Chapter_3_v8.0
Chapter_3_v8.0
Chapter_3_v8.0
Transport Layer
A note on the use of these PowerPoint slides:
We’re making these slides freely available to all (faculty, students,
readers). They’re in PowerPoint form so you see the animations; and
can add, modify, and delete slides (including this one) and slide content
to suit your needs. They obviously represent a lot of work on our part.
In return for use, we only ask the following:
▪ If you use these slides (e.g., in a class) that you mention their
source (after all, we’d like people to use our book!)
▪ If you post any slides on a www site, that you note that they are
adapted from (or perhaps identical to) our slides, and note our
copyright of this material.
Computer Networking: A
For a revision history, see the slide note for this page.
Top-Down Approach
Thanks and enjoy! JFK/KWR 8th edition
Jim Kurose, Keith Ross
All material copyright 1996-2020
J.F Kurose and K.W. Ross, All Rights Reserved Pearson, 2020
Transport Layer: 3-1
Transport layer: overview
Our goal:
▪understand principles ▪learn about Internet transport
behind transport layer layer protocols:
services: • UDP: connectionless transport
• multiplexing, • TCP: connection-oriented reliable
demultiplexing transport
• reliable data transfer • TCP congestion control
• flow control
• congestion control
log
ica
le
▪transport protocols actions in end
n d-
systems:
e nd
local or
tra
• sender: breaks application messages regional ISP
nsp
into segments, passes to network layer
ort
home network content
• receiver: reassembles segments into provider
network
messages, passes to application layer application
transport
datacenter
network
network
Sender:
application ▪ is passed an application- app. msg
application
layer message
transport
▪ determines segment TThtransport
h app. msg
header fields values
network (IP)
▪ creates segment network
▪ passes segment to IP (IP)
link
link
physical physical
Receiver:
application ▪ receives segment from IP application
▪ checks header values
app. msg
transport ▪ extracts application-layer transport
message
network (IP) ▪ demultiplexes message up network
to application via socket (IP)
link
link
physical physical
Th app. msg
log
• congestion control
ica
le
• flow control
n d-
e nd
• connection setup local or
tra
regional ISP
▪UDP: User Datagram Protocol
nsp
ort
home network
• unreliable, unordered delivery content
provider
network
• no-frills extension of “best-effort” IP application
transport
datacenter
network
network
transport
Hn Ht HTTP msg
transport
application
application application
transport transport
(UDP) (UDP)
network (IP)
▪ creates UDP segment network
▪ passes segment to IP (IP)
link
link
physical physical
physical physical
Transmitted: 5 6 11
Received: 4 6 11
receiver-computed
checksum
= sender-computed
checksum (as received)
sum 1 0 1 1 1 0 1 1 1 0 1 1 1 1 0 0
checksum 0 1 0 0 0 1 0 0 0 1 0 0 0 0 1 1
Note: when adding numbers, a carryout from the most significant bit needs to be
added to the result
* Check out the online interactive exercises for more examples: h ttp://gaia.cs.umass.edu/kurose_ross/interactive/
Transport Layer: 3-33
Internet checksum: weak protection!
example: add two 16-bit integers
0 1
1 1 1 0 0 1 1 0 0 1 1 0 0 1 1 0 1 0
1 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1
wraparound 1 1 0 1 1 1 0 1 1 1 0 1 1 1 0 1 1 Even though
numbers have
sum 1 0 1 1 1 0 1 1 1 0 1 1 1 1 0 0 changed (bit
flips), no change
checksum 0 1 0 0 0 1 0 0 0 1 0 0 0 0 1 1 in checksum!
sending receiving
process process
applicatio data data
ntranspor
t reliable
channel
reliable service abstraction
transport
network
unreliable channel
sending receiving
process process
application data data
transport
sender-side of receiver-side
Complexity of reliable data reliable data
transfer protocol
of reliable data
transfer protocol
transfer protocol will depend
(strongly) on characteristics of transport
network
unreliable channel (lose, unreliable channel
corrupt, reorder data?)
reliable service implementation
sending receiving
process process
application data data
transport
sender-side of receiver-side
reliable data of reliable data
Sender, receiver do not know transfer protocol transfer protocol
the “state” of each other, e.g.,
was a message received? transport
network
▪ unless communicated via a unreliable channel
message
reliable service implementation
unreliable channel
udt_send(): called by rdt rdt_rcv(): called when packet
to transfer packet over Bi-directional communication over arrives on receiver side of
unreliable channel to receiver unreliable channel channel
Transport Layer: 3-41
Reliable data transfer: getting started
We will:
▪ incrementally develop sender, receiver sides of reliable data transfer
protocol (rdt)
▪ consider only unidirectional data transfer
• but control info will flow in both directions!
