DCC MP
DCC MP
MICRO PROJECT
Academic year: 2022-2023
Semester: FOURTH
Course/Code: Data Communication and Computer Network (22414)
Name: _____________________________________________________
Certificate
Subject Teacher
Mrs.Romali Patil Head of the Department Principal
Annexure – I
Part A: Micro Project Proposal
Processor: i3
1. Computer 1
RAM : 4.00 GB
2. Microsoft Word Word -2016
3. Printer Hp Laser Jet 1
Mrs.Romali Patil
Annexure- II
Rationale:
The aim is to communicate effectively and skilfully at work place
2. 0 Course Outcomes Integrated:
1. Communicating effectively by avoiding barriers in formal and informal
situations
2. communicate skilfully using non-verbal methods
3. Give presentations by using audio visual aids
4. Write reports using correct guidelines 5. compose e-mail and formal
business letters
3.0 Actual Procedure Followed.
1 Discussion about topic with guide and among
group members 2 Literature survey
3 Information collection
4 Compilation of content
5 Editing and revising content
6 Report Preparation
Literature Survey/Information
2. Collection
3. Project Proposal
6. Quality of Prototype/Model
7. Report Preparation
8. Presentation
9. Viva
Annexure- IV
Name of Candidate:
__________________________________________________________
TCP/IP Layer
Working of TCP
To make sure that each message reaches its target location intact, the
TCP/IP model breaks down the data into small bundles and afterward
reassembles the bundles into the original message on the opposite end.
Sending the information in little bundles of information makes it simpler to
maintain efficiency as opposed to sending everything in one go.
After a particular message is broken down into bundles, these bundles may
travel along multiple routes if one route is jammed but the destination
remains the same.
We can see that the message is being broken down, then reassembled from a different order at the
destination
For example, when a user requests a web page on the internet, somewhere
in the world, the server processes that request and sends back an HTML
Page to that user. The server makes use of a protocol called the HTTP
Protocol. The HTTP then requests the TCP layer to set the required
connection and send the HTML file.
Now, the TCP breaks the data into small packets and forwards it toward the
Internet Protocol (IP) layer. The packets are then sent to the destination
through different routes.
The TCP layer in the user’s system waits for the transmission to get finished
and acknowledges once all packets have been received.
Features of TCP/IP
Some of the most prominent features of Transmission control protocol are
1. Segment Numbering System
TCP keeps track of the segments being transmitted or received by
assigning numbers to each and every single one of them.
A specific Byte Number is assigned to data bytes that are to be transferred
while segments are assigned sequence numbers.
Acknowledgment Numbers are assigned to receive segments.
2. Flow Control
Flow control limits the rate at which a sender transfers data. This is done
to ensure reliable delivery.
The receiver continually hints to the sender on how much data can be
received (using a sliding window)
3. Error Control
TCP implements an error control mechanism for reliable data transfer
Error control is byte-oriented
Segments are checked for error detection
Error Control includes – Corrupted Segment & Lost Segment Management,
Out-of-order segments, Duplicate segments, etc.
4. Congestion Control
TCP takes into account the level of congestion in the network
Congestion level is determined by the amount of data sent by a sender
Advantages
It is a reliable protocol.
It provides an error-checking mechanism as well as one for recovery.
It gives flow control.
It makes sure that the data reaches the proper destination in the exact order
that it was sent.
Open Protocol, not owned by any organization or individual.
It assigns an IP address to each computer on the network and a domain
name to each site thus making each device site to be distinguishable over
the network.
Disadvantages
TCP is made for Wide Area Networks, thus its size can become an issue
for small networks with low resources.
TCP runs several layers so it can slow down the speed of the network.
It is not generic in nature. Meaning, it cannot represent any protocol stack
other than the TCP/IP suite. E.g., it cannot work with a Bluetooth
connection.
No modifications since their development around 30 years ago.
Error control in TCP is mainly done through the use of three simple
techniques:
1. Checksum – Every segment contains a checksum field which is used
to find corrupted segments. If the segment is corrupted, then that
segment is discarded by the destination TCP and is considered lost.
2. Acknowledgement – TCP has another mechanism called
acknowledgement to affirm that the data segments have been delivered.
Control segments that contain no data but have sequence numbers will
be acknowledged as well but ACK segments are not acknowledged.
3. Retransmission – When a segment is missing, delayed to deliver
to a receiver, corrupted when it is checked by the receiver then that
segment is retransmitted again. Segments are retransmitted only during
two events: when the sender receives three duplicate acknowledgements
(ACK) or when a retransmission timer expires.
Retransmission after RTO: TCP always preserves one
retransmission time-out (RTO) timer for all sent but not acknowledged
segments. When the timer runs out of time, the earliest segment is
retransmitted. Here no timer is set for acknowledgement. In TCP, the
RTO value is dynamic in nature and it is updated using the round trip
time (RTT) of segments. RTT is the time duration needed for a
segment to reach the receiver and an acknowledgement to be
received by the sender.
Retransmission after Three duplicate ACK
segments: RTO method works well when the value of RTO is small.
If it is large, more time is needed to get confirmation about whether a
segment has been delivered or not. Sometimes one segment is lost
and the receiver receives so many out-of-order segments that they
cannot be saved. In order to solve this situation, three duplicate
acknowledgement method is used and missing segment is
retransmitted immediately instead of retransmitting already delivered
segment. This is a fast retransmission because it makes it possible to
quickly retransmit lost segments instead of waiting for timer to end.
TYPES OF MODES
1. Simplex Mode :
Simplex mode is as on a one-way street, the communication is unidirectional,
as on a one-way street. In this, only one of the two devices on a link can
transmit, and the other can only receive. This mode uses the entire capacity
of the channel to send data in one direction.
Example:- keyboard and monitor.
2. Half-duplex mode:
Half-duplex mode is when the sender can send the data and also can
receive the data one at a time. It is two-way directional i.e. bi-directional
communication but one at a time.
Example:- Walkie-Talkies.
1. Control Structure :
Control Structure, as name suggests, is basically a set of statements and
control statements that are controlling their execution.
2. Control Statement:
Control Statement, as name suggests, is basically a statement that is used
to determine control flow of set of statements. It makes decision on basis of
condition provided by statement or on basis of values and logic.
There is no
Sequencing of data is a feature sequencing of data
of Transmission Control Protocol in UDP. If the order
(TCP). This means that packets is required, it has to
arrive in order at the receiver. be managed by the
Sequence application layer.
Transmission control User datagram
Basis protocol (TCP) protocol (UDP)
UDP is faster,
TCP is comparatively slower
simpler, and more
than UDP.
Speed efficient than TCP.
There is no
retransmission of
Retransmission of lost packets is
lost packets in the
possible in TCP, but not in UDP.
User Datagram
Retransmission Protocol (UDP).
It’s a connectionless
Uses handshakes such as SYN,
Handshaking protocol i.e. No
ACK, SYN-ACK
Techniques handshake
UDP is used
TCP is used by HTTP, by DNS, DHCP,
HTTPs, FTP, SMTP and Telnet. TFTP, SNMP, RIP,
Protocols and VoIP.
Conclusion
Now that we've discussed some of the major components of networks
and TCP/IP, you have the necessary background to examine the more
critical issues of security in a converged environment. Knowing how
networks are built gives you a better understanding of what physical or
logical vulnerabilities are introduced by choosing one particular network
design over another. Knowing how packets are formed gives you a
better understanding of how they can be crafted or modified to achieve a
specific purpose. Knowing how packets are transmitted and delivered
gives you a better understanding of what can happen to packets as they
travel from source to destination. A good understanding of the basics of
networking and TCP/IP is critical to identifying, understanding, and
correcting vulnerabilities in your converged environment.