TCP, THREE-WAY HANDSHAKE, WINDOW

Slides:



Advertisements
Presentasi serupa
Pengujian Hipotesis untuk Satu dan Dua Varians Populasi
Advertisements

This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation. All.
Algoritma & Pemrograman #10
Mata Kuliah : ALGORITMA dan STRUKTUR DATA 1.
PEMOGRAMAN BERBASIS JARINGAN
Aplikasi dan Pemrograman Jaringan
Program Keahlian I – SI By Antonius Rachmat C, S.Kom
Materi Analisa Perancangan System.
Peta Kontrol (Untuk Data Variabel)
Perth Chart & Critical Path Method
IT SEBAGAI ALAT UNTUK MENCIPTAKAN KEUNGGULAN KOMPETISI
1 Pertemuan 21 Pompa Matakuliah: S0634/Hidrologi dan Sumber Daya Air Tahun: 2006 Versi: >
Process to Process Delivery
ESTIMATION AND ROONDING OF NUMBERS
PERULANGANPERULANGAN. 2 Flow of Control Flow of Control refers to the order that the computer processes the statements in a program. –Sequentially; baris.
Slide 3-1 Elmasri and Navathe, Fundamentals of Database Systems, Fourth Edition Revised by IB & SAM, Fasilkom UI, 2005 Exercises Apa saja komponen utama.
IF-ITB/SAS/25Aug2003 IF7074 – Bagian Pertama Page 1 IF 7047 Kewirausahaan Teknologi Informasi Bagian Pertama: 1.1. Entrepreneurship, entrepreneur, dan.
PROSES PADA WINDOWS Pratikum SO. Introduksi Proses 1.Program yang sedang dalam keadaan dieksekusi. 2.Unit kerja terkecil yang secara individu memiliki.
Review Operasi Matriks
TEKNOLOGI WIRELESS Modul 1 - Teknologi Wireless.
Restricting and Sorting Data
1-Sep-14 Analisis dan Perancangan Algoritma Kuliah 3 : Proof by induction E. Haodudin Nurkifli Teknik Informatika Universitas Ahmad Dahlan.
Could not load an object because it is not avaliable on this machine. Tidak dapat memuat sebuah benda karena tidak tersedia pada mesin ini.
Bilqis1 Pertemuan bilqis2 Sequences and Summations Deret (urutan) dan Penjumlahan.
Pengertian Dasar Signal
Risk Management.
VALUING COMMON STOCKS Expected return : the percentage yield that an investor forecasts from a specific investment over a set period of time. Sometimes.
KULIAH X FIREWALL KOM Keamanan Jaringan 2012/2013 KOM Keamanan Jaringan 2012/2013.
Implementing an REA Model in a Relational Database
Pendugaan Parameter part 2
MEMORY Bhakti Yudho Suprapto,MT. berfungsi untuk memuat program dan juga sebagai tempat untuk menampung hasil proses bersifat volatile yang berarti bahwa.
3 nd Meeting Chemical Analysis Steps and issues STEPS IN CHEMICAL ANALYSIS 1. Sampling 2. Preparation 3. Testing/Measurement 4. Data analysis 2. Error.
Basisdata Pertanian. After completing this lesson, you should be able to do the following Identify the available group functions Describe the use of group.
Slide 1 QUIS Langkah pertama caranya Buat di slide pertama judul Slide kedua soal Slide ketiga waktu habis Slide keempat jawaban yang benar Slide kelima.
Features Full Duplex Operation (Independent Serial Receive and Transmit Registers) Asynchronous or Synchronous Operation Master or Slave Clocked Synchronous.
LIMIT FUNGSI LIMIT FUNGSI ALJABAR.
Linked List dan Double Linked List
Definisi VLAN Pemisahan jaringan secara logis yang dilakukan pada switch Pada tradisional switch, dalam satu switch menunjukkan satu segmentasi LAN.
Amortization & Depresiasi
Contentment Philippians 4: Contentment What does it mean to be content? What does it mean to be content? Are you a content person? Are you a content.
SMPN 2 DEMAK GRADE 7 SEMESTER 2
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Fungsi dan Protokol Layer Aplikasi Network Fundamentals – Chapter 3.
1. 2 Work is defined to be the product of the magnitude of the displacement times the component of the force parallel to the displacement W = F ║ d F.
Lecture 8 Set and Dictionary Sandy Ardianto & Erick Pranata © Sekolah Tinggi Teknik Surabaya 1.
MAINTENANCE AND REPAIR OF RADIO RECEIVER Competency : Repairing of Radio Receiver.
© 2009 Fakultas Teknologi Informasi Universitas Budi Luhur Jl. Ciledug Raya Petukangan Utara Jakarta Selatan Website:
Romans 1: Romans 1:16-17 New Living Translation (NLT) 16 For I am not ashamed of this Good News about Christ. It is the power of God at work, saving.
Luas Daerah ( Integral ).
Via Octaria Malau Transfer (Internal Transfers) Transfer (Transfers Internal) Select the account from which funds are to be transferred FROM and then select.
SISTEM TERDISTRIBUSI (SILABUS dan Introduction to Distributed Systems)
Red -BlackTrees Evaliata Br Sembiring.
Menu Standard Competence Based Competence.
Retrosintetik dan Strategi Sintesis
Web Teknologi I (MKB511C) Minggu 12 Page 1 MINGGU 12 Web Teknologi I (MKB511C) Pokok Bahasan: – Text processing perl-compatible regular expression/PCRE.
Lecture 2 Introduction to C# - Object Oriented Sandy Ardianto & Erick Pranata © Sekolah Tinggi Teknik Surabaya 1.
Lecture 9 Single Linked List Sandy Ardianto & Erick Pranata © Sekolah Tinggi Teknik Surabaya 1.
Pertemuan-10. Transport Layer Protocol
WISNU HENDRO MARTONO,M.Sc
Training, Learning, and Development Strategy
1 Pertemuan 1 Pendahuluan Matakuliah: H0483 – Network Programming Tahun: 2005 Versi: 1.0.
Transport Layer Protocol
OSI LAYER.
Menulis Kolom  Kolom adalah opini atau artikel. Tidak seperti editorial, kolom memiliki byline.  Kolom Biasanya ditulis reguler. Biasanya mingguan atau.
Layer Data Link Pertemuan 13 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
DISTRIBUSI BINOMIAL.
DISTRIBUSI BINOMIAL.
TRANSPORT LAYER PROTOKOL
Chapter 4 Oktober 2010.
Master data Management
Database User Account.
Transcript presentasi:

TCP, THREE-WAY HANDSHAKE, WINDOW Lapisan Transport (2) TCP, THREE-WAY HANDSHAKE, WINDOW

TCP Topik diskusi : TCP Services TCP Features Segment A TCP Connection TCP adalah protocol yang berorientasi pada koneksi (connection-oriented protocol); TCP akan membuat sebuat koneksi virtual antara dua komputer terlebih dahulu, sebelum keduanya saling bertukar data TCP mempunyai mekanisme flow dan error control Analogi : mengirimkan berita melalui telepon Topik diskusi : TCP Services TCP Features Segment A TCP Connection Flow Control Error Control

Table 2 Well-known ports used by TCP

Figure 13 Pengiriman bytes stream

Figure 14 Sending and receiving buffers

Figure 15 TCP segments

Note Segment yang ditransfer pada setiap koneksi akan diberi nomor (baca : sequence ID) oleh TCP. Penomoran dimulai dengan nomor yang dibangkitkan secara acak (relatif)

Example 3 Dibawah ini adalah contoh penomoran pada setiap segment:

Note Nilai sekuen mendefinisikan nomor byte data pertama yang terkandung pada segment

Note Nilai dari koom acknowledgment pada segment, mendefinisikan nomor byte selanjutnya yang diharapkan akan diterima Nomor acknowledgment bersifat kumulatif.

Figure 16 Format TCP segment

Figure 17 Control field

Table 3 Description of flags in the control field

Figure 18 Connection establishment menunggakan three-way handshaking

Note A SYN segment tidak dapat membawa data, tetapi membutuhkan 1 (satu) sequence number.

Note A SYN + ACK segment tidak dapat membawa data, tetapi membutuhkan 1 (satu) sequence number.

Note Sebuah ACK segment, apabila tidak dalam mebawa data, maka ACK tidak membutuhkan satu sequence number.

Figure 19 Data transfer

Figure 20 Connection termination using three-way handshaking

Note The FIN segment membutuhkan satu sequence number apabila tidak sedang membawa data

Note The FIN + ACK segment consumes one sequence number if it does not carry data.

Figure 21 Half-close

Figure 22 Sliding window

Note A sliding window is used to make transmission more efficient as well as to control the flow of data so that the destination does not become overwhelmed with data. TCP sliding windows are byte-oriented.

Example 4 What is the value of the receiver window (rwnd) for host A if the receiver, host B, has a buffer size of 5000 bytes and 1000 bytes of received and unprocessed data? Solution The value of rwnd = 5000 − 1000 = 4000. Host B can receive only 4000 bytes of data before overflowing its buffer. Host B advertises this value in its next segment to A.

Example 5 What is the size of the window for host A if the value of rwnd is 3000 bytes and the value of cwnd is 3500 bytes? Solution The size of the window is the smaller of rwnd and cwnd, which is 3000 bytes.

Example.6 Figure 23.23 shows an unrealistic example of a sliding window. The sender has sent bytes up to 202. We assume that cwnd is 20 (in reality this value is thousands of bytes). The receiver has sent an acknowledgment number of 200 with an rwnd of 9 bytes (in reality this value is thousands of bytes). The size of the sender window is the minimum of rwnd and cwnd, or 9 bytes. Bytes 200 to 202 are sent, but not acknowledged. Bytes 203 to 208 can be sent without worrying about acknowledgment. Bytes 209 and above cannot be sent.

Figure 23 Example 23.6

Some points about TCP sliding windows: ❏ The size of the window is the lesser of rwnd and cwnd. ❏ The source does not have to send a full window’s worth of data. ❏ The window can be opened or closed by the receiver, but should not be shrunk. ❏ The destination can send an acknowledgment at any time as long as it does not result in a shrinking window. ❏ The receiver can temporarily shut down the window; the sender, however, can always send a segment of 1 byte after the window is shut down.

ACK segments do not consume sequence numbers and are not acknowledged.

Note In modern implementations, a retransmission occurs if the retransmission timer expires or three duplicate ACK segments have arrived.

No retransmission timer is set for an ACK segment. Note No retransmission timer is set for an ACK segment.

Note Data may arrive out of order and be temporarily stored by the receiving TCP, but TCP guarantees that no out-of-order segment is delivered to the process.

Figure 24 Normal operation

Figure 25 Lost segment

The receiver TCP delivers only ordered data to the process. Note The receiver TCP delivers only ordered data to the process.

Figure 26 Fast retransmission