SlideShare a Scribd company logo
UNIT -5 TRANSPORT &
APPLICATION LAYER
TRANSPORT
LAYER
2
Ms P Abirami Asst Prof Dept of Comp Sci
3
Ms P Abirami Asst Prof Dept of Comp Sci
✓ 4th layer from the top.
✓ provide the communication services directly to the application processes running on different hosts.
✓ provides a logical communication between application processes running on different hosts.
✓ protocols are implemented in the end systems but not in the network routers.
✓ A computer network provides more than one protocol to the network applications. For example, TCP and UDP are
two transport layer protocols that provide a different set of services to the network layer.
✓ protocols provide multiplexing/demultiplexing service. It also provides other services such as reliable data
transfer, bandwidth guarantees, and delay guarantees.
✓ Each of the applications in the application layer has the ability to send a message by using TCP or UDP. The
application communicates by using either of these two protocols. Both TCP and UDP will then communicate with
the internet protocol in the internet layer. The applications can read and write to the transport layer. Therefore,
we can say that communication is a two-way process.
4
Ms P Abirami Asst Prof Dept of Comp Sci
The services provided by the transport layer protocols can be divided into five
categories:
•End-to-end delivery
•Addressing
•Reliable delivery
•Flow control
•Multiplexing
5
Ms P Abirami Asst Prof Dept of Comp Sci
TCP [Transmission Control Protocol] & UDP[User Datagram Protocol]
6
Ms P Abirami Asst Prof Dept of Comp Sci
7
Ms P Abirami Asst Prof Dept of Comp Sci
8
Ms P Abirami Asst Prof Dept of Comp Sci
9
Ms P Abirami Asst Prof Dept of Comp Sci
TCP
1. TCP SERVICES
2. TCP FEATURES
3. TCP SEGMENT
4. TCP CONNECTION
10
Ms P Abirami Asst Prof Dept of Comp Sci
TCP FEATURES
11
Ms P Abirami Asst Prof Dept of Comp Sci
TCP FEATURES
• NUMBERING SYSTEM
• FLOW CONTROL
• ERROR CONTROL
• CONGESTION CONTROL
12
Ms P Abirami Asst Prof Dept of Comp Sci
TCP FEATURES
• FLOW CONTROL – receiver controls the amount of data sent by
sender to avoid overflowing
• ERROR CONTROL – implements error detection & error correction
during data transfer
• CONGESTION CONTROL – data sent by sender is not only controlled
by the receiver also by the level of congestion in the network
13
Ms P Abirami Asst Prof Dept of Comp Sci
TCP FEATURES
• NUMBERING SYSTEM
• SEQUENCE NUMBER
• ACKNOWLEDGMENT NUMBER
BYTE NUMBER – byte of data transferred in each connection is numbered by TCP
from 0 – 1
SEQUENCE NUMBER – 1st data byte in the segment
14
DEPENDS ON BYTE NUMBER NOT THE SEGMENT NUMBER
Ms P Abirami Asst Prof Dept of Comp Sci
TCP FEATURES
SEQUENCE NUMBER – 1st data byte in the segment
• Segment has 1 byte of data each
• Combo of control & data
• Used in establishing the connection, data transmission, connection termination
• Valid only if it has data
15
Ms P Abirami Asst Prof Dept of Comp Sci
TCP FEATURES
ACKNOWLEDGMENT NUMBER – Cumulative , that is add 1 when last byte is received
e.g : x + 1 for x , 5043 for 5042
• It is used to confirm the byte has to be received
• It defines the number of next byte expects to be received
16
Ms P Abirami Asst Prof Dept of Comp Sci
TCP SEGMENT
17
Ms P Abirami Asst Prof Dept of Comp Sci
TCP SEGMENT
18
Ms P Abirami Asst Prof Dept of Comp Sci
TCP SEGMENT
• Data packets in the TCP are called as segments
• Segment divide into - Header & data
• Header- 20 to 60 bytes of data
19
Ms P Abirami Asst Prof Dept of Comp Sci
TCP SEGMENT
• Header – identify the sender / receiver of the data
• 40 bytes of Option & Padding - for future purpose (data storage)
• 16 bit of source port address & 16 bit of destination port address
[application used for sending & receiving purpose has 16 bit each]
• 32 bits Sequence number – 1st byte of the segment
• 32 bits acknowledgment number – identify the next data to be received from sender to receiver
• 16 bits window size – sender have to send only 16 bit to receiver , to avoid overflow [window size determines the
receiver size]
• 16 bits - 4bits HLEN (Header length ), 6bits Reserved (Reserved for the future),
• 6 bits controls (1bit each ) –
• URG - URGENT
• ACK - ACKNOWLEDGMENT
• PSH - PUSH
• RST - RESET
• SYN - SYNCHRONIZE
• FIN - FINAL
20
THE FLAG IS SET ON WHEN THESE CONTROL BITS ARE ACTIVE
• RESET BIT IS SET DURING RESET OTHER WISE IN OFF STATE
• PUSH BIT IS SET ON WHEN THE DATA IS PUSHED
• FIN BIT IS SET ON WHEN THE DATA TRANSMISSION IS COMPLETED
Ms P Abirami Asst Prof Dept of Comp Sci
TCP SEGMENT
• 6 bits controls (1bit each ) –
• URG – The value of the URGENT pointer field is valid
• ACK - The value of the ACKNOWLEDGMENT field is valid
• PSH – PUSH the data
• RST – RESET the connection
• SYN – SYNCHRONIZE sequence number during connection
• FIN – Terminate the connection
• 16 bits of CHECKSUM – Added into stream to check the error occurrence in
the data transfer, mandatory in TCP not in the UDP.
• 16 bits of URGENT POINTER – it is used to store data when it is true
21
Ms P Abirami Asst Prof Dept of Comp Sci
TCP SERVICES
22
Ms P Abirami Asst Prof Dept of Comp Sci
TCP SERVICES
1. PROCESS – PROCESS COMMUNICATION
2. STREAM DELIVERY SERVICE
3. SENDING & RECEIVING BUFFER
4. FULL DUPLEX COMMUNICATION
5. CONNECTION ORIENTED SERVICES
6. RELIABLE SERVICES
23
Ms P Abirami Asst Prof Dept of Comp Sci
1.PROCESS - PROCESS
• There are different port
• Eg:
• 1 – communication
• 7 - echo
• 9 – discard
• 11 – available users
24
Ms P Abirami Asst Prof Dept of Comp Sci
2.STREAM DELIVERY SERVICES
• SENDING PROCESS
• RECEIVING PROCESS
• TCP act on sending process to send the stream of data to receiver
• TCP act on receiving process to receive the stream of data from sender
25
TCP PROCESS
Ms P Abirami Asst Prof Dept of Comp Sci
Stream delivery services
26
SENDING RECEIVING
TCP TCP
STREAM OF BYTES
Ms P Abirami Asst Prof Dept of Comp Sci
3. SENDING & RECEIVING BUFFER
1. BUFFER – STORAGE
2. SENDING & RECEIVING BUFFER
3. CIRCULAR ARRAY
4. SENDING BUFFER
5. RECEIVER BUFFER
27
Ms P Abirami Asst Prof Dept of Comp Sci
3.SENDING & RECEIVING BUFFER
• BUFFER – TO STORE DATA
• Circular array is used
• Sender – white, Gray & Coloured
• Receiver – White & Coloured
28
WHITE DATA HAVE TO BE STORED BY THE SENDER
GRAY STORED DATA WAITING FOR THE ACKNOWLEDGMENT
COLOURED DATA IS READY TO SEND
WHITE EMPTY PLACE WAITING FOR THE DATA FROM THE SENDER THROUGH NETWORK
COLOURED IT IS ALREADY RECEIVED AND READ BY THE RECEIVER
Ms P Abirami Asst Prof Dept of Comp Sci
29
Ms P Abirami Asst Prof Dept of Comp Sci
4. FULL DUPLEX COMMUNICATION
30
• In full-duplex mode, transmission is simultaneously bi-directional.
• The end devices can transmit and receive simultaneously.
• A prime example of full-duplex communications is the PSTN that
provides two-way communications.
Ms P Abirami Asst Prof Dept of Comp Sci
5.CONNECTION ORIENTED SERVICES
31
There is a sequence of operations that are needed to b followed by users.
1.Establishing Connection – (BETWEEN SENDER & RECEIVER)
It generally requires a session connection to be established just before any data is
transported or sent with a direct physical connection among sessions.
2.Transferring Data or Message – (BETWEEN SENDER & RECEIVER)
When this session connection is established, then we transfer or send message or data.
3.Releasing the Connection – (BETWEEN SENDER & RECEIVER)
After sending or transferring data, we release connection.
Ms P Abirami Asst Prof Dept of Comp Sci
6. RELIABLE SERVICES
32
SECURITY & INTEGRITY OF DATA TRANSMISSION
Ms P Abirami Asst Prof Dept of Comp Sci
TCP CONNECTION
33
Ms P Abirami Asst Prof Dept of Comp Sci
TCP CONNECTION
• TCP is connection oriented
• Establish virtual path between the source and destination
• Messages are send over the virtual path
• TCP uses the IP address to deliver individual segment to the receiver
• The lost/corrupted messages are retransmitted in TCP
• Connection oriented transmission has 3 phase
1. Connection establishment
2. Data transfer
3. Connection termination
34
Ms P Abirami Asst Prof Dept of Comp Sci
TCP CONNECTION
1 – CONNECTION ESTABLISHMENT
1. TCP transfer data in full duplex mode
2. Two nodes can send segments simultaneously
3. The connection should be established before data transmission
4. The connection establishment in TCP is called as “Three Way Handshaking”
35
Ms P Abirami Asst Prof Dept of Comp Sci
Three way handshaking
✓Server is in the passive open mode
✓Client is in the active open mode
✓The server program inform TCP, that it is ready to accept the connection ->
request for a passive open
✓The client program issues a request for an active open
36
Ms P Abirami Asst Prof Dept of Comp Sci
Three steps:
STEP -1
• The client sends the first segment , SYN segment with SYN flag set
• SYN– cannot carry data but it consumes one sequence number
37
SEQ : 8000
S
SENDER - RECEIVER
Client - Server
SEQUENCE NO : 8000
SYN FLAG IS SET
Ms P Abirami Asst Prof Dept of Comp Sci
Three steps:
STEP -2
• The server sends the second segment , SYN + ACK with 2 flag bit set
• It cannot carry data but it consumes one sequence number
38
SEQ : 15000
ACK : 8001
A S
SENDER - RECEIVER
server - client
SEQUENCE NO : 15000
ACK : 8001
ACK & SYN FLAG IS SET
Ms P Abirami Asst Prof Dept of Comp Sci
Three steps:
STEP -3
• The client sends the third segment , just an ACK segment
• It cannot carry data & consumes no sequence number
39
SEQ : 8000
ACK : 15001
A
SENDER - RECEIVER
Client - Server
Ms P Abirami Asst Prof Dept of Comp Sci
40
Ms P Abirami Asst Prof Dept of Comp Sci
• Simultaneous open - When both the processes issues an active open
• SYN Flooding Attack & Denial Of Service Attack – SYN flooding attack
belongs to a type of security attacks.
41
Ms P Abirami Asst Prof Dept of Comp Sci
TCP CONNECTION
2 – DATA TRANSFER
✓The data transfer will be take place once the connection has established
between client and the server
✓Both client and server will send and acknowledge the data
✓The data travelling in the same direction as an acknowledgment are carried on
the same segment
✓TCP implementation have the option to SET/NOT SET the PUSH & URGENT flag
42
Ms P Abirami Asst Prof Dept of Comp Sci
43
Three steps:
STEP -1
• The client sends the request to server to transfer the data( push the
data)
• Data – bytes from (8001-9000) as one segment and (9001-10000) as
another segment
SEQ : 8001
ACK:15001
A P
SENDER - RECEIVER
Client - Server
SEQUENCE NO : 8001
ACKNOWLEDGMENT NO:15001
ACK & PSH FLAGS ARE SET
Ms P Abirami Asst Prof Dept of Comp Sci
44
Three steps:
STEP -2
• The server sends the acknowledgment to server for the request of
transferring the data( push the data)
• Data – bytes from (8001-9000) as one segment and (9001-10000) as
another segment
SEQ : 15001
ACK:10001
A P
SENDER - RECEIVER
Server - Client
SEQUENCE NO : 15001
ACKNOWLEDGMENT NO:10001
ACK & PSH FLAGS ARE SET
Ms P Abirami Asst Prof Dept of Comp Sci
45
Three steps:
STEP -3
• The client sends the acknowledgment to server
SEQ : 10000
ACK:17001
A
SENDER - RECEIVER
Client- Server
SEQUENCE NO : 10000
ACKNOWLEDGMENT NO:17001
ACK FLAGS ARE SET
Ms P Abirami Asst Prof Dept of Comp Sci
46
Ms P Abirami Asst Prof Dept of Comp Sci
TCP CONNECTION
3 – TERMINATE THE CONNECTION
✓The connection has been terminated between client and the server after the
data transmission
✓Three way handshaking
✓ACK & FIN flag is set
✓Client side – active close & Server side – passive close
47
Ms P Abirami Asst Prof Dept of Comp Sci
48
Ms P Abirami Asst Prof Dept of Comp Sci
• Half close – connection closes before the complete transmission
49
Ms P Abirami Asst Prof Dept of Comp Sci
APPLICATION LAYER
50
Ms P Abirami Asst Prof Dept of Comp Sci
• DOMAIN NAME SYSTEM
• NAME SPACE
• DOMAIN NAME SPACE
• DOMAIN
• REMOTE LOGGING
• TELNET
• E-MAIL
• FILE TRANSFER
51
Ms P Abirami Asst Prof Dept of Comp Sci
DOMAIN NAME SPACE
(DNS)
• Naming database
• Internet domain names are located & translated into IP address
• It is hierarchical & decentralized naming system for computers
• Services or resources connected to internet / private network
• It assign domain name & mapping those to internet
52
Ms P Abirami Asst Prof Dept of Comp Sci
How DNS works?...
53
server
server
server
server
Ms P Abirami Asst Prof Dept of Comp Sci
Name Space
• The name assigned to a machine are unique because the address are unique
• The map each other using unique name
• The way it is organised as:
• Flat Name Space
• Hierarchical Name Space - several parts such as – nature of the organisation, name,
department etc.,
• E.g (www.ethirajcollege_computerscience.edu.in)
54
Ms P Abirami Asst Prof Dept of Comp Sci
Domain Name Space
• It is designed to have a hierarchical name space
• Inverted tree structure
• Root at the top
• Only 128 levels that is 0 – 127
55
Ms P Abirami Asst Prof Dept of Comp Sci
e.g: computerscience.ethirajcollege.edu.in
56
in
root
edu
ethirajcollege
computerscience
in
Edu.in
ethirajcollege.edu.in
computerscience.ethirajcollege.edu.in
Ms P Abirami Asst Prof Dept of Comp Sci
Domain
• Subtree of Domain Name Space
57
Ms P Abirami Asst Prof Dept of Comp Sci
REMOTE LOGGING
• E.G STUDENT USE TO ACCESS COLLEGE LAB LOG IN ID FROM THEIR HOME
• USE REMOTE SITE FROM THEIR LOCAL SITE
• CLIENT/SERVER IS USED FOR THAT SERVICE
• FTP,EMAIL ARE USED
58
Ms P Abirami Asst Prof Dept of Comp Sci
TELNET
• General purpose of client/server application program
• Terminal Network
• Standard TCP/IP protocol
• Local terminal is appears ate the remote system
• Time sharing environment – large computer supports multiple users
• Interaction between user and computer done through terminals
59
Ms P Abirami Asst Prof Dept of Comp Sci
TELNET - logging
• TELNET
----------→ NVT(Network Virtual Terminal)
-----→TCP/IP
-----→NVT
………..
60
Ms P Abirami Asst Prof Dept of Comp Sci
EMAIL
61
Ms P Abirami Asst Prof Dept of Comp Sci
E-MAIL
• Beginning – only short message consist of text
• Later – text, audio, image, video
• Message can be sent to more than one recipients
• General architecture : I , II ,III, IV - SCENARIOS
• User agent
• Message transfer agent
• Message access agent
62
Ms P Abirami Asst Prof Dept of Comp Sci
• USER AGENT
1. COMPOSING MESSAGES
2. READING MESSAGES
3. REPLYING TO MESSAGES
4. FORWARDING MESSAGES
5. HANDLING MAILBOX
• MESSAGE TRANSFER AGENT
1. SMTP – PROTOCOL TO TRANSFER MESSAGE
2. MTA – MAIL TRANSFER AGENT – CLIENT & SERVER
• MESSAGE ACCESS AGENT
1. POP – POST OFFFICE PROTOCOL – POP3 (VERSION 3)
2. IMAP – INTERNET MAIL ACCESS – IMAP4 (VERSION 4)
63
Ms P Abirami Asst Prof Dept of Comp Sci
ARCHITECTURE
• FIRST SCENARIO
• SECOND SCENARIO
• THIRD SCENARIO
• FOURTH SCENARIO
64
Ms P Abirami Asst Prof Dept of Comp Sci
ARCHITECTURE
65
SCENARIO SENDER RECEIVER USER AGENT MTA
FIRST SHARED SYSTEM TWO -
SECOND SYSETM1 SYSTEM2 TWO TWO
THIRD MAIL SERVER SYSTEM2 TWO TWO
FOURTH MAIL SERVER MAIL SERVER TWO TWO
Ms P Abirami Asst Prof Dept of Comp Sci
66
User
agent
FIRST
User
agent
Ms P Abirami Asst Prof Dept of Comp Sci
67
User
agent
SECOND
User
agent
INTERNET
MTA
CLIENT
MTA
SERVER
Ms P Abirami Asst Prof Dept of Comp Sci
68
User
agent
THIRD
User
agent
INTERNET
MTA
CLIENT
MTA
SERVER
MTA
SERVER
INTERNET
Ms P Abirami Asst Prof Dept of Comp Sci
69
User
agent
FOURTH
User
agent
INTERNET
MTA
CLIENT
MAA
SERVER
MTA
SERVER
INTERNET
MTA
SERVER
INTERNET
Ms P Abirami Asst Prof Dept of Comp Sci
FILE TRANSFER
70
Ms P Abirami Asst Prof Dept of Comp Sci
FILE TRANSFER
• Transfer files from one computer to another
• Protocol – FTP provided by TCP/IP
• It provides two connections between hosts
1. Data transfer
2. Control information (command & responses)
• FTP uses TCP ports 20 –data connection & 21 – control information
• Different FTP for client & server
• Client – 3 components
• Server – 2 components
71
Ms P Abirami Asst Prof Dept of Comp Sci
72
USER INTERFACE
CONTROL PROCESS
DATA TRANSFER PROCESS DATA TRANSFER PROCESS
CONTROL PROCESS
TCP/IP
CONTROL
CONNECTION
CLIENT
SERVER
Ms P Abirami Asst Prof Dept of Comp Sci
• Control connection and data connection is done between the client &
server
• Control connection – remains connected
• Data connection – open & close for each file transfer
73
Ms P Abirami Asst Prof Dept of Comp Sci
Communication over control connection
74
CONTROL PROCESS CONTROL PROCESS
NVT ASCIIT
CLIENT SERVER
Ms P Abirami Asst Prof Dept of Comp Sci
Communication over data connection
75
DATA TRANSFER
PROCESS
DATA TRANSFER
PROCESS
DATA CONNECTIONT
CLIENT SERVER
FILE TYPE
DATA STRUCTURE
TRANSMISSION MODE
Ms P Abirami Asst Prof Dept of Comp Sci
ANONYMOUS FTP
• To use FTP , user need account & password
• To use anonymous , FTP user can use
user name : anonymous
password : guest
76
Ms P Abirami Asst Prof Dept of Comp Sci
MORE WAY TO GO……………
ALL THE BEST
77
Ms P Abirami Asst Prof Dept of Comp Sci

More Related Content

Similar to Data Communication and Networking - Transport and Application Layer of the OSI model

Chapter 3 - Transport Layer for VN Students
Chapter 3 - Transport Layer for VN StudentsChapter 3 - Transport Layer for VN Students
Chapter 3 - Transport Layer for VN Students
alberttochiro
 
Computer networks transport layer
Computer networks  transport layerComputer networks  transport layer
Computer networks transport layer
jamunaashok
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
N.Jagadish Kumar
 
Computer network transport layer MODUL 2.pptx
Computer network transport layer MODUL 2.pptxComputer network transport layer MODUL 2.pptx
Computer network transport layer MODUL 2.pptx
pallavir61
 
User Datagram Protocol
User Datagram ProtocolUser Datagram Protocol
User Datagram Protocol
Purushottam Kamble
 
lecturer3.pptx
lecturer3.pptxlecturer3.pptx
lecturer3.pptx
MdFarabiHasan
 
Transmission control protocol
Transmission control protocolTransmission control protocol
Transmission control protocol
Sundra Anand
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
Online
 
Computer networks unit iv
Computer networks    unit ivComputer networks    unit iv
Computer networks unit iv
JAIGANESH SEKAR
 
4. tcp header.ppt
4. tcp header.ppt4. tcp header.ppt
4. tcp header.ppt
SurajKumar732187
 
Computer networks Module 3 Transport layer
Computer networks Module 3 Transport layerComputer networks Module 3 Transport layer
Computer networks Module 3 Transport layer
claudle200415
 
5-LEC- 5.pptxTransport Layer. Transport Layer Protocols
5-LEC- 5.pptxTransport Layer.  Transport Layer Protocols5-LEC- 5.pptxTransport Layer.  Transport Layer Protocols
5-LEC- 5.pptxTransport Layer. Transport Layer Protocols
ZahouAmel1
 
Unit-4 (1).pptx
Unit-4 (1).pptxUnit-4 (1).pptx
Unit-4 (1).pptx
poonamsngr
 
TRANSPORT LAYER ppt.pptx
TRANSPORT LAYER ppt.pptxTRANSPORT LAYER ppt.pptx
TRANSPORT LAYER ppt.pptx
utkarshlodhi4
 
transport.pptx
transport.pptxtransport.pptx
transport.pptx
jatinder42
 
Unit 5.Transport Layer.pptx
Unit 5.Transport Layer.pptxUnit 5.Transport Layer.pptx
Unit 5.Transport Layer.pptx
1136NayanSonawane
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake
Alok Tripathi
 
tcp-140613123317-phpapp01.pptx
tcp-140613123317-phpapp01.pptxtcp-140613123317-phpapp01.pptx
tcp-140613123317-phpapp01.pptx
touseeqzulfiqar1
 

Similar to Data Communication and Networking - Transport and Application Layer of the OSI model (20)

Chapter 3 - Transport Layer for VN Students
Chapter 3 - Transport Layer for VN StudentsChapter 3 - Transport Layer for VN Students
Chapter 3 - Transport Layer for VN Students
 
Computer networks transport layer
Computer networks  transport layerComputer networks  transport layer
Computer networks transport layer
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
Computer network transport layer MODUL 2.pptx
Computer network transport layer MODUL 2.pptxComputer network transport layer MODUL 2.pptx
Computer network transport layer MODUL 2.pptx
 
User Datagram Protocol
User Datagram ProtocolUser Datagram Protocol
User Datagram Protocol
 
lecturer3.pptx
lecturer3.pptxlecturer3.pptx
lecturer3.pptx
 
Transmission control protocol
Transmission control protocolTransmission control protocol
Transmission control protocol
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
Computer networks unit iv
Computer networks    unit ivComputer networks    unit iv
Computer networks unit iv
 
4. tcp header.ppt
4. tcp header.ppt4. tcp header.ppt
4. tcp header.ppt
 
Computer networks Module 3 Transport layer
Computer networks Module 3 Transport layerComputer networks Module 3 Transport layer
Computer networks Module 3 Transport layer
 
5-LEC- 5.pptxTransport Layer. Transport Layer Protocols
5-LEC- 5.pptxTransport Layer.  Transport Layer Protocols5-LEC- 5.pptxTransport Layer.  Transport Layer Protocols
5-LEC- 5.pptxTransport Layer. Transport Layer Protocols
 
Unit-4 (1).pptx
Unit-4 (1).pptxUnit-4 (1).pptx
Unit-4 (1).pptx
 
TRANSPORT LAYER ppt.pptx
TRANSPORT LAYER ppt.pptxTRANSPORT LAYER ppt.pptx
TRANSPORT LAYER ppt.pptx
 
transport.pptx
transport.pptxtransport.pptx
transport.pptx
 
Unit 5.Transport Layer.pptx
Unit 5.Transport Layer.pptxUnit 5.Transport Layer.pptx
Unit 5.Transport Layer.pptx
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake
 
tcp-140613123317-phpapp01.pptx
tcp-140613123317-phpapp01.pptxtcp-140613123317-phpapp01.pptx
tcp-140613123317-phpapp01.pptx
 
Mod4
Mod4Mod4
Mod4
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 

Data Communication and Networking - Transport and Application Layer of the OSI model

  • 1. UNIT -5 TRANSPORT & APPLICATION LAYER
  • 2. TRANSPORT LAYER 2 Ms P Abirami Asst Prof Dept of Comp Sci
  • 3. 3 Ms P Abirami Asst Prof Dept of Comp Sci
  • 4. ✓ 4th layer from the top. ✓ provide the communication services directly to the application processes running on different hosts. ✓ provides a logical communication between application processes running on different hosts. ✓ protocols are implemented in the end systems but not in the network routers. ✓ A computer network provides more than one protocol to the network applications. For example, TCP and UDP are two transport layer protocols that provide a different set of services to the network layer. ✓ protocols provide multiplexing/demultiplexing service. It also provides other services such as reliable data transfer, bandwidth guarantees, and delay guarantees. ✓ Each of the applications in the application layer has the ability to send a message by using TCP or UDP. The application communicates by using either of these two protocols. Both TCP and UDP will then communicate with the internet protocol in the internet layer. The applications can read and write to the transport layer. Therefore, we can say that communication is a two-way process. 4 Ms P Abirami Asst Prof Dept of Comp Sci
  • 5. The services provided by the transport layer protocols can be divided into five categories: •End-to-end delivery •Addressing •Reliable delivery •Flow control •Multiplexing 5 Ms P Abirami Asst Prof Dept of Comp Sci
  • 6. TCP [Transmission Control Protocol] & UDP[User Datagram Protocol] 6 Ms P Abirami Asst Prof Dept of Comp Sci
  • 7. 7 Ms P Abirami Asst Prof Dept of Comp Sci
  • 8. 8 Ms P Abirami Asst Prof Dept of Comp Sci
  • 9. 9 Ms P Abirami Asst Prof Dept of Comp Sci
  • 10. TCP 1. TCP SERVICES 2. TCP FEATURES 3. TCP SEGMENT 4. TCP CONNECTION 10 Ms P Abirami Asst Prof Dept of Comp Sci
  • 11. TCP FEATURES 11 Ms P Abirami Asst Prof Dept of Comp Sci
  • 12. TCP FEATURES • NUMBERING SYSTEM • FLOW CONTROL • ERROR CONTROL • CONGESTION CONTROL 12 Ms P Abirami Asst Prof Dept of Comp Sci
  • 13. TCP FEATURES • FLOW CONTROL – receiver controls the amount of data sent by sender to avoid overflowing • ERROR CONTROL – implements error detection & error correction during data transfer • CONGESTION CONTROL – data sent by sender is not only controlled by the receiver also by the level of congestion in the network 13 Ms P Abirami Asst Prof Dept of Comp Sci
  • 14. TCP FEATURES • NUMBERING SYSTEM • SEQUENCE NUMBER • ACKNOWLEDGMENT NUMBER BYTE NUMBER – byte of data transferred in each connection is numbered by TCP from 0 – 1 SEQUENCE NUMBER – 1st data byte in the segment 14 DEPENDS ON BYTE NUMBER NOT THE SEGMENT NUMBER Ms P Abirami Asst Prof Dept of Comp Sci
  • 15. TCP FEATURES SEQUENCE NUMBER – 1st data byte in the segment • Segment has 1 byte of data each • Combo of control & data • Used in establishing the connection, data transmission, connection termination • Valid only if it has data 15 Ms P Abirami Asst Prof Dept of Comp Sci
  • 16. TCP FEATURES ACKNOWLEDGMENT NUMBER – Cumulative , that is add 1 when last byte is received e.g : x + 1 for x , 5043 for 5042 • It is used to confirm the byte has to be received • It defines the number of next byte expects to be received 16 Ms P Abirami Asst Prof Dept of Comp Sci
  • 17. TCP SEGMENT 17 Ms P Abirami Asst Prof Dept of Comp Sci
  • 18. TCP SEGMENT 18 Ms P Abirami Asst Prof Dept of Comp Sci
  • 19. TCP SEGMENT • Data packets in the TCP are called as segments • Segment divide into - Header & data • Header- 20 to 60 bytes of data 19 Ms P Abirami Asst Prof Dept of Comp Sci
  • 20. TCP SEGMENT • Header – identify the sender / receiver of the data • 40 bytes of Option & Padding - for future purpose (data storage) • 16 bit of source port address & 16 bit of destination port address [application used for sending & receiving purpose has 16 bit each] • 32 bits Sequence number – 1st byte of the segment • 32 bits acknowledgment number – identify the next data to be received from sender to receiver • 16 bits window size – sender have to send only 16 bit to receiver , to avoid overflow [window size determines the receiver size] • 16 bits - 4bits HLEN (Header length ), 6bits Reserved (Reserved for the future), • 6 bits controls (1bit each ) – • URG - URGENT • ACK - ACKNOWLEDGMENT • PSH - PUSH • RST - RESET • SYN - SYNCHRONIZE • FIN - FINAL 20 THE FLAG IS SET ON WHEN THESE CONTROL BITS ARE ACTIVE • RESET BIT IS SET DURING RESET OTHER WISE IN OFF STATE • PUSH BIT IS SET ON WHEN THE DATA IS PUSHED • FIN BIT IS SET ON WHEN THE DATA TRANSMISSION IS COMPLETED Ms P Abirami Asst Prof Dept of Comp Sci
  • 21. TCP SEGMENT • 6 bits controls (1bit each ) – • URG – The value of the URGENT pointer field is valid • ACK - The value of the ACKNOWLEDGMENT field is valid • PSH – PUSH the data • RST – RESET the connection • SYN – SYNCHRONIZE sequence number during connection • FIN – Terminate the connection • 16 bits of CHECKSUM – Added into stream to check the error occurrence in the data transfer, mandatory in TCP not in the UDP. • 16 bits of URGENT POINTER – it is used to store data when it is true 21 Ms P Abirami Asst Prof Dept of Comp Sci
  • 22. TCP SERVICES 22 Ms P Abirami Asst Prof Dept of Comp Sci
  • 23. TCP SERVICES 1. PROCESS – PROCESS COMMUNICATION 2. STREAM DELIVERY SERVICE 3. SENDING & RECEIVING BUFFER 4. FULL DUPLEX COMMUNICATION 5. CONNECTION ORIENTED SERVICES 6. RELIABLE SERVICES 23 Ms P Abirami Asst Prof Dept of Comp Sci
  • 24. 1.PROCESS - PROCESS • There are different port • Eg: • 1 – communication • 7 - echo • 9 – discard • 11 – available users 24 Ms P Abirami Asst Prof Dept of Comp Sci
  • 25. 2.STREAM DELIVERY SERVICES • SENDING PROCESS • RECEIVING PROCESS • TCP act on sending process to send the stream of data to receiver • TCP act on receiving process to receive the stream of data from sender 25 TCP PROCESS Ms P Abirami Asst Prof Dept of Comp Sci
  • 26. Stream delivery services 26 SENDING RECEIVING TCP TCP STREAM OF BYTES Ms P Abirami Asst Prof Dept of Comp Sci
  • 27. 3. SENDING & RECEIVING BUFFER 1. BUFFER – STORAGE 2. SENDING & RECEIVING BUFFER 3. CIRCULAR ARRAY 4. SENDING BUFFER 5. RECEIVER BUFFER 27 Ms P Abirami Asst Prof Dept of Comp Sci
  • 28. 3.SENDING & RECEIVING BUFFER • BUFFER – TO STORE DATA • Circular array is used • Sender – white, Gray & Coloured • Receiver – White & Coloured 28 WHITE DATA HAVE TO BE STORED BY THE SENDER GRAY STORED DATA WAITING FOR THE ACKNOWLEDGMENT COLOURED DATA IS READY TO SEND WHITE EMPTY PLACE WAITING FOR THE DATA FROM THE SENDER THROUGH NETWORK COLOURED IT IS ALREADY RECEIVED AND READ BY THE RECEIVER Ms P Abirami Asst Prof Dept of Comp Sci
  • 29. 29 Ms P Abirami Asst Prof Dept of Comp Sci
  • 30. 4. FULL DUPLEX COMMUNICATION 30 • In full-duplex mode, transmission is simultaneously bi-directional. • The end devices can transmit and receive simultaneously. • A prime example of full-duplex communications is the PSTN that provides two-way communications. Ms P Abirami Asst Prof Dept of Comp Sci
  • 31. 5.CONNECTION ORIENTED SERVICES 31 There is a sequence of operations that are needed to b followed by users. 1.Establishing Connection – (BETWEEN SENDER & RECEIVER) It generally requires a session connection to be established just before any data is transported or sent with a direct physical connection among sessions. 2.Transferring Data or Message – (BETWEEN SENDER & RECEIVER) When this session connection is established, then we transfer or send message or data. 3.Releasing the Connection – (BETWEEN SENDER & RECEIVER) After sending or transferring data, we release connection. Ms P Abirami Asst Prof Dept of Comp Sci
  • 32. 6. RELIABLE SERVICES 32 SECURITY & INTEGRITY OF DATA TRANSMISSION Ms P Abirami Asst Prof Dept of Comp Sci
  • 33. TCP CONNECTION 33 Ms P Abirami Asst Prof Dept of Comp Sci
  • 34. TCP CONNECTION • TCP is connection oriented • Establish virtual path between the source and destination • Messages are send over the virtual path • TCP uses the IP address to deliver individual segment to the receiver • The lost/corrupted messages are retransmitted in TCP • Connection oriented transmission has 3 phase 1. Connection establishment 2. Data transfer 3. Connection termination 34 Ms P Abirami Asst Prof Dept of Comp Sci
  • 35. TCP CONNECTION 1 – CONNECTION ESTABLISHMENT 1. TCP transfer data in full duplex mode 2. Two nodes can send segments simultaneously 3. The connection should be established before data transmission 4. The connection establishment in TCP is called as “Three Way Handshaking” 35 Ms P Abirami Asst Prof Dept of Comp Sci
  • 36. Three way handshaking ✓Server is in the passive open mode ✓Client is in the active open mode ✓The server program inform TCP, that it is ready to accept the connection -> request for a passive open ✓The client program issues a request for an active open 36 Ms P Abirami Asst Prof Dept of Comp Sci
  • 37. Three steps: STEP -1 • The client sends the first segment , SYN segment with SYN flag set • SYN– cannot carry data but it consumes one sequence number 37 SEQ : 8000 S SENDER - RECEIVER Client - Server SEQUENCE NO : 8000 SYN FLAG IS SET Ms P Abirami Asst Prof Dept of Comp Sci
  • 38. Three steps: STEP -2 • The server sends the second segment , SYN + ACK with 2 flag bit set • It cannot carry data but it consumes one sequence number 38 SEQ : 15000 ACK : 8001 A S SENDER - RECEIVER server - client SEQUENCE NO : 15000 ACK : 8001 ACK & SYN FLAG IS SET Ms P Abirami Asst Prof Dept of Comp Sci
  • 39. Three steps: STEP -3 • The client sends the third segment , just an ACK segment • It cannot carry data & consumes no sequence number 39 SEQ : 8000 ACK : 15001 A SENDER - RECEIVER Client - Server Ms P Abirami Asst Prof Dept of Comp Sci
  • 40. 40 Ms P Abirami Asst Prof Dept of Comp Sci
  • 41. • Simultaneous open - When both the processes issues an active open • SYN Flooding Attack & Denial Of Service Attack – SYN flooding attack belongs to a type of security attacks. 41 Ms P Abirami Asst Prof Dept of Comp Sci
  • 42. TCP CONNECTION 2 – DATA TRANSFER ✓The data transfer will be take place once the connection has established between client and the server ✓Both client and server will send and acknowledge the data ✓The data travelling in the same direction as an acknowledgment are carried on the same segment ✓TCP implementation have the option to SET/NOT SET the PUSH & URGENT flag 42 Ms P Abirami Asst Prof Dept of Comp Sci
  • 43. 43 Three steps: STEP -1 • The client sends the request to server to transfer the data( push the data) • Data – bytes from (8001-9000) as one segment and (9001-10000) as another segment SEQ : 8001 ACK:15001 A P SENDER - RECEIVER Client - Server SEQUENCE NO : 8001 ACKNOWLEDGMENT NO:15001 ACK & PSH FLAGS ARE SET Ms P Abirami Asst Prof Dept of Comp Sci
  • 44. 44 Three steps: STEP -2 • The server sends the acknowledgment to server for the request of transferring the data( push the data) • Data – bytes from (8001-9000) as one segment and (9001-10000) as another segment SEQ : 15001 ACK:10001 A P SENDER - RECEIVER Server - Client SEQUENCE NO : 15001 ACKNOWLEDGMENT NO:10001 ACK & PSH FLAGS ARE SET Ms P Abirami Asst Prof Dept of Comp Sci
  • 45. 45 Three steps: STEP -3 • The client sends the acknowledgment to server SEQ : 10000 ACK:17001 A SENDER - RECEIVER Client- Server SEQUENCE NO : 10000 ACKNOWLEDGMENT NO:17001 ACK FLAGS ARE SET Ms P Abirami Asst Prof Dept of Comp Sci
  • 46. 46 Ms P Abirami Asst Prof Dept of Comp Sci
  • 47. TCP CONNECTION 3 – TERMINATE THE CONNECTION ✓The connection has been terminated between client and the server after the data transmission ✓Three way handshaking ✓ACK & FIN flag is set ✓Client side – active close & Server side – passive close 47 Ms P Abirami Asst Prof Dept of Comp Sci
  • 48. 48 Ms P Abirami Asst Prof Dept of Comp Sci
  • 49. • Half close – connection closes before the complete transmission 49 Ms P Abirami Asst Prof Dept of Comp Sci
  • 50. APPLICATION LAYER 50 Ms P Abirami Asst Prof Dept of Comp Sci
  • 51. • DOMAIN NAME SYSTEM • NAME SPACE • DOMAIN NAME SPACE • DOMAIN • REMOTE LOGGING • TELNET • E-MAIL • FILE TRANSFER 51 Ms P Abirami Asst Prof Dept of Comp Sci
  • 52. DOMAIN NAME SPACE (DNS) • Naming database • Internet domain names are located & translated into IP address • It is hierarchical & decentralized naming system for computers • Services or resources connected to internet / private network • It assign domain name & mapping those to internet 52 Ms P Abirami Asst Prof Dept of Comp Sci
  • 53. How DNS works?... 53 server server server server Ms P Abirami Asst Prof Dept of Comp Sci
  • 54. Name Space • The name assigned to a machine are unique because the address are unique • The map each other using unique name • The way it is organised as: • Flat Name Space • Hierarchical Name Space - several parts such as – nature of the organisation, name, department etc., • E.g (www.ethirajcollege_computerscience.edu.in) 54 Ms P Abirami Asst Prof Dept of Comp Sci
  • 55. Domain Name Space • It is designed to have a hierarchical name space • Inverted tree structure • Root at the top • Only 128 levels that is 0 – 127 55 Ms P Abirami Asst Prof Dept of Comp Sci
  • 57. Domain • Subtree of Domain Name Space 57 Ms P Abirami Asst Prof Dept of Comp Sci
  • 58. REMOTE LOGGING • E.G STUDENT USE TO ACCESS COLLEGE LAB LOG IN ID FROM THEIR HOME • USE REMOTE SITE FROM THEIR LOCAL SITE • CLIENT/SERVER IS USED FOR THAT SERVICE • FTP,EMAIL ARE USED 58 Ms P Abirami Asst Prof Dept of Comp Sci
  • 59. TELNET • General purpose of client/server application program • Terminal Network • Standard TCP/IP protocol • Local terminal is appears ate the remote system • Time sharing environment – large computer supports multiple users • Interaction between user and computer done through terminals 59 Ms P Abirami Asst Prof Dept of Comp Sci
  • 60. TELNET - logging • TELNET ----------→ NVT(Network Virtual Terminal) -----→TCP/IP -----→NVT ……….. 60 Ms P Abirami Asst Prof Dept of Comp Sci
  • 61. EMAIL 61 Ms P Abirami Asst Prof Dept of Comp Sci
  • 62. E-MAIL • Beginning – only short message consist of text • Later – text, audio, image, video • Message can be sent to more than one recipients • General architecture : I , II ,III, IV - SCENARIOS • User agent • Message transfer agent • Message access agent 62 Ms P Abirami Asst Prof Dept of Comp Sci
  • 63. • USER AGENT 1. COMPOSING MESSAGES 2. READING MESSAGES 3. REPLYING TO MESSAGES 4. FORWARDING MESSAGES 5. HANDLING MAILBOX • MESSAGE TRANSFER AGENT 1. SMTP – PROTOCOL TO TRANSFER MESSAGE 2. MTA – MAIL TRANSFER AGENT – CLIENT & SERVER • MESSAGE ACCESS AGENT 1. POP – POST OFFFICE PROTOCOL – POP3 (VERSION 3) 2. IMAP – INTERNET MAIL ACCESS – IMAP4 (VERSION 4) 63 Ms P Abirami Asst Prof Dept of Comp Sci
  • 64. ARCHITECTURE • FIRST SCENARIO • SECOND SCENARIO • THIRD SCENARIO • FOURTH SCENARIO 64 Ms P Abirami Asst Prof Dept of Comp Sci
  • 65. ARCHITECTURE 65 SCENARIO SENDER RECEIVER USER AGENT MTA FIRST SHARED SYSTEM TWO - SECOND SYSETM1 SYSTEM2 TWO TWO THIRD MAIL SERVER SYSTEM2 TWO TWO FOURTH MAIL SERVER MAIL SERVER TWO TWO Ms P Abirami Asst Prof Dept of Comp Sci
  • 66. 66 User agent FIRST User agent Ms P Abirami Asst Prof Dept of Comp Sci
  • 70. FILE TRANSFER 70 Ms P Abirami Asst Prof Dept of Comp Sci
  • 71. FILE TRANSFER • Transfer files from one computer to another • Protocol – FTP provided by TCP/IP • It provides two connections between hosts 1. Data transfer 2. Control information (command & responses) • FTP uses TCP ports 20 –data connection & 21 – control information • Different FTP for client & server • Client – 3 components • Server – 2 components 71 Ms P Abirami Asst Prof Dept of Comp Sci
  • 72. 72 USER INTERFACE CONTROL PROCESS DATA TRANSFER PROCESS DATA TRANSFER PROCESS CONTROL PROCESS TCP/IP CONTROL CONNECTION CLIENT SERVER Ms P Abirami Asst Prof Dept of Comp Sci
  • 73. • Control connection and data connection is done between the client & server • Control connection – remains connected • Data connection – open & close for each file transfer 73 Ms P Abirami Asst Prof Dept of Comp Sci
  • 74. Communication over control connection 74 CONTROL PROCESS CONTROL PROCESS NVT ASCIIT CLIENT SERVER Ms P Abirami Asst Prof Dept of Comp Sci
  • 75. Communication over data connection 75 DATA TRANSFER PROCESS DATA TRANSFER PROCESS DATA CONNECTIONT CLIENT SERVER FILE TYPE DATA STRUCTURE TRANSMISSION MODE Ms P Abirami Asst Prof Dept of Comp Sci
  • 76. ANONYMOUS FTP • To use FTP , user need account & password • To use anonymous , FTP user can use user name : anonymous password : guest 76 Ms P Abirami Asst Prof Dept of Comp Sci
  • 77. MORE WAY TO GO…………… ALL THE BEST 77 Ms P Abirami Asst Prof Dept of Comp Sci