— notes — 7 min read
The transport layer is between the application and network layer.
A transport-layer protocol provides for logical communication between application processes running on different hosts. Logical communication here means that from an application’s perspective, it is as if the hosts running the processes were directly connected.
A process can have multiple open sockets.
Sockets have unique identifier on a system.
At the receiving end system, the transport layer examines a set of fields that identifies the receiving socket and then directs the segment to that socket.
This job of delivering the data in a transport-layer segment to the correct socket is called demultiplexing.
The job of gathering data chunks at the source host from different sockets, encapsulating each data chunk with header information (that will later be used in demultiplexing) to create segments, and passing the segments to the network layer is called multiplexing.
Transport-layer multiplexing requires: i. That sockets have unique identifiers, and ii. That each segment have special fields that indicate the socket to which the segment is to be delivered
These special fields are the source port number field and the destination port number field.
Each port number is a 16-bit number, ranging from 0 to 65535.
The port numbers ranging from 0 to 1023 are called well-known port numbers and are restricted.
Typically, the client side of the application lets the transport layer automatically (and transparently) assign the port number, whereas the server side of the application assigns a specific port number.
A UDP socket is fully identified by a two-tuple consisting of a destination IP address and a destination port number.
As shown in above, in the A-to-B segment the source port number serves as part of a “return address”—when B wants to send a segment back to A, the destination port in the B-to-A segment will take its value from the source port value of the A-to-B segment. (The complete return address is A’s IP address and the source port number).
A TCP socket is identified by a four-tuple: (source IP address, source port number, destination IP address, destination port number).
An example TCP connection flow:
Note: If the client and server are using persistent HTTP, then throughout the duration of the persistent connection the client and server exchange HTTP messages via the same server socket (after initial connection).
However, if the client and server use non-persistent HTTP, then a new TCP connection is created and closed for every request/response, and hence a new socket is created and later closed for every request/response.
UDP does just about as little as a transport protocol can do. Aside from the multiplexing/demultiplexing function and some light error checking, it adds nothing to IP.
UDP takes messages from the application process, attaches source and destination port number fields for the multiplexing/demultiplexing service, adds two other small fields, and passes the resulting segment to the network layer.
The network layer encapsulates the transport-layer segment into an IP datagram and then makes a best-effort attempt to deliver the segment to the receiving host.
If the segment arrives at the receiving host, UDP uses the destination port number to deliver the segment’s data to the correct application process.
UDP is connectionless because there is no handshaking between sending and receiving transport-layer entities before sending a segment.
Applications can build reliability/congestion control or any other services provided by TCP on top of UDP (as needed).
Benefits over TCP
The UDP segment has 4 headers and a data field containing application layer data.
Each header field consist of only 2 bytes.
Destination port: Used for demultiplexing, ie, the port numbers allow the destination host to pass the application data to the correct process running on the destination end system.
Length: Number of bytes in the UDP segment (data + headers).
Checksum: Used for error detection.
UDP uses checksum to detect if bits within the segment has been altered (eg: By noise in the links or when stored on the routers).
UDP at the sender side performs the 1s complement of the sum of all the 16-bit words in the segment, with any overflow encountered during the sum being wrapped around.
This result is put in the checksum field of the UDP segment.
Example
Suppose that we have the following three 16-bit words:
Note that this last addition had overflow, which was wrapped around. The 1s complement is obtained by converting all the 0s to 1s and converting all the 1s to 0s.
Thus the 1s complement of the sum 0100101011000010 is 1011010100111101, which becomes the checksum.
At the receiver, all four 16-bit words are added, including the checksum. If no errors are introduced into the packet, then clearly the sum at the receiver will be 1111111111111111.
If one of the bits is a 0, then we know that errors have been introduced into the packet.
Actions when error detected
When an error is detected, UDP does nothing to recover from it. Some implementation discard the segment, while others deliver the segment to the application with a warning.
Why detect errors
IP is supposed to run over any layer-2 protocol, some of which do not offer error-checks. Furthermore, even if segments are correctly transferred across a link, it’s possible that bit errors could be introduced when a segment is stored in a router’s memory.
Given that neither link-by-link reliability nor in-memory error detection is guaranteed, UDP must apply the end-to-end principle and provide error detection on an end-to-end basis.
With a reliable channel, no transferred data bits are corrupted (flipped from 0 to 1, or vice versa) or lost, and all are delivered in the order in which they were sent.
TCP is a reliable data transfer protocol that is implemented on top of an unreliable (IP) end-to-end network layer.
In this section, an assumption is made that packets cannot be reordered. Also, only unidirectional data transfer is considered.
Unidirectional data transfer: data transfer from the sending to the receiving side.
Bidirectional (that is, full-duplex) data transfer: Both sides.
RDT = Reliable data transfer protocol
UDT = Unreliable data transfer protocol
Reliable Data Transfer over a Perfectly Reliable Channel: (RDT 1.0)
Reliable Data Transfer over a Channel with Bit Errors: (RDT 2.0):