0% found this document useful (0 votes)
83 views21 pages

DCC MP

The document is a micro project report on Transmission Control Protocol (TCP) completed by students at Vidyavardhini's Bhauasheb Vartak Polytechnic, Vasai Road West. It includes the title, aim, course outcomes integrated, methodology, action plan, resources required, skills developed and various annexures related to the proposal, evaluation, weekly activity sheet and the final report on TCP. The certificate certifies that the students have satisfactorily completed the micro project on the topic.

Uploaded by

556-Harsh Tandel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
83 views21 pages

DCC MP

The document is a micro project report on Transmission Control Protocol (TCP) completed by students at Vidyavardhini's Bhauasheb Vartak Polytechnic, Vasai Road West. It includes the title, aim, course outcomes integrated, methodology, action plan, resources required, skills developed and various annexures related to the proposal, evaluation, weekly activity sheet and the final report on TCP. The certificate certifies that the students have satisfactorily completed the micro project on the topic.

Uploaded by

556-Harsh Tandel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION

VIDYAVARDHINI’S BHAUSAHEB VARTAK


POLYTECHNIC, VASAI ROAD WEST

MICRO PROJECT
Academic year: 2022-2023

Title of Micro Project:


Transmission Control Protocol
Program/Code: Computer Engineering (CO)

Semester: FOURTH
Course/Code: Data Communication and Computer Network (22414)

Name: _____________________________________________________

Roll No: ___________

Enrolment No: ______________________

Name of Faculty: Prof. Romali Patil


MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION

Certificate

This is to certify that Mr. /Ms.………………………………………………….


Roll No………………. of FOURTH Semester of Diploma in Computer
Engineering Institute, B.V. POLYTECHNIC (Code: 0093) has completed the
Micro Project satisfactorily in Subject - Data Communication and
Computer Network(22414) for the academic year 2022- 2023 as prescribed in
the curriculum.

Place: Vasai Enrolment No: ……………………………………

Date: ……………………… Exam. Seat No: …………………………………….

Subject Teacher
Mrs.Romali Patil Head of the Department Principal
Annexure – I
Part A: Micro Project Proposal

1.1 Aim/Benefits of the Micro-Project:


The aim is to communicate effectively and skilfully at work place
2.1 Course Outcomes integrated:
1. Communicating effectively by avoiding barriers in formal and informal
situations
2. communicate skilfully using non-verbal methods
3. Give presentations by using audio visual aids
4. Write reports using correct guidelines
5. Compose e-mail and formal business letters
3.1 Proposed Methodology:
1. Literature survey.
2. Collect information through different sources
3. Analysis of data.
4. Compilation of collected data.

4.0 Action Plan

Sr. Planned Planned Name of


No. Details of the activity Start date Finish date Members
1 Formation of Group & Topic Selection 01/03/2023 04/03/2023 All members
2 Submission of Proposed Plan 05/03/2023 08/03/2023 All members
3 Preparation of Report 08/03/2023 11/03/2023 All members
4 Final valuation of a working Report 11/03/2023 15/03/2023 All members
5 Presentation of Report 15/03/2023 18/03/2023 All members
6 Submission of Final Report 18/03/2023 22/03/2023 All members

5.0 Resource Required:


Sr.
No. Name of resources/Material Specifications Qty Remarks

Processor: i3
1. Computer 1
RAM : 4.00 GB
2. Microsoft Word Word -2016
3. Printer Hp Laser Jet 1

4. Book/ website name


6.0 Name of Team Members with Roll No:

Sr. Roll No Individual Total


No. Name of Students Process and Presentation (10)
Product (04)
assessment (06)
01 1246 Harsh Tandel

02 1247 Mufij Topinkati

03 1248 Rion Tuscano

Name & Signature of Faculty:

Mrs.Romali Patil
Annexure- II

Final Micro Project Report

Title: Transmission Control Protocol

Rationale:
The aim is to communicate effectively and skilfully at work place
2. 0 Course Outcomes Integrated:
1. Communicating effectively by avoiding barriers in formal and informal
situations
2. communicate skilfully using non-verbal methods
3. Give presentations by using audio visual aids
4. Write reports using correct guidelines 5. compose e-mail and formal
business letters
3.0 Actual Procedure Followed.
1 Discussion about topic with guide and among
group members 2 Literature survey
3 Information collection
4 Compilation of content
5 Editing and revising content
6 Report Preparation

4.0: Actual Resources Required:

