DCN PDF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 25

DCN

Seminar on
TCP/IP
Karthikeyini S
(181CA119)
Sandhya S
(181CA149)

Dr. NGPASC
COIMBATORE | INDIA
Introduction to TCP/IP
TCP/IP

• The TCP/IP model was developed prior to the OSI model.


• The TCP/IP model is not exactly similar to the OSI model.
• The TCP/IP model consists of five layers: the application layer, transport
layer, network layer, data link layer and physical layer.
• TCP/IP is a hierarchical protocol made up of interactive modules, and
each of them provides specific functionality.

Dr. NGPASC
COIMBATORE | INDIA
• it was designed and developed by Department of Defense (DoD)
in 1960s and is based on standard protocols.
• It stands for Transmission Control Protocol/Internet Protocol.
• The TCP/IP model is a concise version of the OSI model.
• contains four layers, unlike seven layers in the OSI model.

Dr. NGPASC
COIMBATORE | INDIA
TCP/IP MODEL

Layers in TCP/IP Model

The TCP/IP Model has four layers:

1. Physical Layer and data link layer – combined


known as host-to-network layer

2. Network layer

3. Transport

4. Application

Dr. NGPASC
COIMBATORE | INDIA
Functions of the layer:
1.Physical characteristics of interfaces
and media
2. Representation of bits]
3. Data rate
4. Synchronization of bits
5.Line configuration
6. Physical Topology
7. Transmission mode
8. Framing
9. Physical addressing
10. Flow control
11.Error control
12. Access control

Dr. NGPASC
COIMBATORE | INDIA
1.Physical characteristics of interfaces and media

•The physical layer defines the characteristics of the interface between


the devices and the transmission medium.
• Transmission medium – it is the path between the two devices (nodes).
•Types of Transmission media
Two types

Wired Wireless

1.Co-axial 1. Radio waves


2.Twisted pair 2.Microwaves
3. Fiber optic 3.Cellular Telephony
4. Satellite

Dr. NGPASC
COIMBATORE | INDIA
2.Represenation of bits:
•Physical layer receives the message from data link layer and convert into
number of bits.
•To be transmitted , the bits is encoded in to signals i.e, electrical or Optical.

3. Data Rate:
The Physical layer also defines the transmission rate i.e. the number of
bits sent per second.

4.Synchronization of bits:
•The physical layer provides the synchronization of the bits by providing a
clock. This clock controls both sender and receiver thus providing
synchronization at bit level.

5.Line Configuration:
•It defines the way how two or more devices can be connected physically.

Dr. NGPASC
COIMBATORE | INDIA
6. Topology: 
It defines the way how network devices are arranged.

Types of topology are

Dr. NGPASC
COIMBATORE | INDIA
7. Transmission mode:
• It defines the transmission mode whether it is simplex, half-duplex or
full-duplex mode between the two devices on the network.

1.Simplex

3.Full duplex:
2. Half duplex

Hub, Repeater, Modem, Cables are Physical Layer devices.

Dr. NGPASC
COIMBATORE | INDIA
8. Framing:
The data link layer translates the physical's raw bit stream into
packets known as Frames. The Data link layer adds the header and
trailer to the frame. The header which is added to the frame contains
the hardware destination and source address.

9. Physical addressing:

The Data link layer adds a header to the frame that contains a
destination address. The frame is transmitted to the destination
address mentioned in the header.
10. Flow control :
• Flow control coordinates the amount of data that can be sent before
receiving acknowledgement
• It is one of the most important functions of data link layer.
11. Error control

•Error control includes both error detection and error correction.


•It allows the receiver to inform the sender if a frame is lost or damaged
during transmission and coordinates the retransmission of those frames
by the sender.
•Error control in the data link layer is based on automatic repeat request
(ARQ). Whenever an error is detected, specified frames are retransmitted.
Types of error control:
1. Stop-and-Wait
2. Go-Back-N ARQ
3. Selective-Repeat ARQ

12. Access Control:


• When two or more devices are connected to the same communication
channel, then the data link layer protocols are used to determine which
device has control over the link at a given time.

Dr. NGPASC
COIMBATORE | INDIA
2.Internet layer / network layer
•An internet layer is the second layer of the TCP/IP model.
•An internet layer is also known as the network layer.
•The main responsibility of the internet layer is to send the packets from
any network, and they arrive at the destination irrespective of the route
they take.
•Protocols used in the layers is IP Protocol, ARP protocol and ICMP
protocol.
•Function of the IP protocol are
1. IP Addressing
2. Host-to-host communication
3. Data Encapsulation and Formatting
4. Fragmentation and Reassembly
5. Routing:

Dr. NGPASC
COIMBATORE | INDIA
IP Addressing: This protocol implements logical host addresses known as
IP addresses. The IP addresses are used by the internet and higher layers
to identify the device and to provide internetwork routing.

Host-to-host communication: It determines the path through which the


data is to be transmitted.

Data Encapsulation and Formatting: An IP protocol accepts the data from


the transport layer protocol. An IP protocol ensures that the data is sent
and received securely, it encapsulates the data into message known as IP
datagram.

Routing: When IP datagram is sent over the same local network such as


LAN, MAN, WAN, it is known as direct delivery. When source and destination
are on the distant network, then the IP datagram is sent indirectly. This can
be accomplished by routing the IP datagram through various devices such
as routers.

Dr. NGPASC
COIMBATORE | INDIA
ARP Protocol

•ARP stands for Address Resolution Protocol.


