SlideShare une entreprise Scribd logo
1  sur  50
Transport Layer PART V
Position of transport layer
Transport layer duties
Chapters Chapter 22   Process-to-Process Delivery Chapter 23   Congestion Control and QoS
Chapter 22 Process-to-Process Delivery: UDP and TCP
22.1  Process-to-Process Delivery Client-Server Paradigm Addressing Multiplexing and Demultiplexing Connectionless/Connection-Oriented Reliable/Unreliable
The transport layer is responsible for process-to-process delivery.  Note :
Figure 22.1   Types of data deliveries
Figure 22.2   Port numbers
Figure 22.3   IP addresses versus port numbers
Figure 22.4   IANA ranges
Figure 22.5   Socket address
Figure 22.6   Multiplexing and demultiplexing
Figure 22.7   Connection establishment
Figure 22.8   Connection termination
Figure 22.9   Error control
22.2  UDP Port Numbers User Datagram Applications
UDP is a connectionless, unreliable protocol that has no flow and error control. It uses port numbers to multiplex data from the application layer. Note :
Table 22.1  Well-known ports used by UDP Simple Network Management Protocol  SNMP 161 Simple Network Management Protocol (trap) SNMP 162 Trivial File Transfer Protocol TFTP    69 Remote Procedure Call RPC 111 Network Time Protocol NTP 123 Domain Name Service  Nameserver    53 Server port to download bootstrap information Bootps    67 Client port to download bootstrap information Bootpc    68 Returns the date and the time Daytime    13 Returns a quote of the day Quote    17 Returns a string of characters Chargen    19 Active users Users    11 Discards any datagram that is received Discard      9 Echo Protocol Echoes a received datagram back to the sender      7 Description Port
Figure 22.10   User datagram format
The calculation of checksum and its inclusion in the user datagram are optional.  Note :
UDP is a convenient transport-layer protocol for applications that provide flow and error control. It is also used by multimedia applications. Note :
22.3  TCP Port Numbers Services Sequence Numbers Segments Connection Transition Diagram Flow and Error Control Silly Window Syndrome
Table 22.2  Well-known ports used by TCP Remote Procedure Call RPC 111 Finger  Finger    79 Hypertext Transfer Protocol HTTP    80 Simple Mail Transfer Protocol SMTP    25 Domain Name Server  DNS    53 Bootstrap Protocol BOOTP    67 File Transfer Protocol (data connection) FTP, Data    20 File Transfer Protocol (control connection) FTP, Control    21 Terminal Network TELNET    23 Returns the date and the time Daytime    13 Returns a quote of the day Quote    17 Returns a string of characters Chargen    19 Active users Users    11 Discards any datagram that is received Discard      9 Echo Protocol Echoes a received datagram back to the sender     7 Description Port
Figure 22.11   Stream delivery
Figure 22.12   Sending and receiving buffers
Figure 22.13   TCP segments
Example 1 Imagine a TCP connection is transferring a file of 6000 bytes. The first byte is numbered 10010. What are the sequence numbers for each segment if data are sent in five segments with the first four segments carrying 1000 bytes and the last segment carrying 2000 bytes? Solution The following shows the sequence number for each segment: Segment 1   ==>   sequence number: 10,010 (range: 10,010 to 11,009) Segment 2 ==>   sequence number: 11,010 (range: 11,010 to 12,009) Segment 3   ==>   sequence number: 12,010 (range: 12,010 to 13,009) Segment 4 ==>   sequence number: 13,010 (range: 13,010 to 14,009) Segment 5 ==>   sequence number: 14,010 (range: 14,010 to 16,009)
The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a randomly generated number. Note :
The value of the sequence number field in a segment defines the number of the first data byte contained in that segment. Note :
The value of the acknowledgment field in a segment defines the number of the next byte a party expects to receive.  The acknowledgment number is cumulative. Note :
Figure 22.14   TCP segment format
Figure 22.15   Control field
Table 22.3  Description of flags in the control field Terminate the connection. FIN Synchronize sequence numbers during connection. SYN The connection must be reset. RST Push the data. PSH The value of the acknowledgment field is valid. ACK The value of the urgent pointer field is valid. URG Description Flag
Figure 22.16   Three-step connection establishment
Figure 22.17   Four-step connection termination
Table 22.4  States for TCP The server is waiting for the application to close. CLOSE-WAIT The server is waiting for the last acknowledgment. LAST-ACK The other side has accepted the closing of the connection. FIN-WAIT-2 Waiting for retransmitted segments to die. TIME-WAIT Connection is established. ESTABLISHED The application has requested the closing of the connection. FIN-WAIT-1 A connection request is sent; waiting for acknowledgment. SYN-SENT A connection request is received. SYN-RCVD The server is waiting for calls from the client. LISTEN There is no connection. Description CLOSED State
Figure 22.18   State transition diagram
A sliding window is used to make transmission more efficient as well as to control the flow of data so that the destination does not become overwhelmed with data. TCP’s sliding windows are byte-oriented. Note :
Figure 22.19   Sender buffer
Figure 22.20   Receiver window
Figure 22.21   Sender buffer and sender window
Figure 22.22   Sliding the sender window
Figure 22.23   Expanding the sender window
Figure 22.24   Shrinking the sender window
In TCP, the sender window size is totally controlled by the receiver window value (the number of empty locations in the receiver buffer). However, the actual window size can be smaller if there is congestion in the network. Note :
Some points about TCP’s sliding windows: Note : The source does not have to send a full  window’s worth of data. The size of the window can be increased or  decreased by the destination. The destination can send an acknowledgment  at any time.
Figure 22.25   Lost segment
Figure 22.26   Lost acknowledgment
Figure 22.27   TCP timers

