unit-v computer network transport layer 1 prepared by - rohit koshta

18
UNIT-V Computer Network Transport Layer 1 Prepared by - ROHIT KOSHTA

Upload: arnold-harvey

Post on 27-Dec-2015

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: UNIT-V Computer Network Transport Layer 1 Prepared by - ROHIT KOSHTA

Prepared by - ROHIT KOSHTA

1

UNIT-V

Computer NetworkTransport Layer

Page 2: UNIT-V Computer Network Transport Layer 1 Prepared by - ROHIT KOSHTA

Prepared by - ROHIT KOSHTA

2

Transport Layer

Next Layer in OSI Model is recognized as Transport Layer (Layer-4).

This layer communicates with its peer Transport layer of the remote host.

Transport layer offers peer-to-peer and end-to-end connection between two processes on remote hosts.

Transport layer takes data from upper layer (i.e. Application layer) and then breaks it into smaller size segments, numbers each byte, and hands over to lower layer (Network Layer) for delivery.

Page 3: UNIT-V Computer Network Transport Layer 1 Prepared by - ROHIT KOSHTA

Prepared by - ROHIT KOSHTA

3

Design Issues of Transport Layer

Addressing Every layer needs a mechanism to identify senders and receivers.

Error control It is an important issue because physical communication circuits

are not perfect.Flow control

This property leads to mechanisms for disassembling, transmitting and then reassembling messages.

MultiplexingDemultiplexingRouting

When there are multiple paths netween source and destination a route must be chosen.

Page 4: UNIT-V Computer Network Transport Layer 1 Prepared by - ROHIT KOSHTA

Prepared by - ROHIT KOSHTA

4

User Datagram Protocol

UDP stands for “user datagram protocol” and it is another protocol built on top of IP, just like TCP.

With UDP we can send a packet to a destination IP address (eg. 112.140.20.10) and port (say 52423), and it will get passed from computer to computer until it arrives at the destination computer or is lost along the way.

On the receiver side, we just sit there listening on a specific port (eg. 52423) and when a packet arrives from any computer (remember there are no connections!), we get notified of the address and port of the computer that sent the packet, the size of the packet, and can read the packet data.

Page 5: UNIT-V Computer Network Transport Layer 1 Prepared by - ROHIT KOSHTA

Prepared by - ROHIT KOSHTA

5

User Datagram Protocol (contd)

UDP is an unreliable protocol.

In practice, most packets that are sent will get through, but you’ll usually have around 1-5% packet loss.

There is also no guarantee of ordering of packets.

Page 6: UNIT-V Computer Network Transport Layer 1 Prepared by - ROHIT KOSHTA

Prepared by - ROHIT KOSHTA

6

UDP vs TCP

TCP UDP

Connection based No concept of connection, you have to code this yourself

Guaranteed reliable and ordered No guarantee of reliability or ordering of packets, they may arrive out of order, be duplicated, or not arrive at all!

Automatically breaks up your data into packets for you

You have to manually break your data up into packets and send them

Makes sure it doesn’t send data too fast for the internet connection to handle (flow control)

You have to make sure you don’t send data too fast for your internet connection to handle

Easy to use, you just read and write data like its a file

If a packet is lost, you need to devise some way to detect this, and resend that data if necessary

Page 7: UNIT-V Computer Network Transport Layer 1 Prepared by - ROHIT KOSHTA

Prepared by - ROHIT KOSHTA

7

UDP : Header Format

Field Name

Size (bytes)

Description

Source Port

2Source Port: The 16-bit port number of the process that originated the UDP message on the source device.

Destination Port

2Destination Port: The 16-bit port number of the process that is the ultimate intended recipient of the message on the destination device.

Length 2Length: The length of the entire UDP datagram, including both header and Data fields.

Checksum 2Checksum: An optional 16-bit checksum computed over the entire UDP datagram plus a special “pseudo header” of fields. See below for more information.

Data Variable Data: The encapsulated higher-layer message to be sent.

Page 8: UNIT-V Computer Network Transport Layer 1 Prepared by - ROHIT KOSHTA

Prepared by - ROHIT KOSHTA

8

Transmission Control Protocol

TCP is a connection-oriented protocol.

TCP (Transmission Control Protocol) is a standard that defines how to establish and maintain a network conversation via which application programs can exchange data.

TCP works with the Internet Protocol (IP), which defines how computers send packets of data to each other.