•ARP is a network layer protocol which is used to find the physical address
from the IP address.
•The two terms are mainly associated with the ARP Protocol:
•ARP request: When a sender wants to know the physical address of
the device, it broadcasts the ARP request to the network.
•ARP reply: Every device attached to the network will accept the ARP
request and process the request, but only recipient recognize the IP
address and sends back its physical address in the form of ARP reply.
The recipient adds the physical address both to its cache memory and
to the datagram header

Dr. NGPASC
COIMBATORE | INDIA
ICMP Protocol
•ICMP stands for Internet Control Message Protocol.
•It is a mechanism used by the hosts or routers to send notifications regarding
datagram problems back to the sender.
•A datagram travels from router-to-router until it reaches its destination. If a
router is unable to route the data because of some unusual conditions such as
disabled links, a device is on fire or network congestion, then the ICMP protocol
is used to inform the sender that the datagram is undeliverable.
•An ICMP protocol mainly uses two terms:
•ICMP Test: ICMP Test is used to test whether the destination is reachable
or not.
•ICMP Reply: ICMP Reply is used to check whether the destination device is
responding or not.
•The core responsibility of the ICMP protocol is to report the problems, not
correct them. The responsibility of the correction lies with the sender.
•ICMP can send the messages only to the source, but not to the intermediate
routers because the IP datagram carries the addresses of the source and
Dr. NGPASC
COIMBATORE
destination | INDIA
but not of the router that it is passed to.
3.Transport layer

The transport layer is responsible for the reliability, flow


control, and correction of data which is being sent over the
network.
Function of the Transport layer

1. Service point addressing


2. Segmentation and reassembly
3. Flow control
4. Error control
5. Connection control

Dr. NGPASC
COIMBATORE | INDIA
Protocols used in the layers are
1.UDP
2.TCP

1. User Datagram Protocol (UDP): It provides connectionless service and


end-to-end delivery of transmission.
It is an unreliable protocol as it discovers the errors but not specify the
error.
User Datagram Protocol discovers the error, and ICMP protocol reports
the error to the sender that user datagram has been damaged.

UDP consists of the following fields:


i)Source port address: The source port address is the address of the
application program that has created the message.
Ii) Destination port address: The destination port address is the address of
the application program that receives the message.
Iii) Total length: It defines the total number of bytes of the user datagram in
bytes.
Iv) Checksum: The checksum is a 16-bit field used in error detection.
UDP does not specify which packet is lost. UDP contains only checksum; it
does not contain any ID of a data segment.

Dr. NGPASC
COIMBATORE | INDIA
Dr. NGPASC
COIMBATORE | INDIA
2. Transmission Control Protocol
• Transmission Control Protocol (TCP)It provides a full transport layer
services to applications.
•It creates a virtual circuit between the sender and receiver, and it is
active for the duration of the transmission.
•TCP is a reliable protocol as it detects the error and retransmits the
damaged frames. Therefore, it ensures all the segments must be
received and acknowledged before the transmission is considered to be
completed and a virtual circuit is discarded.
•At the sending end, TCP divides the whole message into smaller units
known as segment, and each segment contains a sequence number
which is required for reordering the frames to form an original message.
•At the receiving end, TCP collects all the segments and reorders them
based on sequence numbers.

Dr. NGPASC
COIMBATORE | INDIA
4.Application layer

•An application layer is the topmost layer in the TCP/IP model.


•It is responsible for handling high-level protocols, issues of representation.
•This layer allows the user to interact with the application.
•When one application layer protocol wants to communicate with another
application layer, it forwards its data to the transport layer.
•There is an ambiguity occurs in the application layer. Every application cannot
be placed inside the application layer except those who interact with the
communication system. For example: text editor cannot be considered in
application layer while web browser using HTTP protocol to interact with the
network where HTTP protocol is an application layer protocol.

Dr. NGPASC
COIMBATORE | INDIA
Protocols used in the layers are

HTTP, SNMP, SMTP, DNS, TELNET, FTP etc.

HTTP: HTTP stands for Hypertext transfer protocol, it allows the user to


interact with world wide web through the browser application. HTTP can
be used to transfer various types of data such as plain text, audio, video
etc
.
FTP: FTP stands for File Transfer Protocol. This protocol is used for
transmitting files from one system to another system.

TELNET: TELNET is a client-server protocol. It is a reliable connection


oriented protocol. This protocol is used on internet or on LAN to provide
a bidirectional (both ways) text based communication through a virtual
terminal connection
.
DNS: DNS stands for Domain Name System. Each computer on a
network has different IP address, a computer is known by its IP address.
DNS provides a mapping to a name to the IP Address so a name can be
used to identify a system on network rather than IP address itself.

SNMP: SNMP stands for Simple Network Management Protocol. It


managers the devices connected to the internet using TCP/IP protocol.

SMTP: SMTP stands for Simple mail transfer protocol. It is used for email
services, using this protocol a email containing data can be sent to
another email address.

Dr. NGPASC
COIMBATORE | INDIA
Dr. NGPASC
COIMBATORE | INDIA
Advantages of TCP/IP

Here, are pros/benefits of using the TCP/IP model:


• It helps you to establish/set up a connection between
different types of computers.
• It operates independently of the operating system.
• It supports many routing-protocols.
• It enables the internetworking between the
organizations.
• TCP/IP model has a highly scalable client-server
architecture.
• It can be operated independently.
• Supports a number of routing protocols.
• NGPASC
Dr. It can be used to establish a connection between two
COIMBATORE | INDIA
computers.
Disadvantages of TCP/IP

Here, are few drawbacks of using the TCP/IP model:


• TCP/IP is a complicated model to set up and manage.
• The shallow/overhead of TCP/IP is higher-than IPX
(Internetwork Packet Exchange).
• In this, model the transport layer does not guarantee
delivery of packets.
• Replacing protocol in TCP/IP is not easy.
• It has no clear separation from its services, interfaces,
and protocols.

Dr. NGPASC
COIMBATORE | INDIA

You might also like