Which two protocols work at the transport layer and ensures that data gets to the right applications

The transport layer is the second layer in the TCP/IP model. It is directly beneath the application layer and provides services to it. For the applications, it seems as if the two hosts are connected directly, however, they may actually be separated by a plethora of routers and other types of links.

Transport layer protocols have nothing to do with the actual network system, but they are implemented in the end systems and provide process-to-process communication. There may be many processes running on one host system, but the transport layer ensures communication between the right processes.

Transport layer protocols

Two major protocols of the transport layer are:

  • TCP
  • UDP

TCP

TCP is a connection-oriented protocol that ensures data reliability and no packet losses. It uses a three-way handshake to first establish the connection between hosts before transmitting any data. It is used in critical applications where packet loss cannot be tolerated.

UDP

UDP is a connectionless protocol that does not ensure that all the data sent by the sender will be received. It is faster than TCP and is used for video and audio transmission because some data loss can be tolerable.

Fundamental functions of the transport layer

1) Connection between hosts

It is responsible for end-to-end connection and data transfer between two different end systems. It relies on the lower layers to achieve this.

2) Multiplexing and Demultiplexing

To allow process-to-process communication, the transport layer uses socketsCombination of IP address and port number. One port number is assigned to a running process in a host system. These port numbers are used to distinguish the different processes that may be running at the same host.

When multiple applications need to send data from one host, this data is collected and encapsulated into transport layer segments with information related to the host and process that they are being sent to. This is called multiplexing – the information in the transport layer headers is used by the receiver for demultiplexing.

Demultiplexing refers to delivering the received data to the correct process in a host.

3) Error detection

During transmission, it is possible that the data may get corrupted. Data integrity is checked by the transport layer by using different mechanisms such as a checksum.

Moreover, in TCP, acknowledgments and negative acknowledgments are sent by the receiver back to the sender to indicate whether or not the correct(or any) data was received.

4) Reliable data transfer

TCP provides additional reliability services on top of the ones provided by the network layer. It ensures that there are no errors in the data, no losses, no duplicates, and that all the data chunks are received and put together in order.

5) Congestion and flow control

When there is a lot of traffic in the network, packets start to get dropped by the routers because their limit is exceeded. This results in retransmission of the lost data which increases the congestion even more. TCP implements congestion control using an algorithm that has the following parts:

  • Slow Start
  • Congestion Avoidance
  • Fast Recovery

Another problem solved by TCP is that of flow control. A receiver may be overwhelmed if a lot of data is received at the same time and its capacity is reached. TCP ensures that the sender does not transmit more data than the receiver’s capacity.

Security threats

  • Fingerprinting: A TCP segment may be sent to a system and the response analyzed to find out the host’s OS, network configuration, hardware devices, and more information. This can be the first step of a bigger attack.
  • Downgrade Attack: The host is forced to employ an older, weaker method of data transmission that is actually meant for backward compatibility.
  • TCP/UDP Flooding Attack: A kind of denial of service attack. The attacker overwhelms the victim by sending a huge amount of pings.
  • TCP Sequence Prediction Attack: TCP uses sequence numbers to ensure that the packets are received in order. An attacker may observe the data being transmitted to a system, predict the next sequence number that would be sent to the victim, spoof the IP of the sender, and send malicious data to the receiver with the predicted sequence number so that the victim trusts this source.

  • The transport layer is a 4th layer from the top.
  • The main role of the transport layer is to provide the communication services directly to the application processes running on different hosts.
  • The transport layer provides a logical communication between application processes running on different hosts. Although the application processes on different hosts are not physically connected, application processes use the logical communication provided by the transport layer to send the messages to each other.
  • The transport layer protocols are implemented in the end systems but not in the network routers.
  • A computer network provides more than one protocol to the network applications. For example, TCP and UDP are two transport layer protocols that provide a different set of services to the network layer.
  • All transport layer protocols provide multiplexing/demultiplexing service. It also provides other services such as reliable data transfer, bandwidth guarantees, and delay guarantees.
  • Each of the applications in the application layer has the ability to send a message by using TCP or UDP. The application communicates by using either of these two protocols. Both TCP and UDP will then communicate with the internet protocol in the internet layer. The applications can read and write to the transport layer. Therefore, we can say that communication is a two-way process.
Which two protocols work at the transport layer and ensures that data gets to the right applications

Services provided by the Transport Layer

The services provided by the transport layer are similar to those of the data link layer. The data link layer provides the services within a single network while the transport layer provides the services across an internetwork made up of many networks. The data link layer controls the physical layer while the transport layer controls all the lower layers.

The services provided by the transport layer protocols can be divided into five categories:

  • End-to-end delivery
  • Addressing
  • Reliable delivery
  • Flow control
  • Multiplexing
Which two protocols work at the transport layer and ensures that data gets to the right applications

End-to-end delivery:

The transport layer transmits the entire message to the destination. Therefore, it ensures the end-to-end delivery of an entire message from a source to the destination.

Reliable delivery:

The transport layer provides reliability services by retransmitting the lost and damaged packets.

The reliable delivery has four aspects:

  • Error control
  • Sequence control
  • Loss control
  • Duplication control
Which two protocols work at the transport layer and ensures that data gets to the right applications

Error Control

  • The primary role of reliability is Error Control. In reality, no transmission will be 100 percent error-free delivery. Therefore, transport layer protocols are designed to provide error-free transmission.
  • The data link layer also provides the error handling mechanism, but it ensures only node-to-node error-free delivery. However, node-to-node reliability does not ensure the end-to-end reliability.
  • The data link layer checks for the error between each network. If an error is introduced inside one of the routers, then this error will not be caught by the data link layer. It only detects those errors that have been introduced between the beginning and end of the link. Therefore, the transport layer performs the checking for the errors end-to-end to ensure that the packet has arrived correctly.
Which two protocols work at the transport layer and ensures that data gets to the right applications

Sequence Control

  • The second aspect of the reliability is sequence control which is implemented at the transport layer.
  • On the sending end, the transport layer is responsible for ensuring that the packets received from the upper layers can be used by the lower layers. On the receiving end, it ensures that the various segments of a transmission can be correctly reassembled.

Loss Control

Loss Control is a third aspect of reliability. The transport layer ensures that all the fragments of a transmission arrive at the destination, not some of them. On the sending end, all the fragments of transmission are given sequence numbers by a transport layer. These sequence numbers allow the receiver?s transport layer to identify the missing segment.

Duplication Control

Duplication Control is the fourth aspect of reliability. The transport layer guarantees that no duplicate data arrive at the destination. Sequence numbers are used to identify the lost packets; similarly, it allows the receiver to identify and discard duplicate segments.

Flow Control

Flow control is used to prevent the sender from overwhelming the receiver. If the receiver is overloaded with too much data, then the receiver discards the packets and asking for the retransmission of packets. This increases network congestion and thus, reducing the system performance. The transport layer is responsible for flow control. It uses the sliding window protocol that makes the data transmission more efficient as well as it controls the flow of data so that the receiver does not become overwhelmed. Sliding window protocol is byte oriented rather than frame oriented.

Multiplexing

The transport layer uses the multiplexing to improve transmission efficiency.

Multiplexing can occur in two ways:

  • Upward multiplexing: Upward multiplexing means multiple transport layer connections use the same network connection. To make more cost-effective, the transport layer sends several transmissions bound for the same destination along the same path; this is achieved through upward multiplexing.
Which two protocols work at the transport layer and ensures that data gets to the right applications
  • Downward multiplexing: Downward multiplexing means one transport layer connection uses the multiple network connections. Downward multiplexing allows the transport layer to split a connection among several paths to improve the throughput. This type of multiplexing is used when networks have a low or slow capacity.
Which two protocols work at the transport layer and ensures that data gets to the right applications

Addressing

  • According to the layered model, the transport layer interacts with the functions of the session layer. Many protocols combine session, presentation, and application layer protocols into a single layer known as the application layer. In these cases, delivery to the session layer means the delivery to the application layer. Data generated by an application on one machine must be transmitted to the correct application on another machine. In this case, addressing is provided by the transport layer.
  • The transport layer provides the user address which is specified as a station or port. The port variable represents a particular TS user of a specified station known as a Transport Service access point (TSAP). Each station has only one transport entity.
  • The transport layer protocols need to know which upper-layer protocols are communicating.
Which two protocols work at the transport layer and ensures that data gets to the right applications

Which two protocols works at the transport layer?

Transport layer protocols, namely, Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), identify applications communicating with each other by means of port numbers.

What are the two transport protocols?

In the IP protocol stack, the most widely used two transport protocols are User Datagram Protocol (UDP) and the Transport Control Protocol (TCP).

Which transport layer protocol is used for reliable data transport?

Transmission Control Protocol (TCP) The Transmission Control Protocol (TCP) is a widely used connection-oriented transport layer protocol that provides reliable transfer of data between two end points, and includes mechanisms to handle flow-control, segmentation, error recovery, and multiplexing.

What are the two most common transport protocols?

Even though many transport layer protocols exist, the two most commonly used protocols are the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP).