TCP MP

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 20

TCP Introduction

o TCP :
o Full Duplex communication
o Process – to- Process communication
o Connection - oriented service
o Stream – oriented protocol ( Stream of Byte)
o Segmentation (Datagram in IP Layer )
o Utilizes buffers at both ends (Flow & error Control )
o Reliable (ACKs)
o TCP seeks to deliver a byte Stream from end - to –end , in order ,
reliable
TCP Features

1] Numbering System
 Byte number
 TCP number all the data byte that are transmitted in a connection
 Numbering does necessarily starts from 0
 TCP generate a random number between 0 & 2 32-1 for numbering first byte

2] Sequence number
 Byte are grouped into “Segments ”
 Sequence number for each segment is the number of the first Byte carried in that
segment
Connection Establishment

• Establishment a virtual path between the source and destination


• How TCP is connection – oriented while using IP (Connection – less)?
• Connection is virtual
• TCP uses the services of IP to delivery individual segments , but it control
the connection itself
• IP is unaware of retransmission , out –of – order segments
Layer of TCP model
Network interface layer

• A network layer is the lowest layer of the TCP/Ip model


• It defines how the data should be sent physically through the network
This layer is mainly responsible for the transmission of the data between two
devices on the same network.
• The functions carried out by this layer are encapsulating the IP datagram into
frames transmitted by the network and mapping of IP addresses into
physical addresses.
• The protocols used by this layer are ethernet, token ring, FDDI, X.25, frame
relay
Advantages of Network access Layer

1. There are several merits to implementing the network layer in the


OSI model
2. The router is equipment that is used in the network layer.
3. It is responsible for creating collisions and broadcasting the domains
in the network layer to reduce the traffic in the network
4. he forwarding method is implemented to transmit the data packets
among the different nodes in the network.
Disadvantages of network interface

1. Some demerits and issues cannot be addressed in the network


layer.
2. . The network layer design does not provide any mechanism for
flow control
3. Since the data packets are fragmented before being transmitted, it
is impossible to implement indirect control at the network layer.
This layer also lacks efficient error control mechanisms
Layer 2: Internet layer

• Selection of a packet switching network which is based on a connectionless


internetwork layer is called a internet layer.
• It is the layer which holds the whole architecture together.
• It helps the packet to travel independently to the destination.
• Order in which packets are received is different from the way they are send .
Advantages of Network Layer

1. By forwarding service of the network layer, the data packets are


transferred from one place to another in the network.
2. In order to reduce the traffic, the routers in the network layer
create collisions and broadcast the domains.
3. Failure in the data communication system gets eliminated by
packetization
Disadvantages of Network layer

1. In the design of the network layer, there is a lack of flow


control
2. In the network layer, there is a lack of proper error control
mechanisms
3. Due to the presence of too many datagrams there happens
occurrence of congestion.
Layer 3: Transport Layer

1. It decides if data transmission should be on parallel path or


single path.
2. Functions such as multiplexing, segmenting or splitting on the
data is done by transport layer.
3. The applications can read and write to the transport layer.
4. . Transport layer adds header information to the data.
5. Transport layer breaks the message (data) into small units so
that they are handled more efficiently by the network layer.
Functions of Transport Layer

1. The Transport layer chops the message received from the Application
layer into segments and tags or numbers them to make a sequence.
And then forwards it to the IP layer for further processing.
2. The Transport layer ensures that data is delivered correctly in
sequence to the correct destination host by doing error detection
3. It is responsible for providing end-to-end communication services for
applications.
4. . It is also responsible for providing reliability by doing flow control
and error control
Layer 4: Application Layer

The TCP/IP specifications described a lot of applications that were at the top of
the protocol stack. Some of them were TELNET, FTP, SMTP, DNS etc.
1. TELNET is a two-way communication protocol which allows connecting to a
remote machine and run applications on it.
2. FTP (File Transfer Protocol) is a protocol, that allows File transfer amongst
computer users connected over a network. It is reliable, simple and efficient
3. SMTP (Simple Mail Transport Protocol) is a protocol, which is used to
transport electronic mail between a source and destination, directed via a route. 4.
DNS (Domain Name Server) resolves an IP address into a textual address for
Hosts connected over a network.
The advantages of TCP/IP mode

1. It is an industry–standard model that can be effectively deployed in


practical networking problems.
2. It is interoperable, i.e., it allows cross-platform communications
among heterogeneous networks.
3. It is an open protocol suite. It is not owned by any particular
institute and so can be used by any individual or organization
The disadvantages of TCP/IP mode

1. It is not generic in nature. So, it fails to represent any protocol stack


other than the TCP/IP suite. For example, it cannot describe the
Bluetooth connection.
2. It does not clearly separate the concepts of services, interfaces, and
protocols. So, it is not suitable to describe new technologies in new
networks
3. It does not distinguish between the data link and the physical layers,
which has very different functionalities
Conclusion

Now that we've discussed some of the major components of networks and TCP/IP,
you have the necessary background to examine the more critical issues of security in
a converged environment. Knowing how networks are built gives you a better
understanding of what physical or logical vulnerabilities are introduced by choosing
one particular network design over another

You might also like