▪ use finite state machines (FSM) to specify sender, receiver
event causing state
transition
actions taken on state
state: when in this “state” transition
next state uniquely stat stat
determined by next e eve
event e
1 nt
action
2
s
extract(rcvpkt,data)
deliver_data(data)
sndpkt = make_pkt(ACK, chksum)
udt_send(sndpkt)
rdt_send(data)
sndpkt = make_pkt(1, data, checksum)
udt_send(sndpkt)
start_timer
(b) packet
loss Transport Layer: 3-60
rdt3.0 in action
send receiv
er
send er
send receiv pkt0
er er pkt0 rcv
send pkt0 send
pkt0
ack0
pkt0 rcv rcv ack0
ack0 send
pkt0 send
ack0 pkt1
rcv ack0 pkt1 rcv
send
ack0 pkt1 send
pkt1
pkt1 rcv ack1 ack1
ack1 send
X pkt1 timeout
los ack1 resend
s pkt1 pkt1 rcv
timeout
resend pkt1
rcv rcv pkt1
(detect
pkt1 send pkt0 send
duplicate)
(detect
pkt1 ack1
ack1 send
duplicate) pkt0 ack1 ack1
rcv
rcv rcv send
pkt0 ack1 (ignore ack0 pkt0
send
ack1 ack1 ack0
pkt0 rcv )
ack0 send
pkt0 pkt1
ack0
L/R L/R
Usender =
RTT + L / R
.008 RTT
=
30.008
= 0.00027
rcv_base
Not received
Transport Layer: 3-68
Go-Back-N in action
sender window send receiv
0 1 2 3 4(N=4)
5678 er
send er
012345678 pkt0
send receive pkt0, send
012345678
pkt1 X los ack0
012345678
send s receive pkt1, send
pkt2 ack1
012345678 rcv ack0,send
send
012345678 pkt4
rcv ack1, pkt3
send receive pkt3,
receive pkt4,
(wait)
pkt5 discard,
discard,
ignore duplicate (re)send ack1
receive(re)send
pkt5,
ACK
discard,
ack1
pkt 2
timeout (re)send
012345678 send
012345678 pkt2 ack1
012345678 send rcv pkt2, deliver, send
012345678 pkt3 ack2
send rcv pkt3, deliver, send
pkt4 ack3
send rcv pkt4, deliver, send
pkt5 ack4 Transport Layer: 3-69
Selective repeat
▪receiver individually acknowledges all correctly received
packets
• buffers packets, as needed, for eventual in-order delivery to upper
layer
▪sender times-out/retransmits individually for unACKed packets
• sender maintains timer for each unACKed pkt
▪sender window
• N consecutive seq #s
• limits seq #s of sent, unACKed packets
a dilemma!
receipt)
012301 pkt
2 0pkt
012301 012301
2 1
pkt 2
012301
012301
2 2 2
012301
example: 012301
2
pkt
3 X
2
012301
▪ seq #s: 0, 1, 2, 3 (base 4 counting) 2 pkt will accept
0 packet
▪ window size=3 (a) no with seq
number 0
problem
012301 pkt
2 0
pkt
012301 012301
2 1
pkt 2
012301 X 012301
2 2 X 2
012301
X 2
timeout
retransmit
pkt0
012301 pkt
2 0 will accept
packet
(b) with seq
number 0
oops! Transport Layer: 3-74
Selective repeat:
sender receiver
window window
(after (after receipt)
a dilemma!
receipt)
012301 pkt
2 0pkt
012301 012301
2 1
pkt 2
012301
012301
2 2 2
012301
example: 012301
2
pkt
3 X
2
options (variable
C, E: congestion notification length)
TCP options
application data sent by
RST, SYN, FIN: connection data application into
management (variable TCP socket
length)
User types‘C’
Seq=42, ACK=79, data = ‘C’
host ACKs receipt of‘C’,
echoes back ‘C’
Seq=79, ACK=43, data = ‘C’
host ACKs receipt
of echoed ‘C’
Seq=43, ACK=80
(milliseconds)
RTT
sampleRT
T
EstimatedR
TT
time
Transport Layer: 3-82
(seconds)
TCP round trip time, timeout
▪timeout interval: EstimatedRTT plus “safety margin”
• large variation in EstimatedRTT: want a larger safety margin
TimeoutInterval = EstimatedRTT + 4*DevRTT
estimated “safety
RTT margin”
▪DevRTT: EWMA of SampleRTT deviation from EstimatedRTT:
DevRTT = (1-β)*DevRTT + β*|SampleRTT-EstimatedRTT|
(typically, β = 0.25)
* Check out the online interactive exercises for more examples: h ttp://gaia.cs.umass.edu/kurose_ross/interactive/
Transport Layer: 3-83
TCP Sender (simplified)
event: data received from event: timeout
application ▪retransmit segment that
▪create segment with seq # caused timeout
▪restart timer
▪seq # is byte-stream number
of first data byte in segment
event: ACK received
▪start timer if not already
running ▪if ACK acknowledges
• think of timer as for oldest
previously unACKed segments
unACKed segment • update what is known to be
ACKed
• expiration interval:
TimeOutInterval • start timer if there are still
unACKed segments
Transport Layer: 3-84
TCP Receiver: ACK generation [RFC 5681]
Event at receiver TCP receiver action
arrival of in-order segment with delayed ACK. Wait up to 500ms
expected seq #. All data up to for next segment. If no next segment,
expected seq # already ACKed send ACK
SendBase=
Seq=92, 8 bytes of 92 Seq=92, 8 bytes of
data data
Seq=100, 20 bytes of
time
time
out
out
ACK=100 data
X
ACK=100
ACK=120
SendBase=1
20
lost ACK premature
scenario timeout
Transport Layer: 3-86
TCP: retransmission scenarios
Host Host
A B
Seq=92, 8 bytes of
data
Seq=100, 20 bytes of
data
ACK=100
X
ACK=120
cumulative ACK
covers for earlier
lost ACK
Transport Layer: 3-87
TCP fast retransmit
Host A Host B
TCP fast
retransmit
if sender receives 3 additional
ACKs for same data (“triple Se q= 9
2, 8 by
Seq= data tes of
duplicate ACKs”), resend unACKed 100, 2
data
0 b yt e
s of
segment with smallest seq # X
▪ likely that unACKed segment lost,
=100
so don’t wait for timeout ACK
timeout
=100
ACK
CK =100
A
= 10 0
Receipt of three duplicate ACKs ACK
TCP
cod
Network layer e
delivering IP datagram
payload into TCP
IP
socket buffers cod
e
from
sender
receiver protocol
stack
Transport Layer: 3-90
TCP flow control
applicati
on
Q: What happens if network Application removing process
layer delivers data faster than data from TCP socket
buffers
application layer removes TCP socket
data from socket buffers? receiver
buffers
TCP
cod
Network layer e
delivering IP datagram
payload into TCP
IP
socket buffers cod
e
from
sender
receiver protocol
stack
Transport Layer: 3-91
TCP flow control
applicati
on
Q: What happens if network Application removing process
layer delivers data faster than data from TCP socket
buffers
application layer removes TCP socket
data from socket buffers? receiver
buffers
TCP
cod
e
receive window
flow control: # bytes
receiver willing to accept IP
cod
e
from
sender
receiver protocol
stack
Transport Layer: 3-92
TCP flow control
applicati
on
Q: What happens if network Application removing process
layer delivers data faster than data from TCP socket
buffers
application layer removes TCP socket
data from socket buffers? receiver
buffers
TCP
flow control cod
e
receiver controls sender, so
sender won’t overflow IP
cod
receiver’s buffer by e
transmitting too much, too fast
from
sender
receiver protocol
stack
Transport Layer: 3-93
TCP flow control
▪TCP receiver “advertises” free buffer
space in rwnd field in TCP header to application process
• RcvBuffer size set via socket
options (typical default is 4096 bytes) RcvBuffer buffered
data
• many operating systems autoadjust
RcvBuffer
rwnd free buffer
space
▪sender limits amount of unACKed
(“in-flight”) data to received rwnd TCP segment payloads
applicati applicati
on on
connection state: connection state:
ESTAB ESTAB
connection variables: connection Variables:
seq # client-to- seq # client-to-
server server
server-to-client server-to-client
rcvBuffer size rcvBuffer size
atnetwor
server,client networ
at server,client
k k
No problem!
choose
x req_conn(
x) ESTA
retransmit acc_conn( B
req_conn(
x) x)
ESTA
B req_conn(
x)
connectio
client n server
terminat x forgets x
es completes
ESTA
acc_conn( B
Problem:x)halfopen
connection! (no client)
Transport Layer: 3-99
2-way handshake scenarios
choose
x req_conn(
x) ESTA
retransmit acc_conn( B
req_conn( x)
x)
ESTA
B data(x+ accept
1) data(x+1
retransmit )
data(x+1)
connectio
n server
client x
terminat forgets x
completes
es req_conn(
x)
ESTA
data(x+ B
accept
1) data(x+1
)
Problem: dup data
accepted!
TCP 3-way handshake
Server state
serverSocket = socket(AF_INET,SOCK_STREAM)
Client state serverSocket.bind((‘’,serverPort))
serverSocket.listen(1)
clientSocket = socket(AF_INET, SOCK_STREAM) connectionSocket, addr = serverSocket.accept()
LISTE
N
clientSocket.connect((serverName,serverPort)) LISTE
choose init seq N
num, x
SYNSEN send TCP SYN msg SYNbit=1,
T Seq=x choose init seq
num, y
send TCP SYNACK SYN
SYNbit=1, Seq=y msg, acking SYN RCVD
ACKbit=1;
received SYNACK(x) ACKnum=x+1
ESTA indicates server is live;
send ACK for SYNACK;
B this segment may ACKbit=1,
contain
client-to-server data ACKnum=y+1 received ACK(y)
indicates client is
live ESTA
B
Transport Layer: 3-101
A human 3-way handshake protocol
1. On belay?
2. Belay on.
3. Climbing.
▪ two flows
R R
▪ no retransmissions needed
Host B
R/
Q: What happens as 2
λout
delay
arrival rate λin
throughput:
approaches R/2?
λin R/ λin R/
2 2
maximum per-connection large delays as arrival rate
throughput: R/2 λin approaches capacity
Transport Layer: 3-106
Causes/costs of congestion: scenario 2
▪one router, finite buffers
▪sender retransmits lost, timed-out packet
• application-layer input = application-layer output: λin = λout
• transport-layer input includes retransmissions : λ’in λin
R R
throughput: λout
Host A λin : original data λin
copy λ'in: original data, plus λout R/2
retransmitted data
R R
no buffer space!
R R
throughput: λout
full buffers
when sending at
▪ sender knows when packet has been dropped: R/2, some packets
only resends if packet known to be lost are needed
retransmissions
R R
throughput: λout
full buffers – requiring retransmissions to un-needed
retransmissions
▪ but sender times can time out prematurely,
sending two copies, both of which are delivered when sending at
R/2, some packets
are retransmissions,
including needed
and un-needed
Host A λin : original data λin duplicates, that are
copy R/2
timeo
ut λ'in: original data, plus delivered!
retransmitted data
R R
throughput: λout
full buffers – requiring retransmissions to un-needed
retransmissions
▪ but sender times can time out prematurely,
sending two copies, both of which are delivered when sending at
R/2, some packets
are retransmissions,
including needed
and un-needed
λin R/2 duplicates, that are
delivered!
“costs” of congestion:
▪ more work (retransmission) for given receiver throughput
▪ unneeded retransmissions: link carries multiple copies of a packet
• decreasing maximum achievable throughput
Host D
λout
Host C
λin’ R/
2
router
▪ may indicate congestion level or
explicitly set sending rate
▪ TCP ECN, ATM, DECbit protocols
Transport Layer: 3-117
Chapter 3: roadmap
▪Transport-layer services
▪Multiplexing and demultiplexing
▪Connectionless transport: UDP
▪Principles of reliable data transfer
▪Connection-oriented transport: TCP
▪Principles of congestion control
▪TCP congestion control
▪Evolution of transport-layer
functionality
Transport Layer: 3-118
TCP congestion control: AIMD
▪ approach: senders can increase sending rate until packet loss
(congestion) occurs, then decrease sending rate on loss event
Additive Increase Multiplicative Decrease
increase sending rate by 1 cut sending rate in half at
maximum segment size every each loss event
RTT until loss detected
TCP sender Sending rate
AIMD sawtooth
behavior: probing
for bandwidth
Why AIMD?
▪ AIMD – a distributed, asynchronous algorithm – has been
shown to:
• optimize congested flow rates network wide!
• have desirable stability properties
RTT
segment
Implementation:
▪ variable ssthresh
▪ on loss event, ssthresh is set to
1/2 of cwnd just before loss event
* Check out the online interactive exercises for more examples: h ttp://gaia.cs.umass.edu/kurose_ross/interactive/
Transport Layer: 3-123
Summary: TCP congestion control
New
New ACK!
new ACK
duplicate ACK
dupACKcount++
ACK!
new ACK .
cwnd = cwnd + MSS (MSS/cwnd)
dupACKcount = 0
cwnd = cwnd+MSS transmit new segment(s), as allowed
dupACKcount = 0
Λ transmit new segment(s), as allowed
cwnd = 1 MSS
ssthresh = 64 KB cwnd >
dupACKcount = 0
slow Λ
ssthresh congestion
start timeout avoidance
ssthresh = cwnd/2
cwnd = 1 MSS duplicate ACK
timeout dupACKcount = 0 dupACKcount++
ssthresh = cwnd/2 retransmit missing segment
cwnd = 1 MSS
dupACKcount = 0
retransmit missing segment
timeout
New
ACK!
ssthresh = cwnd/2
cwnd = 1 New ACK
dupACKcount = 0
cwnd = ssthresh dupACKcount == 3
dupACKcount == 3 retransmit missing segment dupACKcount = 0
ssthresh= cwnd/2 ssthresh= cwnd/2
cwnd = ssthresh + 3 cwnd = ssthresh + 3
retransmit missing segment
retransmit missing segment
fast
recovery
duplicate ACK
cwnd = cwnd + MSS
transmit new segment(s), as allowed
time
t0 t1 t2 t3 t4
Transport Layer: 3-126
TCP and the congested “bottleneck link”
▪TCP (classic, CUBIC) increase TCP’s sending rate until packet loss occurs
at some router’s output: the bottleneck link
sourc destination
e
application application
TCP TCP
network network
link link
physical physical
packet queue almost
never empty, sometimes
overflows packet (loss)
ECN=10 ECN=11
IP
datagram Transport Layer: 3-131
TCP fairness
Fairness goal: if K TCP sessions share same bottleneck link of
bandwidth R, each should have average rate of R/K
TCP connection 1
bottleneck
TCP connection 2 router
capacity R
Connection 1 throughput R
Transport Layer: 3-133
Fairness: must all network apps be “fair”?
Fairness and UDP Fairness, parallel TCP
▪multimedia apps often do not connections
use TCP ▪application can open multiple
• do not want rate throttled by parallel connections between two
congestion control hosts
▪instead use UDP: ▪web browsers do this , e.g., link of
• send audio/video at constant rate, rate R with 9 existing connections:
tolerate packet loss • new app asks for 1 TCP, gets rate R/10
▪there is no “Internet police” • new app asks for 11 TCPs, gets R/2
policing use of congestion
control
Network IP IP
TCP
handshake QUIC
(transport handshake
layer) data
TLS
handshake
(security) data
HTTP HTTP
GET GET HTTP
GET
HTTP HTTP
application
GET GET
HTTP
GET QUIC QUIC QUIC QUIC QUIC QUIC
encrypt encrypt encrypt encrypt encrypt encrypt
QUIC QUIC QUIC QUIC QUIC QUIC
TLS encryption TLS encryption RDT RDT RDT RDT
error!
RDT RDT
SYN
SYN sent
rcvd
SYNACK(seq=y,ACKnum=x
ESTAB +1)
ACK(ACKnum=y ACK(ACKnum=y
+1)
Λ +1)
CLOSE
D
Transport Layer: 3-147
TCP throughput
▪avg. TCP thruput as function of window size, RTT?
• ignore slow start, assume there is always data to send
▪W: window size (measured in bytes) where loss occurs
• avg. window size (# in-flight bytes) is ¾ W
• avg. thruput is 3/4W per RTT
3 W
avg TCP thruput bytes/
4 RT sec
=
W
T
W/
2
TCP over “long, fat pipes”
▪example: 1500 byte segments, 100ms RTT, want 10 Gbps throughput
▪requires W = 83,333 in-flight segments
▪throughput in terms of segment loss probability, L [Mathis 1997]:
1.22 . MSS
TCP throughput =
RTT L
➜ to achieve 10 Gbps throughput, need a loss rate of L = 2·10-10 – a very
small loss rate!
▪versions of TCP for long, high-speed scenarios