TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet).
TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet).
5-LEC- 5.pptxTransport Layer. Transport Layer ProtocolsZahouAmel1
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transpor
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
More Related Content
Similar to Data Communication and Networking - Transport and Application Layer of the OSI model
5-LEC- 5.pptxTransport Layer. Transport Layer ProtocolsZahouAmel1
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transpor
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
4. ✓ 4th layer from the top.
✓ provide the communication services directly to the application processes running on different hosts.
✓ provides a logical communication between application processes running on different hosts.
✓ protocols are implemented in the end systems but not in the network routers.
✓ A computer network provides more than one protocol to the network applications. For example, TCP and UDP are
two transport layer protocols that provide a different set of services to the network layer.
✓ protocols provide multiplexing/demultiplexing service. It also provides other services such as reliable data
transfer, bandwidth guarantees, and delay guarantees.
✓ Each of the applications in the application layer has the ability to send a message by using TCP or UDP. The
application communicates by using either of these two protocols. Both TCP and UDP will then communicate with
the internet protocol in the internet layer. The applications can read and write to the transport layer. Therefore,
we can say that communication is a two-way process.
4
Ms P Abirami Asst Prof Dept of Comp Sci
5. The services provided by the transport layer protocols can be divided into five
categories:
•End-to-end delivery
•Addressing
•Reliable delivery
•Flow control
•Multiplexing
5
Ms P Abirami Asst Prof Dept of Comp Sci
6. TCP [Transmission Control Protocol] & UDP[User Datagram Protocol]
6
Ms P Abirami Asst Prof Dept of Comp Sci
12. TCP FEATURES
• NUMBERING SYSTEM
• FLOW CONTROL
• ERROR CONTROL
• CONGESTION CONTROL
12
Ms P Abirami Asst Prof Dept of Comp Sci
13. TCP FEATURES
• FLOW CONTROL – receiver controls the amount of data sent by
sender to avoid overflowing
• ERROR CONTROL – implements error detection & error correction
during data transfer
• CONGESTION CONTROL – data sent by sender is not only controlled
by the receiver also by the level of congestion in the network
13
Ms P Abirami Asst Prof Dept of Comp Sci
14. TCP FEATURES
• NUMBERING SYSTEM
• SEQUENCE NUMBER
• ACKNOWLEDGMENT NUMBER
BYTE NUMBER – byte of data transferred in each connection is numbered by TCP
from 0 – 1
SEQUENCE NUMBER – 1st data byte in the segment
14
DEPENDS ON BYTE NUMBER NOT THE SEGMENT NUMBER
Ms P Abirami Asst Prof Dept of Comp Sci
15. TCP FEATURES
SEQUENCE NUMBER – 1st data byte in the segment
• Segment has 1 byte of data each
• Combo of control & data
• Used in establishing the connection, data transmission, connection termination
• Valid only if it has data
15
Ms P Abirami Asst Prof Dept of Comp Sci
16. TCP FEATURES
ACKNOWLEDGMENT NUMBER – Cumulative , that is add 1 when last byte is received
e.g : x + 1 for x , 5043 for 5042
• It is used to confirm the byte has to be received
• It defines the number of next byte expects to be received
16
Ms P Abirami Asst Prof Dept of Comp Sci
19. TCP SEGMENT
• Data packets in the TCP are called as segments
• Segment divide into - Header & data
• Header- 20 to 60 bytes of data
19
Ms P Abirami Asst Prof Dept of Comp Sci
20. TCP SEGMENT
• Header – identify the sender / receiver of the data
• 40 bytes of Option & Padding - for future purpose (data storage)
• 16 bit of source port address & 16 bit of destination port address
[application used for sending & receiving purpose has 16 bit each]
• 32 bits Sequence number – 1st byte of the segment
• 32 bits acknowledgment number – identify the next data to be received from sender to receiver
• 16 bits window size – sender have to send only 16 bit to receiver , to avoid overflow [window size determines the
receiver size]
• 16 bits - 4bits HLEN (Header length ), 6bits Reserved (Reserved for the future),
• 6 bits controls (1bit each ) –
• URG - URGENT
• ACK - ACKNOWLEDGMENT
• PSH - PUSH
• RST - RESET
• SYN - SYNCHRONIZE
• FIN - FINAL
20
THE FLAG IS SET ON WHEN THESE CONTROL BITS ARE ACTIVE
• RESET BIT IS SET DURING RESET OTHER WISE IN OFF STATE
• PUSH BIT IS SET ON WHEN THE DATA IS PUSHED
• FIN BIT IS SET ON WHEN THE DATA TRANSMISSION IS COMPLETED
Ms P Abirami Asst Prof Dept of Comp Sci
21. TCP SEGMENT
• 6 bits controls (1bit each ) –
• URG – The value of the URGENT pointer field is valid
• ACK - The value of the ACKNOWLEDGMENT field is valid
• PSH – PUSH the data
• RST – RESET the connection
• SYN – SYNCHRONIZE sequence number during connection
• FIN – Terminate the connection
• 16 bits of CHECKSUM – Added into stream to check the error occurrence in
the data transfer, mandatory in TCP not in the UDP.
• 16 bits of URGENT POINTER – it is used to store data when it is true
21
Ms P Abirami Asst Prof Dept of Comp Sci
23. TCP SERVICES
1. PROCESS – PROCESS COMMUNICATION
2. STREAM DELIVERY SERVICE
3. SENDING & RECEIVING BUFFER
4. FULL DUPLEX COMMUNICATION
5. CONNECTION ORIENTED SERVICES
6. RELIABLE SERVICES
23
Ms P Abirami Asst Prof Dept of Comp Sci
24. 1.PROCESS - PROCESS
• There are different port
• Eg:
• 1 – communication
• 7 - echo
• 9 – discard
• 11 – available users
24
Ms P Abirami Asst Prof Dept of Comp Sci
25. 2.STREAM DELIVERY SERVICES
• SENDING PROCESS
• RECEIVING PROCESS
• TCP act on sending process to send the stream of data to receiver
• TCP act on receiving process to receive the stream of data from sender
25
TCP PROCESS
Ms P Abirami Asst Prof Dept of Comp Sci
28. 3.SENDING & RECEIVING BUFFER
• BUFFER – TO STORE DATA
• Circular array is used
• Sender – white, Gray & Coloured
• Receiver – White & Coloured
28
WHITE DATA HAVE TO BE STORED BY THE SENDER
GRAY STORED DATA WAITING FOR THE ACKNOWLEDGMENT
COLOURED DATA IS READY TO SEND
WHITE EMPTY PLACE WAITING FOR THE DATA FROM THE SENDER THROUGH NETWORK
COLOURED IT IS ALREADY RECEIVED AND READ BY THE RECEIVER
Ms P Abirami Asst Prof Dept of Comp Sci
30. 4. FULL DUPLEX COMMUNICATION
30
• In full-duplex mode, transmission is simultaneously bi-directional.
• The end devices can transmit and receive simultaneously.
• A prime example of full-duplex communications is the PSTN that
provides two-way communications.
Ms P Abirami Asst Prof Dept of Comp Sci
31. 5.CONNECTION ORIENTED SERVICES
31
There is a sequence of operations that are needed to b followed by users.
1.Establishing Connection – (BETWEEN SENDER & RECEIVER)
It generally requires a session connection to be established just before any data is
transported or sent with a direct physical connection among sessions.
2.Transferring Data or Message – (BETWEEN SENDER & RECEIVER)
When this session connection is established, then we transfer or send message or data.
3.Releasing the Connection – (BETWEEN SENDER & RECEIVER)
After sending or transferring data, we release connection.
Ms P Abirami Asst Prof Dept of Comp Sci
34. TCP CONNECTION
• TCP is connection oriented
• Establish virtual path between the source and destination
• Messages are send over the virtual path
• TCP uses the IP address to deliver individual segment to the receiver
• The lost/corrupted messages are retransmitted in TCP
• Connection oriented transmission has 3 phase
1. Connection establishment
2. Data transfer
3. Connection termination
34
Ms P Abirami Asst Prof Dept of Comp Sci
35. TCP CONNECTION
1 – CONNECTION ESTABLISHMENT
1. TCP transfer data in full duplex mode
2. Two nodes can send segments simultaneously
3. The connection should be established before data transmission
4. The connection establishment in TCP is called as “Three Way Handshaking”
35
Ms P Abirami Asst Prof Dept of Comp Sci
36. Three way handshaking
✓Server is in the passive open mode
✓Client is in the active open mode
✓The server program inform TCP, that it is ready to accept the connection ->
request for a passive open
✓The client program issues a request for an active open
36
Ms P Abirami Asst Prof Dept of Comp Sci
37. Three steps:
STEP -1
• The client sends the first segment , SYN segment with SYN flag set
• SYN– cannot carry data but it consumes one sequence number
37
SEQ : 8000
S
SENDER - RECEIVER
Client - Server
SEQUENCE NO : 8000
SYN FLAG IS SET
Ms P Abirami Asst Prof Dept of Comp Sci
38. Three steps:
STEP -2
• The server sends the second segment , SYN + ACK with 2 flag bit set
• It cannot carry data but it consumes one sequence number
38
SEQ : 15000
ACK : 8001
A S
SENDER - RECEIVER
server - client
SEQUENCE NO : 15000
ACK : 8001
ACK & SYN FLAG IS SET
Ms P Abirami Asst Prof Dept of Comp Sci
39. Three steps:
STEP -3
• The client sends the third segment , just an ACK segment
• It cannot carry data & consumes no sequence number
39
SEQ : 8000
ACK : 15001
A
SENDER - RECEIVER
Client - Server
Ms P Abirami Asst Prof Dept of Comp Sci
41. • Simultaneous open - When both the processes issues an active open
• SYN Flooding Attack & Denial Of Service Attack – SYN flooding attack
belongs to a type of security attacks.
41
Ms P Abirami Asst Prof Dept of Comp Sci
42. TCP CONNECTION
2 – DATA TRANSFER
✓The data transfer will be take place once the connection has established
between client and the server
✓Both client and server will send and acknowledge the data
✓The data travelling in the same direction as an acknowledgment are carried on
the same segment
✓TCP implementation have the option to SET/NOT SET the PUSH & URGENT flag
42
Ms P Abirami Asst Prof Dept of Comp Sci
43. 43
Three steps:
STEP -1
• The client sends the request to server to transfer the data( push the
data)
• Data – bytes from (8001-9000) as one segment and (9001-10000) as
another segment
SEQ : 8001
ACK:15001
A P
SENDER - RECEIVER
Client - Server
SEQUENCE NO : 8001
ACKNOWLEDGMENT NO:15001
ACK & PSH FLAGS ARE SET
Ms P Abirami Asst Prof Dept of Comp Sci
44. 44
Three steps:
STEP -2
• The server sends the acknowledgment to server for the request of
transferring the data( push the data)
• Data – bytes from (8001-9000) as one segment and (9001-10000) as
another segment
SEQ : 15001
ACK:10001
A P
SENDER - RECEIVER
Server - Client
SEQUENCE NO : 15001
ACKNOWLEDGMENT NO:10001
ACK & PSH FLAGS ARE SET
Ms P Abirami Asst Prof Dept of Comp Sci
45. 45
Three steps:
STEP -3
• The client sends the acknowledgment to server
SEQ : 10000
ACK:17001
A
SENDER - RECEIVER
Client- Server
SEQUENCE NO : 10000
ACKNOWLEDGMENT NO:17001
ACK FLAGS ARE SET
Ms P Abirami Asst Prof Dept of Comp Sci
47. TCP CONNECTION
3 – TERMINATE THE CONNECTION
✓The connection has been terminated between client and the server after the
data transmission
✓Three way handshaking
✓ACK & FIN flag is set
✓Client side – active close & Server side – passive close
47
Ms P Abirami Asst Prof Dept of Comp Sci
51. • DOMAIN NAME SYSTEM
• NAME SPACE
• DOMAIN NAME SPACE
• DOMAIN
• REMOTE LOGGING
• TELNET
• E-MAIL
• FILE TRANSFER
51
Ms P Abirami Asst Prof Dept of Comp Sci
52. DOMAIN NAME SPACE
(DNS)
• Naming database
• Internet domain names are located & translated into IP address
• It is hierarchical & decentralized naming system for computers
• Services or resources connected to internet / private network
• It assign domain name & mapping those to internet
52
Ms P Abirami Asst Prof Dept of Comp Sci
54. Name Space
• The name assigned to a machine are unique because the address are unique
• The map each other using unique name
• The way it is organised as:
• Flat Name Space
• Hierarchical Name Space - several parts such as – nature of the organisation, name,
department etc.,
• E.g (www.ethirajcollege_computerscience.edu.in)
54
Ms P Abirami Asst Prof Dept of Comp Sci
55. Domain Name Space
• It is designed to have a hierarchical name space
• Inverted tree structure
• Root at the top
• Only 128 levels that is 0 – 127
55
Ms P Abirami Asst Prof Dept of Comp Sci
57. Domain
• Subtree of Domain Name Space
57
Ms P Abirami Asst Prof Dept of Comp Sci
58. REMOTE LOGGING
• E.G STUDENT USE TO ACCESS COLLEGE LAB LOG IN ID FROM THEIR HOME
• USE REMOTE SITE FROM THEIR LOCAL SITE
• CLIENT/SERVER IS USED FOR THAT SERVICE
• FTP,EMAIL ARE USED
58
Ms P Abirami Asst Prof Dept of Comp Sci
59. TELNET
• General purpose of client/server application program
• Terminal Network
• Standard TCP/IP protocol
• Local terminal is appears ate the remote system
• Time sharing environment – large computer supports multiple users
• Interaction between user and computer done through terminals
59
Ms P Abirami Asst Prof Dept of Comp Sci
60. TELNET - logging
• TELNET
----------→ NVT(Network Virtual Terminal)
-----→TCP/IP
-----→NVT
………..
60
Ms P Abirami Asst Prof Dept of Comp Sci
62. E-MAIL
• Beginning – only short message consist of text
• Later – text, audio, image, video
• Message can be sent to more than one recipients
• General architecture : I , II ,III, IV - SCENARIOS
• User agent
• Message transfer agent
• Message access agent
62
Ms P Abirami Asst Prof Dept of Comp Sci
63. • USER AGENT
1. COMPOSING MESSAGES
2. READING MESSAGES
3. REPLYING TO MESSAGES
4. FORWARDING MESSAGES
5. HANDLING MAILBOX
• MESSAGE TRANSFER AGENT
1. SMTP – PROTOCOL TO TRANSFER MESSAGE
2. MTA – MAIL TRANSFER AGENT – CLIENT & SERVER
• MESSAGE ACCESS AGENT
1. POP – POST OFFFICE PROTOCOL – POP3 (VERSION 3)
2. IMAP – INTERNET MAIL ACCESS – IMAP4 (VERSION 4)
63
Ms P Abirami Asst Prof Dept of Comp Sci
64. ARCHITECTURE
• FIRST SCENARIO
• SECOND SCENARIO
• THIRD SCENARIO
• FOURTH SCENARIO
64
Ms P Abirami Asst Prof Dept of Comp Sci
65. ARCHITECTURE
65
SCENARIO SENDER RECEIVER USER AGENT MTA
FIRST SHARED SYSTEM TWO -
SECOND SYSETM1 SYSTEM2 TWO TWO
THIRD MAIL SERVER SYSTEM2 TWO TWO
FOURTH MAIL SERVER MAIL SERVER TWO TWO
Ms P Abirami Asst Prof Dept of Comp Sci
71. FILE TRANSFER
• Transfer files from one computer to another
• Protocol – FTP provided by TCP/IP
• It provides two connections between hosts
1. Data transfer
2. Control information (command & responses)
• FTP uses TCP ports 20 –data connection & 21 – control information
• Different FTP for client & server
• Client – 3 components
• Server – 2 components
71
Ms P Abirami Asst Prof Dept of Comp Sci
72. 72
USER INTERFACE
CONTROL PROCESS
DATA TRANSFER PROCESS DATA TRANSFER PROCESS
CONTROL PROCESS
TCP/IP
CONTROL
CONNECTION
CLIENT
SERVER
Ms P Abirami Asst Prof Dept of Comp Sci
73. • Control connection and data connection is done between the client &
server
• Control connection – remains connected
• Data connection – open & close for each file transfer
73
Ms P Abirami Asst Prof Dept of Comp Sci
74. Communication over control connection
74
CONTROL PROCESS CONTROL PROCESS
NVT ASCIIT
CLIENT SERVER
Ms P Abirami Asst Prof Dept of Comp Sci
75. Communication over data connection
75
DATA TRANSFER
PROCESS
DATA TRANSFER
PROCESS
DATA CONNECTIONT
CLIENT SERVER
FILE TYPE
DATA STRUCTURE
TRANSMISSION MODE
Ms P Abirami Asst Prof Dept of Comp Sci
76. ANONYMOUS FTP
• To use FTP , user need account & password
• To use anonymous , FTP user can use
user name : anonymous
password : guest
76
Ms P Abirami Asst Prof Dept of Comp Sci
77. MORE WAY TO GO……………
ALL THE BEST
77
Ms P Abirami Asst Prof Dept of Comp Sci