Contenu connexe

Tendances

4c Address Mapping, Error Reporting and Multicasting
4c Address Mapping, Error Reporting and Multicasting4c Address Mapping, Error Reporting and Multicasting
4c Address Mapping, Error Reporting and Multicasting
kavish dani
 
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File TransferChapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
Wayne Jones Jnr
 

Tendances (20)

Chapter 24
Chapter 24Chapter 24
Chapter 24
 
23 Process to_Process_Delivery_UDP_TCP_and_SCTP
23 Process to_Process_Delivery_UDP_TCP_and_SCTP23 Process to_Process_Delivery_UDP_TCP_and_SCTP
23 Process to_Process_Delivery_UDP_TCP_and_SCTP
 
Ch27
Ch27Ch27
Ch27
 
Chapter 27
Chapter 27Chapter 27
Chapter 27
 
Ch28
Ch28Ch28
Ch28
 
Chapter 26
Chapter 26Chapter 26
Chapter 26
 
Ch21
Ch21Ch21
Ch21
 
08 Switching
08 Switching08 Switching
08 Switching
 
4c Address Mapping, Error Reporting and Multicasting
4c Address Mapping, Error Reporting and Multicasting4c Address Mapping, Error Reporting and Multicasting
4c Address Mapping, Error Reporting and Multicasting
 
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File TransferChapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
 
Ch 26
Ch 26Ch 26
Ch 26
 
12 Multiple Access
12 Multiple Access12 Multiple Access
12 Multiple Access
 
Ars msr 1-intradomain
Ars msr 1-intradomainArs msr 1-intradomain
Ars msr 1-intradomain
 
Chapter 29 - Mutimedia
Chapter 29 - MutimediaChapter 29 - Mutimedia
Chapter 29 - Mutimedia
 
Multicast address
Multicast addressMulticast address
Multicast address
 
Ch13
Ch13Ch13
Ch13
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks
 
Ch08
Ch08Ch08
Ch08
 
Ch18
Ch18Ch18
Ch18
 
Ch 15
Ch 15Ch 15
Ch 15
 

En vedette

En vedette (20)

DNS - Domain Name System
DNS - Domain Name SystemDNS - Domain Name System
DNS - Domain Name System
 
Port numbers
Port numbersPort numbers
Port numbers
 
Common Ports
Common PortsCommon Ports
Common Ports
 
A walk through Windows firewall and Netsh commands
A walk through Windows firewall and Netsh commandsA walk through Windows firewall and Netsh commands
A walk through Windows firewall and Netsh commands
 
Guide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System UtilitiesGuide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System Utilities
 
Webinar Gratuito: "Analisis Forense al Firewall de Windows"
Webinar Gratuito: "Analisis Forense al Firewall de Windows"Webinar Gratuito: "Analisis Forense al Firewall de Windows"
Webinar Gratuito: "Analisis Forense al Firewall de Windows"
 
Ch 27
Ch 27Ch 27
Ch 27
 
Ch 31
Ch 31Ch 31
Ch 31
 
Ch 24
Ch 24Ch 24
Ch 24
 
Ch 29
Ch 29Ch 29
Ch 29
 
Ch 28
Ch 28Ch 28
Ch 28
 
Ch 07
Ch 07Ch 07
Ch 07
 
Ch 16
Ch 16Ch 16
Ch 16
 
Ch 12
Ch 12Ch 12
Ch 12
 
Ch 23
Ch 23Ch 23
Ch 23
 
Ch 18
Ch 18Ch 18
Ch 18
 
Ch14
Ch14Ch14
Ch14
 
Ch 30
Ch 30Ch 30
Ch 30
 
Ch 14
Ch 14Ch 14
Ch 14
 
Ch 25
Ch 25Ch 25
Ch 25
 

Similaire à Ch 22

transport-layer-forouzan.pdf
transport-layer-forouzan.pdftransport-layer-forouzan.pdf
transport-layer-forouzan.pdf
AsifSalim12
 
transport layer protocols
transport layer protocolstransport layer protocols
transport layer protocols
BE Smârt
 

