0% found this document useful (0 votes)
44 views

Lecture 3

The document describes the TCP/IP communication process which includes 7 steps: 1) data creation at the source application layer, 2) data segmentation and encapsulation as it passes down the source protocol stack, 3) data generation onto the network media, 4) data transmission through the internetwork, 5) data reception at the destination network access layer, 6) data decapsulation and reassembly as it passes up the destination protocol stack, and 7) data delivery to the destination application layer. The process ensures end-to-end delivery of applications over a network using TCP/IP protocols implemented on both the sending and receiving hosts.

Uploaded by

Hassan alla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views

Lecture 3

The document describes the TCP/IP communication process which includes 7 steps: 1) data creation at the source application layer, 2) data segmentation and encapsulation as it passes down the source protocol stack, 3) data generation onto the network media, 4) data transmission through the internetwork, 5) data reception at the destination network access layer, 6) data decapsulation and reassembly as it passes up the destination protocol stack, and 7) data delivery to the destination application layer. The process ensures end-to-end delivery of applications over a network using TCP/IP protocols implemented on both the sending and receiving hosts.

Uploaded by

Hassan alla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 42

Communication Process

The TCP/IP model describes the functionality of


the protocols that make up the TCP/IP protocol
suite.
These protocols, which are implemented on both
the sending and receiving hosts, interact to
provide end-to-end delivery of applications over
a network.
A complete communication process includes
these steps:
Communication Process
Transmitter Side ( Source Side)
1. Creation of data at the application layer of the
originating source end device.
2. Segmentation and encapsulation of data as it
passes down the protocol stack in the source
end device.
3. Generation of the data onto the media at the
network access layer of the stack.
Communication Process
Transmition Media:
4. Transportation of the data through the
internetwork, which consists of media and
any intermediary devices.
Communication Process
Reciever Side ( Destination Side)

5. Reception of the data at the network access layer


of the destination end device.
6. Decapsulation and reassembly of the data as it
passes up the stack in the destination device.
7. Passing this data to the destination application at
the application layer of the destination end
device.
Sending and Receiving Process
• The common task of sending an e-mail has
many steps in the process.
• Using the proper terms for PDUs and the
TCP/IP model, the process of sending the e-
mail is as follows:
Sending and Receiving Process
1. An end user, using an e-mail application, creates data. The application
layer codes the data as e-mail and sends the data to the transport layer.
2. The message is segmented, or broken into pieces, for transport. The
transport layer adds control information in a header so that it can be
assigned to the correct process and all segments put into proper order at
the destination. The segment is sent down to the internetwork layer.
3. The internetwork layer adds IP addressing information in an IP header.
The segment is now an addressed packet that can be handled by routers
to route to the destination. The internetwork layer sends the packet down
to the network access layer.
4. The network access layer creates an Ethernet frame with local network
physical address information in the header. This enables the packet to get
to the local router and out to the web. The frame also contains a trailer
with error-checking information. After the frame is created, it is encoded
into bits and sent onto the media to the destination.
Sending and Receiving Process
5. At the destination host, the process is reversed. The
frame is decapsulated to a packet, then to a segment, and
then the transport layer puts all segments into the proper
order.
6. When all data has arrived and is ready, it is sent to the
application layer, and then the original application data
goes to the receiver’s e-mail application. The message is
successful.

The following Figure depicts these steps as an


encapsulated message travels down the TCP/IP model on
the source and is en route to the destination for
decapsulation.
Sending and Receiving Process
Presentation Layer
The presentation layer has three primary functions:
■ Coding and conversion of application layer data
to ensure that data from the source device can be
interpreted by the appropriate application on the
destination device.
■ Compression of the data in a manner that can be
decompressed by the destination device.
■ Encryption of the data for transmission and
decryption of data upon receipt
Session Layer
• Functions at the session layer create and
maintain dialogs between source and
destination applications.
• The session layer handles the exchange of
information to initiate dialogs and keep them
active, and to restart sessions that are
disrupted or idle for a long period of time.

