SlideShare ist ein Scribd-Unternehmen logo
1 von 20
 For More Slides Visit
 https://www.slideshare.net/adeel02
 https://chauhantricks.blogspot.com/
Adeel Rasheed
Connection Establishment
 A connection is a requirement of a reliable data
delivery service.
 It is set up before the actual data exchange takes place.
 The connection is used to acknowledge the receipt of
packets and retransmit those that are lost.
Requirement
 Required by connection-oriented transport protocols
like TCP
 Need connection establishment procedures to allow:
each end to know the other exists
negotiation of optional parameters
triggers allocation of transport entity resources
Ways of Establish the connection
 Two-Way Handshake
 Three-Way Handshake
Three-Way Handshake
SYN+ACK
 SYN:
 It is for synchronization of sequence numbers
 It consumes 1 sequence number
 Carries no real data
 SYN+ACK:
 SYN segment for communication in other direction and
 ACK for the received SYN
 It consumes 1 sequence number
 ACK
 Just an ACK segment
 Does not consume any sequence number
 three way handshake
SYN, SYN-ACK, ACK
 connection determined by source and destination
sockets (host, port)
 can only have a single connection between any unique
pairs of ports
 but one port can connect to multiple ports
Flow Control
 Flow control is the mechanism that ensures the rate at
which a sender is transmitting is in proportion with
the receiver’s receiving capabilities.
Flow Control Method
 Stop-and-wait
 Sliding-window
Stop-and-wait
 This is the simplest form of flow control where a sender
transmits a data frame. After receiving the frame, the
receiver indicates its willingness to accept another frame
by sending back an ACK frame acknowledging the frame
just received.
Sliding-window
 With the use of multiple frames for a single message,
the stop-and-wait protocol does not perform well.
Only one frame at a time can be in transit. In stop-
and-wait flow control, if a > 1, serious inefficiencies
result.
 Sender sliding Window:
 Receiver sliding Window:
Congestion Control
 Congestion is a situation in Communication Networks
in which too many packets are present in a part of the
subnet, performance degrades. Congestion in a
network may occur when the load on the
network (i.e. the number of packets sent to the
network) is greater than the capacity of the
network (i.e. the number of packets a network can
handle.). Network congestion occurs in case of traffic
overloading.
Causes Of Congestion
 if all of a sudden a stream of packets arrive on several
input lines and need to be out on the same output line.
 Slow processors also cause Congestion. If the router
CPU is slow at performing the task.
Effects of Congestion
 Congestion affects two vital parameters of the network
performance
 1. Through put
 2. Delay
Congestion Control Techniques
 Open loop: Protocols to prevent or avoid congestion,
ensuring that the system never enters a Congested
State.
 Close loop: Protocols that allow system to enter
congested state, detect it, and remove it.
Congestion Control Algorithms
 Leaky Bucket Algorithm
 Token Bucket Algorithm
Connection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion Control

Weitere ähnliche Inhalte

Was ist angesagt?

Internetworking
InternetworkingInternetworking
Internetworking
Raghu nath
 

Was ist angesagt? (20)

Transport layer
Transport layer Transport layer
Transport layer
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
OSI MODEL - A PROJECT
OSI MODEL - A PROJECTOSI MODEL - A PROJECT
OSI MODEL - A PROJECT
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Congestion control in TCP
Congestion control in TCPCongestion control in TCP
Congestion control in TCP
 
Icmp
IcmpIcmp
Icmp
 
Token ring
Token ringToken ring
Token ring
 
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
What Is User Datagram Protocol?
What Is User Datagram Protocol?What Is User Datagram Protocol?
What Is User Datagram Protocol?
 
Tcp
TcpTcp
Tcp
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
Multicast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksMulticast routing protocols in adhoc networks
Multicast routing protocols in adhoc networks
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
Internetworking
InternetworkingInternetworking
Internetworking
 
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram Protocol
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
Switching concepts Data communication and networks
Switching concepts Data communication and networksSwitching concepts Data communication and networks
Switching concepts Data communication and networks
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 

Ähnlich wie Connection Establishment & Flow and Congestion Control

connection establishment flowand congestion.pptx
connection establishment flowand congestion.pptxconnection establishment flowand congestion.pptx
connection establishment flowand congestion.pptx
ImXaib
 
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdfNetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
optokunal1
 
datalinklayermukesh-150130061041-conversion-gate01.pptx
datalinklayermukesh-150130061041-conversion-gate01.pptxdatalinklayermukesh-150130061041-conversion-gate01.pptx
datalinklayermukesh-150130061041-conversion-gate01.pptx
lathass5
 

Ähnlich wie Connection Establishment & Flow and Congestion Control (20)

Transport_Layer (1).pptx
Transport_Layer (1).pptxTransport_Layer (1).pptx
Transport_Layer (1).pptx
 
Transport layer
Transport layerTransport layer
Transport layer
 
Mcseminar
McseminarMcseminar
Mcseminar
 
Transport layer
Transport layerTransport layer
Transport layer
 
connection establishment flowand congestion.pptx
connection establishment flowand congestion.pptxconnection establishment flowand congestion.pptx
connection establishment flowand congestion.pptx
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot Layer
 
Data link layer
Data link layerData link layer
Data link layer
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion Avoidance
 
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKSA THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
 
A throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networksA throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networks
 
Unit 4
Unit 4Unit 4
Unit 4
 
Mobile transport layer
 Mobile transport layer Mobile transport layer
Mobile transport layer
 
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdfNetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
 
DLL
DLLDLL
DLL
 
Mc unit 4-jwfiles
Mc unit 4-jwfilesMc unit 4-jwfiles
Mc unit 4-jwfiles
 
Ba25315321
Ba25315321Ba25315321
Ba25315321
 
datalinklayermukesh-150130061041-conversion-gate01.pptx
datalinklayermukesh-150130061041-conversion-gate01.pptxdatalinklayermukesh-150130061041-conversion-gate01.pptx
datalinklayermukesh-150130061041-conversion-gate01.pptx
 
connection establishment flow and congestion control.pptx
connection establishment flow and congestion control.pptxconnection establishment flow and congestion control.pptx
connection establishment flow and congestion control.pptx
 
Chapter03 sg
Chapter03 sgChapter03 sg
Chapter03 sg
 
datalinklayermukesh
datalinklayermukeshdatalinklayermukesh
datalinklayermukesh
 

Mehr von Adeel Rasheed

Mehr von Adeel Rasheed (20)

Multan to Sukkur Motorway (M5)
Multan to Sukkur Motorway (M5)Multan to Sukkur Motorway (M5)
Multan to Sukkur Motorway (M5)
 
Religious Conflict
Religious ConflictReligious Conflict
Religious Conflict
 
R Studio (Report)
R Studio (Report)R Studio (Report)
R Studio (Report)
 
History of computer (1st to 5th Generations)
History of computer (1st to 5th Generations)History of computer (1st to 5th Generations)
History of computer (1st to 5th Generations)
 
CSS Cascade Style Sheet
CSS Cascade Style SheetCSS Cascade Style Sheet
CSS Cascade Style Sheet
 
Zooming and Its Types
Zooming and Its TypesZooming and Its Types
Zooming and Its Types
 
User Interface & Its Types
User Interface & Its TypesUser Interface & Its Types
User Interface & Its Types
 
Questions About Android Application Development
Questions About Android Application DevelopmentQuestions About Android Application Development
Questions About Android Application Development
 
Human and Machine Learning
Human and Machine LearningHuman and Machine Learning
Human and Machine Learning
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Privacy and Security Information
Privacy and Security InformationPrivacy and Security Information
Privacy and Security Information
 
Code of Conduct - Code of Practice & Standards
Code of Conduct - Code of Practice & StandardsCode of Conduct - Code of Practice & Standards
Code of Conduct - Code of Practice & Standards
 
Self Adaptive Systems
Self Adaptive SystemsSelf Adaptive Systems
Self Adaptive Systems
 
Ethernet - LAN
Ethernet - LANEthernet - LAN
Ethernet - LAN
 
Synchronous and Asynchronous Transmission
Synchronous and Asynchronous TransmissionSynchronous and Asynchronous Transmission
Synchronous and Asynchronous Transmission
 
Classes and Objects in C#
Classes and Objects in C#Classes and Objects in C#
Classes and Objects in C#
 
Intel Microprocessors 8086 Documentation
Intel Microprocessors 8086 DocumentationIntel Microprocessors 8086 Documentation
Intel Microprocessors 8086 Documentation
 
Applications of Computer
Applications of ComputerApplications of Computer
Applications of Computer
 
Hysteresis Loop
Hysteresis LoopHysteresis Loop
Hysteresis Loop
 

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Kürzlich hochgeladen (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Connection Establishment & Flow and Congestion Control

  • 1.
  • 2.  For More Slides Visit  https://www.slideshare.net/adeel02  https://chauhantricks.blogspot.com/ Adeel Rasheed
  • 3. Connection Establishment  A connection is a requirement of a reliable data delivery service.  It is set up before the actual data exchange takes place.  The connection is used to acknowledge the receipt of packets and retransmit those that are lost.
  • 4. Requirement  Required by connection-oriented transport protocols like TCP  Need connection establishment procedures to allow: each end to know the other exists negotiation of optional parameters triggers allocation of transport entity resources
  • 5. Ways of Establish the connection  Two-Way Handshake  Three-Way Handshake
  • 7.  SYN:  It is for synchronization of sequence numbers  It consumes 1 sequence number  Carries no real data  SYN+ACK:  SYN segment for communication in other direction and  ACK for the received SYN  It consumes 1 sequence number  ACK  Just an ACK segment  Does not consume any sequence number
  • 8.  three way handshake SYN, SYN-ACK, ACK  connection determined by source and destination sockets (host, port)  can only have a single connection between any unique pairs of ports  but one port can connect to multiple ports
  • 9. Flow Control  Flow control is the mechanism that ensures the rate at which a sender is transmitting is in proportion with the receiver’s receiving capabilities.
  • 10. Flow Control Method  Stop-and-wait  Sliding-window
  • 11. Stop-and-wait  This is the simplest form of flow control where a sender transmits a data frame. After receiving the frame, the receiver indicates its willingness to accept another frame by sending back an ACK frame acknowledging the frame just received.
  • 12. Sliding-window  With the use of multiple frames for a single message, the stop-and-wait protocol does not perform well. Only one frame at a time can be in transit. In stop- and-wait flow control, if a > 1, serious inefficiencies result.
  • 13.  Sender sliding Window:  Receiver sliding Window:
  • 14. Congestion Control  Congestion is a situation in Communication Networks in which too many packets are present in a part of the subnet, performance degrades. Congestion in a network may occur when the load on the network (i.e. the number of packets sent to the network) is greater than the capacity of the network (i.e. the number of packets a network can handle.). Network congestion occurs in case of traffic overloading.
  • 15. Causes Of Congestion  if all of a sudden a stream of packets arrive on several input lines and need to be out on the same output line.  Slow processors also cause Congestion. If the router CPU is slow at performing the task.
  • 16. Effects of Congestion  Congestion affects two vital parameters of the network performance  1. Through put  2. Delay
  • 17. Congestion Control Techniques  Open loop: Protocols to prevent or avoid congestion, ensuring that the system never enters a Congested State.  Close loop: Protocols that allow system to enter congested state, detect it, and remove it.
  • 18. Congestion Control Algorithms  Leaky Bucket Algorithm  Token Bucket Algorithm