Similaire à Ch 22 (20)

Unit_3_TCP_UDP.ppt
Unit_3_TCP_UDP.pptUnit_3_TCP_UDP.ppt
Unit_3_TCP_UDP.ppt
 
UNIT IV-Transport Layer.pptx
UNIT IV-Transport Layer.pptxUNIT IV-Transport Layer.pptx
UNIT IV-Transport Layer.pptx
 
Cs8591 u4
Cs8591 u4Cs8591 u4
Cs8591 u4
 
transport-layer-forouzan.pdf
transport-layer-forouzan.pdftransport-layer-forouzan.pdf
transport-layer-forouzan.pdf
 
Ch23
Ch23Ch23
Ch23
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
 
DCN 5th ed. slides ch24 Transport-Layer Protocols.pdf
DCN 5th ed. slides ch24 Transport-Layer Protocols.pdfDCN 5th ed. slides ch24 Transport-Layer Protocols.pdf
DCN 5th ed. slides ch24 Transport-Layer Protocols.pdf
 
Transport layer TCP and UDP.ppt
Transport layer TCP and UDP.pptTransport layer TCP and UDP.ppt
Transport layer TCP and UDP.ppt
 
transport layer protocols
transport layer protocolstransport layer protocols
transport layer protocols
 
Ch12
Ch12Ch12
Ch12
 
Transport_layer.ppt
Transport_layer.pptTransport_layer.ppt
Transport_layer.ppt
 
Tcp udp
Tcp udpTcp udp
Tcp udp
 
Transport layer udp and tcp network
Transport layer udp and tcp networkTransport layer udp and tcp network
Transport layer udp and tcp network
 
Transportlayer.ppt
Transportlayer.pptTransportlayer.ppt
Transportlayer.ppt
 
Lec6
Lec6Lec6
Lec6
 
CNS_Module-2-ppt.pptx
CNS_Module-2-ppt.pptxCNS_Module-2-ppt.pptx
CNS_Module-2-ppt.pptx
 
unit 3 ns.ppt
unit 3 ns.pptunit 3 ns.ppt
unit 3 ns.ppt
 
tcp.pptx
tcp.pptxtcp.pptx
tcp.pptx
 
udp , tcp ,sctp
udp , tcp ,sctpudp , tcp ,sctp
udp , tcp ,sctp
 

Plus de soumya ranjan mohanty (12)

Ch 17
Ch 17Ch 17
Ch 17
 
Ch 13
Ch 13Ch 13
Ch 13
 
Ch 10
Ch 10Ch 10
Ch 10
 
Ch 11
Ch 11Ch 11
Ch 11
 
Ch 09
Ch 09Ch 09
Ch 09
 
Ch 08
Ch 08Ch 08
Ch 08
 
Ch 06
Ch 06Ch 06
Ch 06
 
Ch 05
Ch 05Ch 05
Ch 05
 
Ch 04
Ch 04Ch 04
Ch 04
 
Ch 03
Ch 03Ch 03
Ch 03
 
Ch 02
Ch 02Ch 02
Ch 02
 
Ch 1
Ch 1Ch 1
Ch 1
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Ch 22

  • 4. Chapters Chapter 22 Process-to-Process Delivery Chapter 23 Congestion Control and QoS
  • 5. Chapter 22 Process-to-Process Delivery: UDP and TCP
  • 6. 22.1 Process-to-Process Delivery Client-Server Paradigm Addressing Multiplexing and Demultiplexing Connectionless/Connection-Oriented Reliable/Unreliable
  • 7. The transport layer is responsible for process-to-process delivery. Note :
  • 8. Figure 22.1 Types of data deliveries
  • 9. Figure 22.2 Port numbers
  • 10. Figure 22.3 IP addresses versus port numbers
  • 11. Figure 22.4 IANA ranges
  • 12. Figure 22.5 Socket address
  • 13. Figure 22.6 Multiplexing and demultiplexing
  • 14. Figure 22.7 Connection establishment
  • 15. Figure 22.8 Connection termination
  • 16. Figure 22.9 Error control
  • 17. 22.2 UDP Port Numbers User Datagram Applications
  • 18. UDP is a connectionless, unreliable protocol that has no flow and error control. It uses port numbers to multiplex data from the application layer. Note :
  • 19. Table 22.1 Well-known ports used by UDP Simple Network Management Protocol SNMP 161 Simple Network Management Protocol (trap) SNMP 162 Trivial File Transfer Protocol TFTP    69 Remote Procedure Call RPC 111 Network Time Protocol NTP 123 Domain Name Service Nameserver    53 Server port to download bootstrap information Bootps    67 Client port to download bootstrap information Bootpc    68 Returns the date and the time Daytime    13 Returns a quote of the day Quote    17 Returns a string of characters Chargen    19 Active users Users    11 Discards any datagram that is received Discard      9 Echo Protocol Echoes a received datagram back to the sender      7 Description Port
  • 20. Figure 22.10 User datagram format
  • 21. The calculation of checksum and its inclusion in the user datagram are optional. Note :
  • 22. UDP is a convenient transport-layer protocol for applications that provide flow and error control. It is also used by multimedia applications. Note :
  • 23. 22.3 TCP Port Numbers Services Sequence Numbers Segments Connection Transition Diagram Flow and Error Control Silly Window Syndrome
  • 24. Table 22.2 Well-known ports used by TCP Remote Procedure Call RPC 111 Finger Finger    79 Hypertext Transfer Protocol HTTP    80 Simple Mail Transfer Protocol SMTP    25 Domain Name Server DNS    53 Bootstrap Protocol BOOTP    67 File Transfer Protocol (data connection) FTP, Data    20 File Transfer Protocol (control connection) FTP, Control    21 Terminal Network TELNET    23 Returns the date and the time Daytime    13 Returns a quote of the day Quote    17 Returns a string of characters Chargen    19 Active users Users    11 Discards any datagram that is received Discard      9 Echo Protocol Echoes a received datagram back to the sender     7 Description Port
  • 25. Figure 22.11 Stream delivery
  • 26. Figure 22.12 Sending and receiving buffers
  • 27. Figure 22.13 TCP segments
  • 28. Example 1 Imagine a TCP connection is transferring a file of 6000 bytes. The first byte is numbered 10010. What are the sequence numbers for each segment if data are sent in five segments with the first four segments carrying 1000 bytes and the last segment carrying 2000 bytes? Solution The following shows the sequence number for each segment: Segment 1 ==> sequence number: 10,010 (range: 10,010 to 11,009) Segment 2 ==> sequence number: 11,010 (range: 11,010 to 12,009) Segment 3   ==> sequence number: 12,010 (range: 12,010 to 13,009) Segment 4 ==> sequence number: 13,010 (range: 13,010 to 14,009) Segment 5 ==> sequence number: 14,010 (range: 14,010 to 16,009)
  • 29. The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a randomly generated number. Note :
  • 30. The value of the sequence number field in a segment defines the number of the first data byte contained in that segment. Note :
  • 31. The value of the acknowledgment field in a segment defines the number of the next byte a party expects to receive. The acknowledgment number is cumulative. Note :
  • 32. Figure 22.14 TCP segment format
  • 33. Figure 22.15 Control field
  • 34. Table 22.3 Description of flags in the control field Terminate the connection. FIN Synchronize sequence numbers during connection. SYN The connection must be reset. RST Push the data. PSH The value of the acknowledgment field is valid. ACK The value of the urgent pointer field is valid. URG Description Flag
  • 35. Figure 22.16 Three-step connection establishment
  • 36. Figure 22.17 Four-step connection termination
  • 37. Table 22.4 States for TCP The server is waiting for the application to close. CLOSE-WAIT The server is waiting for the last acknowledgment. LAST-ACK The other side has accepted the closing of the connection. FIN-WAIT-2 Waiting for retransmitted segments to die. TIME-WAIT Connection is established. ESTABLISHED The application has requested the closing of the connection. FIN-WAIT-1 A connection request is sent; waiting for acknowledgment. SYN-SENT A connection request is received. SYN-RCVD The server is waiting for calls from the client. LISTEN There is no connection. Description CLOSED State
  • 38. Figure 22.18 State transition diagram
  • 39. A sliding window is used to make transmission more efficient as well as to control the flow of data so that the destination does not become overwhelmed with data. TCP’s sliding windows are byte-oriented. Note :
  • 40. Figure 22.19 Sender buffer
  • 41. Figure 22.20 Receiver window
  • 42. Figure 22.21 Sender buffer and sender window
  • 43. Figure 22.22 Sliding the sender window
  • 44. Figure 22.23 Expanding the sender window
  • 45. Figure 22.24 Shrinking the sender window
  • 46. In TCP, the sender window size is totally controlled by the receiver window value (the number of empty locations in the receiver buffer). However, the actual window size can be smaller if there is congestion in the network. Note :
  • 47. Some points about TCP’s sliding windows: Note : The source does not have to send a full window’s worth of data. The size of the window can be increased or decreased by the destination. The destination can send an acknowledgment at any time.
  • 48. Figure 22.25 Lost segment
  • 49. Figure 22.26 Lost acknowledgment
  • 50. Figure 22.27 TCP timers