It determines how to break application data into packets that networks can deliver, sends packets to and accepts packets from the network layer, manages flow control, and—because it is meant to provide error-free data transmission—handles retransmission of dropped or garbled packets as well as acknowledgement of all packets that arrive.

Page 9: UNIT-V Computer Network Transport Layer 1 Prepared by - ROHIT KOSHTA

Prepared by - ROHIT KOSHTA

9

TCP Header Format

Page 10: UNIT-V Computer Network Transport Layer 1 Prepared by - ROHIT KOSHTA

Prepared by - ROHIT KOSHTA

10

Session Layer

In the Open Systems Interconnection (OSI) communications model, the Session layer (sometimes called the "port layer") manages the setting up and taking down of the association between two communicating end points that is called a connection.

A connection is maintained while the two end points are communicating back and forth in a conversation or session of some duration.

For Internet applications, each session is related to a particular port.

For example, the HTTP program or daemon always has port number 80.

Page 11: UNIT-V Computer Network Transport Layer 1 Prepared by - ROHIT KOSHTA

Prepared by - ROHIT KOSHTA

11

Presentation Layer

The presentation layer is layer 6 of the 7-layer Open Systems Interconnection (OSI) model.

It is used to present data to the application layer (layer 7) in an accurate, well-defined and standardized format.

The presentation layer is sometimes called the syntax layer.

The presentation layer is responsible for the following: Data encryption/decryption Character/string conversion Data compression Graphic handling

Page 12: UNIT-V Computer Network Transport Layer 1 Prepared by - ROHIT KOSHTA

Prepared by - ROHIT KOSHTA

12

Application Layer

The application layer is a layer in the Open Systems Interconnection (OSI) seven-layer model and in the TCP/IP protocol suite.

It consists of protocols that focus on process-to-process communication across an IP network and provides a firm communication interface and end-user services.

The application layer is the seventh layer of the OSI model and the only one that directly interacts with the end user.

The application layer provides full end-user access to a variety of shared network services for efficient OSI model data flow.

Page 13: UNIT-V Computer Network Transport Layer 1 Prepared by - ROHIT KOSHTA

Prepared by - ROHIT KOSHTA

13

Application Layer (contd)

The application layer provides many services, including: Simple Mail Transfer Protocol File transfer Web surfing Web chat Email clients Network data sharing Virtual terminals Various file and data operations

Page 14: UNIT-V Computer Network Transport Layer 1 Prepared by - ROHIT KOSHTA

Prepared by - ROHIT KOSHTA

14

World Wide Web

The World Wide Web (www, W3) is an information system of interlinked hypertext documents that are accessed via the Internet.

Individual document pages on the World Wide Web are called web pages and are accessed with a software application running on the user's computer, commonly called a web browser.

Web pages may contain text, images, videos, and other multimedia components, as well as web navigation features consisting of hyperlinks.

Page 15: UNIT-V Computer Network Transport Layer 1 Prepared by - ROHIT KOSHTA

Prepared by - ROHIT KOSHTA

15

HTTP

The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems.

Hypertext is structured text that uses logical links (hyperlinks) between nodes containing text.

HTTP is the protocol to exchange or transfer hypertext.

HTTP functions as a request-response protocol in the client-server computing model.

A web browser, for example, may be the client and an application running on a computer hosting a web site may be the server.

Page 16: UNIT-V Computer Network Transport Layer 1 Prepared by - ROHIT KOSHTA

Prepared by - ROHIT KOSHTA

16

FTP

The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files from one host to another host over a TCP-based network, such as the Internet.

FTP is built on a client-server architecture and uses separate control and data connections between the client and the server.

For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS).

Page 17: UNIT-V Computer Network Transport Layer 1 Prepared by - ROHIT KOSHTA

Prepared by - ROHIT KOSHTA

17

SMTP

Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (e-mail) transmission.

SMTP by default uses TCP port 25.

SMTP connections secured by SSL, known as SMTPS, default to port 465 (nonstandard, but sometimes used for legacy reasons).

Although electronic mail servers and other mail transfer agents use SMTP to send and receive mail messages, user-level client mail applications typically use SMTP only for sending messages to a mail server for relaying. For receiving messages, client applications usually use either POP3 or IMAP.

Page 18: UNIT-V Computer Network Transport Layer 1 Prepared by - ROHIT KOSHTA

Prepared by - ROHIT KOSHTA

18

SNMP

Simple Network Management Protocol (SNMP) is an "Internet-standard protocol for managing devices on IP networks".

Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks and more.

SNMP is used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention.