Home > TCP and UDP Tutorial

TCP and UDP Tutorial

September 20th, 2016 Go to comments

TCP Features

Some popular TCP features we will learn here are: Multiplexing using port numbers, Flow control using windowing and Reliability (Error Detection and Error recovery)

Multiplexing using port numbers

Suppose you are using a laptop for web browsing, email communicating and FTP uploading at the same time. All of them require using TCP while your laptop only has one IP address (with one network card) so how your laptop knows which packets received from the Internet are dedicated for which application?

Above question is solved with port numbers. Each application will use a different and available port number to communicate with outside world. For example your laptop can choose port 50000 for web browsing, port 50001 for email communicating and port 50002 for FTP uploading.

TCP_Multiplexing_port_numbers.jpg

Notice that your laptop can choose any available source port but it must use pre-defined destination ports for well-known services. Port numbers are defined in three ranges:
+ Well-known port numbers (0 through 1023): assigned to key or core services that systems offer
+ Registered port numbers (1024 through 49151): assigned to industry applications and processes. For example: 1433 is assigned for Microsoft SQL Server process)
+ Dynamic port numbers (49152 through 65535): used as temporary ports for specific communications. Our laptop can use these ports for communication

The table below lists TCP ports for well-known services:

TCP Service Description Port
FTP File Transfer Protocol 20, 21
SSH Secure shell 22
Telnet Terminal network 23
SMTP Simple Mail Transfer Protocol 25
DNS Domain Name Server 53
HTTP Hyper Text Transfer Protocol 80
NTP Network Time Protocol 123
HTTPS Hyper Text Transfer Protocol Secure 443

Note: There are some other well-known ports that are not listed here. The well-known ports are assigned by the Internet Assigned Numbers Authority ( IANA) in the range of 0 to 1023.

Multiplexing relies on a concept called a socket. A socket consists of three things:

+ An IP address
+ A transport protocol
+ A port number

So suppose the IP address on our laptop is 123.1.1.1 and use TCP to access web server with port 50000, we may write the socket (123.1.1.1, TCP, 50000). For web server application running on the Web Server with IP 200.1.1.1 the socket should be (200.1.1.1, TCP, 80) as the web server uses the well-known port 80 for HTTP.

The socket on each computer is unique so the connection between two sockets on two computers identify a unique connection between them. Therefore you can use multiple applications on the same computer at the same time. Each application will use a unique source port so they cannot interfere with each other.

We only mentioned about source ports but notice TCP header requires both source port and destination port. That means if our laptop wants to connect to a Web Server it must include the destination port in TCP header as well. The destination port for Web Server in this case is 80. When the Web Server replies to our laptop, it uses the laptop’s source port as its destination port (50000 in this case).

TCP_Source_Port_Destination_Port.jpg

 

Note: Both TCP and UDP use multiplexing with port numbers for their services.

Flow-control using windowing

In the TCP header there is a field called “Window” which plays an important role in the TCP transmission. A “Window” specifies the number of segments the sender can forward without receiving an acknowledgment. It is the key to transfer data and flow control efficiently. Let’s see how it works!

After the TCP connection has been established, both the client and server use this Window field to tell the other how many bytes of data it is willing to receive at one time before sending an acknowledgement to the sender. The larger the window size number (in bytes), the greater the amount of data that the host can transmit. For example, with a Window size of 1 (byte), every one byte must be acknowledged before sending the next one.

TCP_Simple_Window_Sliding.jpg

But waiting for ACK after each segment would be very inefficient. So TCP tries to increase the Window size to 3 (bytes), which means every three bytes can be received before sending the acknowledgement.

TCP_Window_Sliding.jpg

As you can see, the bigger the Window size, the fewer ACKs needed to be sent and the more efficient the transmission is. So the receiver will try to increase the Window size after each successful transmission so that the sender can send more. But the Window size cannot increase forever, TCP stops increasing the Window size when the receiver does not send an ACK (within a specific time period) or when the Window size reaches its maximum value. If a congestion occurs on the link then TCP may decrease the Window size.

The window size is variable during the lifetime of a connection so we often refer it as a “sliding window”.

If the sender does not receive the ACK in time, it knows that the segments should be resent, and that the transmission rate should be slowed down. Suppose Host A did not receive the expecting ACK 7 then it knows segments 4, 5, 6 should be resent.

TCP_Window_Sliding_error.jpg

Reliability (Error Detection and Error recovery)

This is the most important feature of TCP. TCP must recover from data that is damaged, lost, duplicated during the transmission. But please grasp the difference between error detection and error recovery first:
+ Error detection: the detection of errors during the transmission. Error detection does not repair corrupted data, it just detects it
+ Error recovery: the detection of errors and repair them

To achieve error detection, TCP adds some extra bits to the data, called checksum. A TCP sender computes the checksum value based on the contents of the TCP header and data fields. This 16-bit value will be compared with the value the receiver generates using the same computation. If the values match, the receiver can believe that segment arrived intact. If the values do not match, the receiver indicates an error occurred and the segment is discarded and a notification will be sent to the receiver depending on how the TCP stack is implemented on the receiver’s operating system.

To achieve error recovery, TCP uses the Sequence number (at the sender’s side) and Acknowledgement fields (at the receiver’s side) in the TCP header. These two fields are also used to find out lost, duplicated segments. Let’s see an example.

In the transmission below, host A sends three segments 1, 2, 3 to host B. Segment 2 was lost while segment 3 arrived to Host B. Then Host B replied with an ACK 2, implying that it is expecting segment 2 next. Host A can re-send another segment 2 to recover the lost segment. If Host B receive that segment it will ask for the segment 4 (because it already has segment 3).

TCP_Error_Recovery.jpgError recovery

You may ask “what will happen if the ACK 2 sent from Host B is also lost?” In fact, after sending each segment Host A sets a retransmission timer, just in case the ACK is lost (or all the sending segments are lost; Host B would not send ACK in this case because it did not receive anything). If this timer expires, Host A will send all the segments again.

Note: UDP does support error detection (via checksum) but it does not support error recovery. If UDP finds a corrupted segment, it just simply drop it.

Let’s sum up all things we learned about TCP and UDP so far.

Same:

+ Both TCP and UDP operate at Transport Layer
+ Both TCP and UDP use Multiplexing via port numbers

Difference:

TCP UDP
Reliable Unreliable
Connection-oriented Connectionless
Segment retransmission and flow control through windowing No retransmission or windowing
Segment sequence No sequencing
Acknowledge segment No acknowledgement
Start and end the communication by three-way handshake and four-way termination No action is required before and after sending real data

Finally we show the TCP and UDP header in detail for your reference. There are some fields which are out of scope of this tutorial.

tcp_header.jpgTCP Header (20 bytes)

Notice about the FLAG fields (between the “Reserved” and “Window Size” fields). If SYN bit is turned on, it is a SYN message. If ACK bit is turned on, it is an ACK message. If both SYN and ACK bits are turned on, it is a SYN-ACK message.

And this is the UDP header:

UDP_header.jpgUDP Header (8 bytes)

Comments (6) Comments
Comment pages
1 2 2834
  1. GifaKing
    February 16th, 2017

    Please send latest 640-911 DCICN & 640-916 DCICT as well as CCNA dumps to {email not allowed}

  2. GifaKing
    February 16th, 2017

    Please send latest 640-911 DCICN & 640-916 DCICT as well as CCNA dumps .

  3. ulp
    February 18th, 2017

    great

  4. PPPoE
    February 18th, 2017

    Is 171q still valid? I’m planning to test on Monday .

  5. 640-911 CCNA DATA CENTER 640-916
    February 21st, 2017

    Get instant Download here 640-911 DCICN & 640-916 DCICT as well as CCNA dumps

    http://rarme.com/?bD1QJ

  6. Pedro
    February 23rd, 2017

    Hi GifaKing,
    You can find answers by taking practice questions exams at the following address:
    http://www.exam-labs.com/info/200-125
    It covers basic learning material similar in content like TCP and UDP tutorial but in Q&A form.

Comment pages
1 2 2834