TCP/IP Application Layer Protocols
• The most widely known TCP/IP application
layer protocols are those that provide the
exchange of user information.
• These protocols specify the format and
control information necessary for many of the
common Internet communication functions.
• Among these TCP/IP protocols are the
following:
TCP/IP Application Layer Protocols
v Domain Name System (DNS) is used to resolve
Internet names to IP addresses.
v Hypertext Transfer Protocol (HTTP) is used to transfer
files that make up the web pages of the World Wide
Web.
v Simple Mail Transfer Protocol (SMTP) is used for the
transfer of mail messages and attachments.
v Telnet, a terminal emulation protocol, is used to
provide remote access to servers and networking
devices.
v File Transfer Protocol (FTP) is used for interactive file
transfer between systems.
Client/Server Model
vIn the client/server model, the device requesting
the information is called a client and the device
responding to the request is called a server.
vClient and server processes are considered to be
in the application layer.
vThe client begins the exchange by requesting data
from the server, which responds by sending one
or more streams of data to the client. Application
layer protocols describe the design of the
requests and responses between clients and
servers.
Client/Server Model
Servers
• Any device that responds to requests from
client applications is functioning as a server.
• A server is usually a computer that contains
information to be shared with many client
systems.
• For example, web pages, documents,
databases, pictures, video, and audio files can
all be stored on a server and delivered to
requesting clients.
Servers
Peer-to-Peer (P2P) model
• P2P networking involves two distinct forms:
peer-to-peer network design and peer-to-peer
applications.
• Both forms have similar features but in
practice work very differently.
P2P Networks
• In a peer-to-peer network, two or more
computers are connected through a network
and can share resources such as printers and
files without having a dedicated server.
• Every connected end device, known as a peer,
can function as either a server or a client.
• One computer might assume the role of
server for one transaction while
simultaneously serve as a client for another.
P2P Networks
Application Layer Protocols and
Services
• The transport layer uses an addressing scheme called a port
number.
• Port numbers identify applications and application layer
services that are the source and destination of data.
• Server programs generally use predefined port numbers that
are commonly known by clients.
• Different TCP/IP application layer protocols and services, you
will be referring to the TCP and UDP port numbers normally
associated with these services.
• Some of these services are:
Application Layer Protocols and
Services
• ■ Domain Name System (DNS): TCP/UDP port
53
• ■ HTTP: TCP port 80
• ■ Simple Mail Transfer Protocol (SMTP): TCP
port 25
• ■ Post Office Protocol (POP): UDP port 110
• ■ Telnet: TCP port 23
• ■ DHCP: UDP port 67
• ■ FTP: TCP ports 20 and 21
DNS Services and Protocol
• On the Internet, these domain names, such as
http://www.cisco.com, are much easier for
people to remember than 198.132.219.25, which,
at the time of this writing, is the numeric address
for this server.
• Also, if Cisco decides to change the numeric
address, it is transparent to the user, because the
domain name will remain http://www.cisco.com.
The new address will simply be linked to the
existing domain name and connectivity is
maintained, as shown in Figure
DNS Services and Protocol
DNS Services and Protocol
• When a match is found and returned to the
original requesting server, the server temporarily
stores the numbered address that matches the
name in the cache.
• If that same name is requested again, the first
server can return the address by using the value
stored in its name cache.
• Caching reduces both the DNS query data
network traffic and the workloads of servers
higher up the hierarchy.
DNS Hierarchy
WWW Service and HTTP
• To access the content, web clients make
connections to the server and request the
desired resources.
• The server replies with the resources and, upon
receipt, the browser interpret the data and
present it to the user.
• To better understand how the web browser and
web client interact, you can examine how a web
page is opened in a browser. For this example,
consider the URL
• http://www.cisco.com/web-server.htm.
WWW Service and HTTP
First, the browser interprets the three parts of
the URL:
■ http: The protocol or scheme
■ www.cisco.com: The server name
■ web-server.htm: The specific filename
requested
• For secure communication across the Internet,
the Secure HTTP (HTTPS) protocol is used for
accessing and posting web server information.
E-Mail Services and SMTP/POP
Protocols

v POP and POP3 (Post Office Protocol, version 3) are


inbound mail delivery protocols and are typical
client/server protocols.
v They deliver e-mail from the e-mail server to the client
(MUA)
v SMTP, on the other hand, governs the transfer of
outbound e-mail from the sending client to the e-mail
server (MDA), as well as the transport of e-mail between
e-mail servers (MTA).
E-Mail Services and SMTP/POP
Protocols
File Transfer Protocol (FTP)
• FTP was developed to allow file transfers
between a client and a server.
• FTP requires two connections between the client
and the server: one for commands and replies,
and the other for the actual file transfer.
• The client establishes the first connection to the
server on TCP port 21.
• The client establishes the second connection to
the server over TCP port 20. This connection is for
the actual file transfer and is created every time a
file is transferred.
File Transfer Protocol (FTP)
Purpose of the Transport Layer
• The following are the primary responsibilities of the transport
layer:
■ Tracking the individual communications between
applications on the source and destination hosts
■ Segmenting data and managing each piece
■ Reassembling the segments into streams of application
data
■ Identifying the different applications
■ Performing flow control between end users
■ Enabling error recovery
■ Initiating a session
Purpose of the Transport Layer
Transport layer Protocols
TCP and UDP
• The two most common transport layer
protocols of the TCP/IP protocol suite are
Transmission Control Protocol (TCP) and User
Datagram Protocol (UDP).
• Both protocols manage the communication of
multiple applications.
• The differences between the two are the
specific functions that each protocol
implements.
User Datagram Protocol (UDP)
• UDP is a simple, connectionless protocol, described in
RFC 768.
• It has the advantage of providing low-overhead data
delivery.
• The segments of communication in UDP are called
datagrams. UDP sends datagrams as “best effort.”

• Applications that use UDP include:


• ■ Domain Name System (DNS)
• ■ Video streaming
• ■ Voice over IP (VoIP)
UDP Datagram
Transmission Control Protocol (TCP)
• TCP is a connection-oriented protocol, described
in RFC 793.
• TCP incurs additional overhead to gain functions.
Additional functions specified by TCP are same-
order delivery, reliable delivery, and flow control.
• Each TCP segment has 20 bytes of overhead in
the header encapsulating the application layer
data, whereas each UDP segment has only 8
bytes of overhead
TCP Datagram
TCP Applications
• The following applications use TCP:
• ■ Web browsers
• ■ E-mail
• ■ File transfers
TCP Congestion Control
• TCP provides congestion control through the use of
flow control and dynamic window sizes.
• Flow Control
TCP Congestion Control
• Dynamic Window Sizes

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy