checksum • UDP Checksum calculation is similar to TCP Checksum computation. It’s also a 16-bit field of one’s complement of one’s complement sum of a pseudo UDP header + UDP datagram. • Here the checksum includes three sections: a pseudo header, the UDP header, and the data coming from the application layer. • The pseudo header is the part of the header of the IP packet in which the user datagram is to be encapsulated with some fields filled with 0s If the checksum does not include the pseudo header, a user datagram may arrive safe and sound. However, if the IP header is corrupted, it may be delivered to the wrong host.
  • 8. Per-Segment Checksum • Sender side: • It treats segment contents as sequence of 16-bit integers. • All segments are added. Let's call it sum. • Checksum: 1's complement of sum.(In 1's complement all 0s are converted into 1s and all 1s are converted into 0s). • Sender puts this checksum value in UDP checksum field.
  • 9. Per-Segment Checksum • Receiver side: • Calculate checksum • All segments are added and then sum is added with sender's checksum. • Check that any 0 bit is presented in checksum. If receiver side checksum contains any 0 then error is detected. So the packet is discarded by receiver.
  • 10. TCP: Connection management Connection establishment is performed by using the three-way handshake mechanism. A three-way handshake synchronies both ends of a network by enabling both sides to agree upon original sequence numbers. This mechanism also provides that both sides are ready to transmit data and learn that the other side is available to communicate.
  • 11. Reliability and Data Transfer It uses a checksum to detect errors. The receiver sends acknowledgement message if the message is complete, and if the message is incomplete, it sends a negative acknowledgement message and requests the data again. Four functions of reliable data transfer are:- Receive data Encapsulate data prior to sending Unencapsulate data upon receipt Send data
  • 12. TCP Flow control Flow control deals with the amount of data sent to the receiver side without receiving any acknowledgment. It makes sure that the receiver will not be overwhelmed with data. It's a kind of speed synchronization process between the sender and the receiver.
  • 13. Congestion Control A state occurring in network layer when the message traffic is so heavy that it slows down network response time. Imagine a bucket with a small hole in the bottom . No matter at what rate water enters the bucket, the outflow is at constant rate . When the bucket is full with water additional water entering spills over the sides and is lost. Similarly, each network interface contains a leaky bucket and the following steps are involved in leaky bucket algorithm: 1. When host wants to send packet, packet is thrown into the bucket. 2. The bucket leaks at a constant rate, meaning the network interface transmits packets at a constant rate. 3. Bursty traffic is converted to a uniform traffic by the leaky bucket. 4. In practice the bucket is a finite queue that outputs at a finite rate.
  • 15. GROUP • UTKARSH LODHI • SUDHIR GEED • SRAJAL JAIN • ROHIT RAGHUWANSHI • ROHAN MAHAJAN • ROOPALI BHASKAR • YATI VISHNOI • SATYA PRAKASH SINGH RATHOR • RIYA JAISWAL