Sr. Name of resources/Material Specifications Qty Remarks


No.
1. Computer Processor: i3 1
RAM : 4.00GB
2. Microsoft Word Word -2016
3. Printer Hp Laser Jet 1
4. Book/Site name

7.0 Skill Developed/Learning outcomes of this Micro-Project

The following skills were developed:


1. Teamwork: Learned to work in a team and boost individual confidence.
2. Problem-Solving: Developed good problem solving habits.
3. Technical Writing: Preparing the report of proposed plan and the final report.
Annexure - III
Rubrics for Assessment of Micro-Project

Title: Transmission Control Protocol

Institute Code: 0093 Academic year: 2022-2023


Program: CO-2 Course & Code: DCC (22414)
Name of Candidate: _________________________________________
Roll No: ____________

Semester: FOURTH Name of Faculty: Mrs.Romali Patill

Poor Average Good Excellent


Sr.
Characteristic to be Assessed (Marks 1-3) (Marks 4-5) (Marks 6-8) (Marks 9-10)
No.
1. Relevance to the Course

Literature Survey/Information
2. Collection
3. Project Proposal

Completion of the Target as per


4. Project Proposal
5. Analysis of Data and Representation

6. Quality of Prototype/Model

7. Report Preparation

8. Presentation

9. Viva
Annexure- IV

Micro-Project Evaluation Sheet

Title: Transmission Control Protocol


Institute Code: 0093 Academic year: 2022-2023
Program: CO-2 Course & code: DCC (22414)
Name: ______________________________________
Roll No: ______________
Semester: FOURTH Name of Faculty: Mrs.Romali Patil
Course Outcomes Achieved:
1. Communicating effectively by avoiding barriers in formal and informal situations
2. Communicate skilfully using non-verbal method
3. Give presentations by using audio-visual aids
4 Write reports using correct
Guidelines
5 compose e-mail and formal business letters
Evaluation as per Suggested Rubric for Assessment of Micro Project:
Sr. Characteristic to be Poor Average Good Marks Excellent Sub
No. assessed Mark Marks 4- 6-8 Marks 9- Total
s 1-3 5 10
(A) Process and product assessment Out Of 6

1 Relevance to the course


2 Literature Survey .
Information Collection
3 Completion of the Target as
per project proposal

4 Analysis of Data and


representation
5 Quality of
Prototype/Model/Content
6 Report Preparation
(B) Individual Presentation/Viva Out of 4
7 Presentation .
8 Viva

Name and designation of the Faculty Member: Prof. Romali Patil


Weekly Activity Sheet

Topic: Transmission Control Protocol


Institute Code: 0093 Academic year: 2022-2023
Program: SYCO2 Course & Code: DCC (22414)

Name of Candidate:
__________________________________________________________

Roll No: 1246-1248

Semester: FOURTH Name of Faculty: Mrs.Romali Patil

SR. NO WEEK ACTIVITY PERFORMED

1. 1st Week Discussion and Finalization of Topic

2. 2nd Week Literature Review

3. 3rd Week Submission of Proposed Plan

4 4th Week Information Collection

5. 5th Week Analysis of Data

6. 6th Week Compilation of content

7. 7th Week Editing and Revising the Content

8. 8th Week Report Preparation

9. 9th Week Report Preparation

10. 10th- 12th Week Presentation

Signature of Student Dated Signature of Faculty


Transmission Control Protocol
TCP (Transmission Control Protocol) is one of the main protocols of the
Internet protocol suite. It lies between the Application and Network Layers
which are used in providing reliable delivery services. It is a connection-
oriented protocol for communications that helps in the exchange of messages
between different devices over a network. The Internet Protocol (IP), which
establishes the technique for sending data packets between computers, works
with TCP.

TCP/IP Layer
Working of TCP
To make sure that each message reaches its target location intact, the
TCP/IP model breaks down the data into small bundles and afterward
reassembles the bundles into the original message on the opposite end.
Sending the information in little bundles of information makes it simpler to
maintain efficiency as opposed to sending everything in one go.
After a particular message is broken down into bundles, these bundles may
travel along multiple routes if one route is jammed but the destination
remains the same.

We can see that the message is being broken down, then reassembled from a different order at the

destination

For example, when a user requests a web page on the internet, somewhere
in the world, the server processes that request and sends back an HTML
Page to that user. The server makes use of a protocol called the HTTP
Protocol. The HTTP then requests the TCP layer to set the required
connection and send the HTML file.

Now, the TCP breaks the data into small packets and forwards it toward the
Internet Protocol (IP) layer. The packets are then sent to the destination
through different routes.
The TCP layer in the user’s system waits for the transmission to get finished
and acknowledges once all packets have been received.
Features of TCP/IP
Some of the most prominent features of Transmission control protocol are
1. Segment Numbering System
 TCP keeps track of the segments being transmitted or received by
assigning numbers to each and every single one of them.
 A specific Byte Number is assigned to data bytes that are to be transferred
while segments are assigned sequence numbers.
 Acknowledgment Numbers are assigned to receive segments.
2. Flow Control
 Flow control limits the rate at which a sender transfers data. This is done
to ensure reliable delivery.
 The receiver continually hints to the sender on how much data can be
received (using a sliding window)
3. Error Control
 TCP implements an error control mechanism for reliable data transfer
 Error control is byte-oriented
 Segments are checked for error detection
 Error Control includes – Corrupted Segment & Lost Segment Management,
Out-of-order segments, Duplicate segments, etc.

4. Congestion Control
 TCP takes into account the level of congestion in the network
 Congestion level is determined by the amount of data sent by a sender
Advantages
 It is a reliable protocol.
 It provides an error-checking mechanism as well as one for recovery.
 It gives flow control.
 It makes sure that the data reaches the proper destination in the exact order
that it was sent.
 Open Protocol, not owned by any organization or individual.
 It assigns an IP address to each computer on the network and a domain
name to each site thus making each device site to be distinguishable over
the network.
Disadvantages
 TCP is made for Wide Area Networks, thus its size can become an issue
for small networks with low resources.
 TCP runs several layers so it can slow down the speed of the network.
 It is not generic in nature. Meaning, it cannot represent any protocol stack
other than the TCP/IP suite. E.g., it cannot work with a Bluetooth
connection.
 No modifications since their development around 30 years ago.
Error control in TCP is mainly done through the use of three simple
techniques:
1. Checksum – Every segment contains a checksum field which is used
to find corrupted segments. If the segment is corrupted, then that
segment is discarded by the destination TCP and is considered lost.
2. Acknowledgement – TCP has another mechanism called
acknowledgement to affirm that the data segments have been delivered.
Control segments that contain no data but have sequence numbers will
be acknowledged as well but ACK segments are not acknowledged.
3. Retransmission – When a segment is missing, delayed to deliver
to a receiver, corrupted when it is checked by the receiver then that
segment is retransmitted again. Segments are retransmitted only during
two events: when the sender receives three duplicate acknowledgements
(ACK) or when a retransmission timer expires.
 Retransmission after RTO: TCP always preserves one
retransmission time-out (RTO) timer for all sent but not acknowledged
segments. When the timer runs out of time, the earliest segment is
retransmitted. Here no timer is set for acknowledgement. In TCP, the
RTO value is dynamic in nature and it is updated using the round trip
time (RTT) of segments. RTT is the time duration needed for a
segment to reach the receiver and an acknowledgement to be
received by the sender.
 Retransmission after Three duplicate ACK
segments: RTO method works well when the value of RTO is small.
If it is large, more time is needed to get confirmation about whether a
segment has been delivered or not. Sometimes one segment is lost
and the receiver receives so many out-of-order segments that they
cannot be saved. In order to solve this situation, three duplicate
acknowledgement method is used and missing segment is
retransmitted immediately instead of retransmitting already delivered
segment. This is a fast retransmission because it makes it possible to
quickly retransmit lost segments instead of waiting for timer to end.
TYPES OF MODES
1. Simplex Mode :
Simplex mode is as on a one-way street, the communication is unidirectional,
as on a one-way street. In this, only one of the two devices on a link can
transmit, and the other can only receive. This mode uses the entire capacity
of the channel to send data in one direction.
Example:- keyboard and monitor.

2. Half-duplex mode:
Half-duplex mode is when the sender can send the data and also can
receive the data one at a time. It is two-way directional i.e. bi-directional
communication but one at a time.
Example:- Walkie-Talkies.
1. Control Structure :
Control Structure, as name suggests, is basically a set of statements and
control statements that are controlling their execution.
2. Control Statement:
Control Statement, as name suggests, is basically a statement that is used
to determine control flow of set of statements. It makes decision on basis of
condition provided by statement or on basis of values and logic.

Transmission control User datagram


Basis protocol (TCP) protocol (UDP)

TCP is a connection-oriented UDP is the


protocol. Connection-orientation Datagram-oriented
means that the communicating protocol. This is
devices should establish a because there is no
Type of Service
connection before transmitting overhead for
Transmission control User datagram
Basis protocol (TCP) protocol (UDP)

data and should close the opening a


connection after transmitting the connection,
data. maintaining a
connection, and
terminating a
connection. UDP is
efficient for
broadcast and
multicast types of
network
transmission.

The delivery of data


TCP is reliable as it guarantees
to the destination
the delivery of data to the
cannot be
destination router.
Reliability guaranteed in UDP.

TCP provides extensive error- UDP has only the


checking mechanisms. It is basic error checking
Error checking because it provides flow control mechanism using
mechanism and acknowledgment of data. checksums.

An acknowledgment segment is No acknowledgment


Acknowledgment present. segment.

There is no
Sequencing of data is a feature sequencing of data
of Transmission Control Protocol in UDP. If the order
(TCP). This means that packets is required, it has to
arrive in order at the receiver. be managed by the
Sequence application layer.
Transmission control User datagram
Basis protocol (TCP) protocol (UDP)

UDP is faster,
TCP is comparatively slower
simpler, and more
than UDP.
Speed efficient than TCP.

There is no
retransmission of
Retransmission of lost packets is
lost packets in the
possible in TCP, but not in UDP.
User Datagram
Retransmission Protocol (UDP).

TCP has a (20-60) bytes variable UDP has an 8 bytes


Header Length length header. fixed-length header.

Weight TCP is heavy-weight. UDP is lightweight.

It’s a connectionless
Uses handshakes such as SYN,
Handshaking protocol i.e. No
ACK, SYN-ACK
Techniques handshake

TCP doesn’t support UDP supports


Broadcasting Broadcasting. Broadcasting.

UDP is used
TCP is used by HTTP, by DNS, DHCP,
HTTPs, FTP, SMTP and Telnet. TFTP, SNMP, RIP,
Protocols and VoIP.

The TCP connection is a byte UDP connection is


Stream Type stream. message stream.
Transmission control User datagram
Basis protocol (TCP) protocol (UDP)

Overhead Low but higher than UDP. Very low.

Port: can be treated as a gateway to Internet. To


facilitate different applications to make connections at
the same time, each device connecting to web uses
ports in a different manner. All operations are carried
out using different ports when we simultaneously use
web, download some files, use a printer, etc. For
instance, HTTP transfers use port number 80,
whereas Telnet uses 23.
As it is known, device (i.e., computer) is identified by its
IP address. Since multiple services (tabs) or
applications run by web browser simultaneously, to run
network applications, the IP address alone is not
sufficient.
Network port: facilitates in identifying application
or service running in browser/computer in same
fashion as IP address does.
Looking into an analogical situation –
Supposedly you own a building. The street
address corresponds to IP address. Also, the way
there is a port number, each building also has a
building number.

Port numbers: are also of different types and have unique


numbers. The ports co-exist within an IP address because
each and every service has its unique port.
Top firms like Google or MSN use well-known ports (0 to
10231) for their services; Certain specific functions are
assigned registered ports(1024 to 49151) when requested;
There are also private or dynamic ports(49152 to 65535)
which can be used by anyone who wishes for private servers
and temporary purposes.
It is highly advisable for you to know port numbers. You’ll have
good control of your software if you know it. Applications
should always be open for them to work since they use
specific ports. While closing them can certainly improve your
port security, it is upon you to keep a particular port open or
close. You may also open or close a particular port if one of
your apps aren’t able to get connected to Internet. Some ports
are blocked by firewalls, so you may have to manually allow it
to bypass them when needed.

Figure – working of firewall

The need for a port number is discussed for now.


But, who assigns a unique port number for
different services/applications?
A web browser when connected to a web server,
a port in range (49152- 65535) is self-allocated by
web browser, which is called an ephemeral port.
In image shown underneath, all unique services
are assigned a unique port number, which you
can see on 5th tuple on local address. Try netstat
on your command to get details.

 Conclusion
Now that we've discussed some of the major components of networks
and TCP/IP, you have the necessary background to examine the more
critical issues of security in a converged environment. Knowing how
networks are built gives you a better understanding of what physical or
logical vulnerabilities are introduced by choosing one particular network
design over another. Knowing how packets are formed gives you a
better understanding of how they can be crafted or modified to achieve a
specific purpose. Knowing how packets are transmitted and delivered
gives you a better understanding of what can happen to packets as they
travel from source to destination. A good understanding of the basics of
networking and TCP/IP is critical to identifying, understanding, and
correcting vulnerabilities in your converged environment.

You might also like