SlideShare a Scribd company logo
Computer Networks
OSI Model and Protocols
Date:
Department of Computer Engineering
Presented By:
Rubal Sagwal
NIT, Kurukshetra
Department of Computer Engineering
1ADAD
Contents
• Introduction to Layers and Protocols.
• OSI Model
• OSI Model layer functioning.
• TCP/IP Model
• Addressing scheme
ADAD 2
OSI Model(activity)
Introduction to OSI – Functions of Seven Layers
ADAD 3
What is Layer
ADAD 4
Network
Hardware
Physical
devices
Software
Set of
Instructions
Layers
Layers Working
ADAD 5
OSI Model
• Open System Interconnection.
• Firstly introduced in 1970s.
• An open system is a set of protocols that allow any two
different systems to communicate.
• Protocols: Set of rules.
• OSI model itself is not a protocol, it is a model that
define protocols for network communication.
• Seven separate but related layers.
ADAD 6
OSI Model representation
ADAD 7
Encapsulation
• A packet (header and data) at level 7 is
encapsulated in a packet at level 6.
• The whole packet at level 6 is encapsulated in a
packet at level 5 and so on.
ADAD 8
Layers in OSI Model
Functions of Seven Layers
ADAD 9
Organization of Layers
• 7 layers can be thought of belonging to three
subgroup.
• These are:
ADAD 10
Layer 1
• Physical
• Data link
• Network
Layer 2
• Transport
layer
Layer 3
• Session
• Presentation
• Application
1. Physical Layer
Physical characteristics of interfaces and medium:
Define physical transmission medium (Guided or Unguided).
Interface between devices and transmission medium.
Representation of bits:
PL consist of bits (0s and 1s), so, data -> bits ->signals
(electrical or optical).
Data rate
 Transmission rate (means the number of bits sent per
second).
Synchronization of bits:
Sender and receiver must not receive the same bit rate but
must be at same time (synchronized clock0.
ADAD 11
1. Physical Layer
Line configuration:
Connection (point-to-point or multipoint) of devices to
the medium.
Physical topology:
Topological Structure (Bus, Star, Mesh etc)
Transmission mode:
Simplex, half-duplex or full duplex.
ADAD 12
2. Data Link Layer
Framing:
Arranging bit streams into Data Frames.
Physical addressing (machine address):
Add header to the frame to define the sender and receiver of
the data packet.
Flow Control;
Not to overload receiver
Error Control:
Error Free
Access Control:
Which device has access to the link at specific time instance.
ADAD 13
3. Network Layer
Source-to-destination delivery
Logical Addressing (network address)
Routing
ADAD 14
4. Transport Layer
Process-to-process delivery (applications)
Service-point addressing:
Send data to the correct process on particular computer.
Segmentation and reassembly
Divide into segments and assign sequence number.
Reassembly at destination according to sequence number.
Connection control
Connectionless or connection oriented
Flow control
Error control
Without damage, loss or duplication
ADAD 15
5. Session Layer
It establish, maintains and synchronize the
interaction among communicating systems.
Dialog control (half-duplex or full duplex at
application level)
Synchronization
ADAD 16
6. Presentation Layer
Semantics and Syntax
Translation:
Change the format according receivers end.
Encryption and Decryption
Compression
Reduce the size (Video, audio, images etc)
ADAD 17
7. Application Layer
User Interface
File transfer, access and management
Mail services
Directory service (database)
ADAD 18
TCP/IP
Introduction – Functioning
ADAD 19
TCP/IP
• Transmission Control Protocol / Internet Protocol.
• Four Layers:
ADAD 20
• Application Layer
• Presentation Layer
• Session Layer
Application Layer
• Data Link Layer
• Physical Layer
Transport Layer
Internet Layer
Host-to-Network
(Network
Interface) Layer
TCP/IP Model
ADAD 21
TCP/IP Layer Functioning
• PHYSICAL LAYER: Doesn’t define any specific
protocol, define physical structure.
• NETWORK LAYER: Supports internetworking
protocol (ARP, RARP, ICMP and IGMP).
• TRANSPORT LAYER: Responsible for delivery of
message from a process to another process (TCP
and UDP).
• APPLICATION LAYER: Is a combination of Session,
Presentation and Application Layer of OSI Model.
ADAD 22
Addressing
Physical – Logical – Port – Specific Address
ADAD 23
Relationship of layers and Addresses in TCP/IP
ADAD 24
• SPECIFIC ADDRESS
• (Processes)
Application
Layer
• PORT ADDRESS
• (SCTP, TCP, UDP)Transport Layer
• LOGICAL ADDRESS
• (IP and other protocols)Network Layer
• PHYSIAL ADDRESS
• (Underlying physical Networks)
Host-to-
network
Physical Address
• Address of a node as defined by LAN or WAN.
• Included in the frame used by DLL (Data link layer).
• Address format depends upon network.
ADAD 25
Logical Address
• IP Address.
• Used for Universal Communication.
• Identify each host uniquely in a network.
• Currently is 32 bit address.
ADAD 26
Port Address
• Process Address.
• For example: Computer A can communicate with computer
B by using TALNET. At the same time A can communicate
with C using File transfer Protocol. For these process to
receive data simultaneously we need method to label the
process, i.e Port Address.
ADAD 27
Specific Address
• URLs (www.google.com)
• Email Address (abc123@gmail.com)
ADAD 28
Protocols
TCP – UDP – IP – ICMP – ARP/RARP
ADAD 29
Transmission layer
Protocols
TCP – UDP
ADAD 30
Delivery Process
1. Node-to-Node Delivery: The Data link layer is responsible
for delivery of frames between two neighboring nodes
over a link, called node-to-node delivery.
2. Host-to-Host: Network layer is responsible for delivery of
datagrams between two hosts.
3. Process-to-Process: Transport layer is responsible for
delivery of data from process-to-process (application
program).
ADAD 31
Connectionless Vs Connection Oriented
Connectionless
• For sending data from
source to destination, no
need to establish any
connection.
• Packets are not
numbered; they may be
delayed or lost may
arrive out of sequence.
• No acknowledgement.
• Ex: UDP
Connection Oriented
• Connection is first
established between the
sender and the receiver.
• Data are transferred.
• Connection is released.
• Ex: TCP and SCTP.
ADAD 32
UDP
• User Datagram Protocol.
• Connectionless Protocol and Unreliable (No flow and error
control).
• Then why are we using it?
• Very simple protocol.
• If a process wants to send a small message and does not care much
about reliability.
• For small message (no need to generate any connection).
• Multicasting
ADAD 33
Well known port used by UDP
• Command for Unix:
$grep ftp /etc/services
ftp 21/udp
ADAD 34
Port Protocol Description
7 Echo Print a received datagram back to sender.
9 Discard Discards any datagram that is received.
11 User Active user.
13 Daytime Returns the date and time
53 Nameserver Domain Name Service
User datagram of UDP
• UDP packets called User Datagrams, have fixed size header of 8
bytes. Fields are as follows:
1. Source Port Number: Used by process running on the source
host.
• 16 bit long (range from 0 to 216 = 65535)
2. Destination Port Number: used by the process running on
destination host.
• 16 bit long.
3. Length: 16-bit long (0 to 65535).
• Define the length of user datagram header plus data.
UDP datagram length field is not that much important because it is
encapsulated within IP packet.
4. Checksum: for detection of error.
ADAD 35
Operation of UDP
• Connectionless Services: it means each datagram sent by
UDP is independent datagram.
• There is no relationship between the different user datagram even
if they are coming from same source process or going to same
destination.
• Are not numbered (nothing common).
• No connection establishment, no termination.
• Can’t send stream of data and chop them into different related
datagrams.
• Only for short messages that can fit into one datagram.
• Flow and Error Control: Very simple and unreliable.
• No flow control hence no windows, can overflow.
• Sender doesn’t know message has lost or duplicate, except a small
checksum that is not enough.
• Encapsulation and Decapsulation: within IP datagram.
ADAD 36
Use of UDP
• Suitable for process that requires simple request-
response communication, like FTP.
• Suitable for a process with internal flow and error
control like Trivial File Transfer Protocol (which has
its own error and flow control).
• Suitable for multicasting.
• Used for route updating protocol.
ADAD 37
TCP
• Transmission Control Protocol.
• Like UDP, use port numbers.
• Connection oriented (create virtual connection
between two TCPs to send data).
• Use flow and error control.
• Full duplex communication.
• Connection oriented and reliable protocol.
ADAD 38
TCP Services
1. Process-to-Process communication: Using port numbers.
ADAD 39
Port Protocol Description
7 Echo Print a received datagram back to sender.
9 Discard Discards any datagram that is received.
11 User Active user.
13 Daytime Returns the date and time
20 FTP, Data File transfer Protocol(data connection)
21 FTP, Control FTP (control connection)
25 SMTP Simple Mail Transfer Protocol
53 Nameserver Domain Name Service
80 HTTP Hypertext Transfer Protocol
TCP Services
2. Stream Delivery Services: Stream Oriented Protocol.
• Allow the sending process to deliver data as a stream of
bytes and allows to receiving process to obtain as a stream.
• Create an imaginary “tube” that carries their data across the
internet.
ADAD 40
TCP Services
Sending and Receiving Buffers: Because sending and
receiving processes may not write or read data at the same
speed TCP needs buffer for storage.
Useful in Segmentation also.
ADAD 41
TCP Features
1. Numbering System: No segment number but, Segment
Number=(Sequence number and Acknowledgement number).
2. Byte Numbers: store byte into sending buffer and number
them (generate random numbers between 0 to 2^35-1)
3. Sequence Number: After the byte no. sequence number is
assigned. SN number for each segment is the number of the
first byte carried in that segment.
4. Acknowledgement Number: Conform the byte is received. And
define the number of byte that next except to receive.
5. Flow control
6. Error control
7. Congestion Control
ADAD 42
TCP Segments Format
ADAD 43
TCP Segment Fields
1. Source Port Address: 16 bit; sender’s port number.
2. Destination Port Address: 16-bit; receiver’s port number.
3. Sequence Number: 32-bit; Define the number assigned to the first
byte of data contained that segment.
4. Acknowledgement Number: 32-bit; define byte number that the
receiver of the segment is expecting (X) to receive from the other
party then reply would be X+1.
5. Header Length: 4-bit; header can be between 20 to 60 bytes.
6. Reserved: 6-bit; reserved for future.
7. Window size: 16-bit; value is normally referred to as receiving
window.
8. Checksum
9. Urgent Pointer: Valid only if urgent flag is set.
10. Options: any optional data.
ADAD 44
TCP Segment Fields
7. Control: 6 different flags.
ADAD 45
Flag Description
URG 16-bit; valid only if urgent flag is set; is used when segment contains
some urgent data.
ACK Successful Acknowledgement.
PSH PUSH similar to URG; tells the receiver to process these packets as they
are received instead of buffering them.
RST Reset the connection.
SYN Synchronization flag, is used as a first step in establishing a 3-way
handshake between two hosts
FIN Finished; Terminate the connection.
A TCP Connection
• Connection Oriented – use a virtual path between source
and destination.
• All the segments belong to a message are sent over this
path.
• Use a single path for entire message; acknowledgement
process and retransmission of damaged or lost frames.
• Path is virtual not physical.
• Three phases: Three-Way Handshaking
1. Connection Establishment
2. Data Transfer
3. Connection Termination
ADAD 46
TCP Connection Establishment
• Full-Duplex Mode
• For transmission/ communication of data each party has to
take permission of receiver.
• The process works like:
1. The server program tells its TCP that it is ready to accept a
connection (if it is passive).
2. The client program issue a request for an active open.
3. A client that need to establish a connection tells to the particular
server that it need to generate a connection.
4. Starts Three-way handshaking process.
5. Each connection shows Sequence number, acknowledgement
number, control flags and window size.
ADAD 47
1. TCP Connection Establishment Using Three-
way Handshake
ADAD 48
1. TCP Connection Establishment Using Three-
way Handshake
1. Client send first SYN segment, in which SYN flag is set for
synchronization of sequence number.
2. Server send two flag bits set: SYN+ACK.
3. Client send just an ACK segment just to acknowledge of
second segment from server.
Now connection is established.
And ready to transfer data.
ADAD 49
2. Data Transfer
ADAD 50
3. Connection Termination Using Three-Way
Handshake
ADAD 51
IP (Internet Protocol)
• Network layer protocol.
• Host-to-host delivery.
• Two main protocols are:
1. IPv4
2. IPv6
ADAD 52
1. IPv4
ADAD 53
2. IPv6
ADAD 54
ICMP
ADAD 55
ARP/ RARP
ADAD 56
OSI Model Vs TCP/IP
Comparison between OSI model and TCP/IP
ADAD 57
Comparison
ADAD 58
Ethernet Address
Comparison between OSI model and TCP/IP
ADAD 59
ARP/ RARP
ADAD 60

More Related Content

What's hot

TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network pptextraganesh
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
Naiyan Noor
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
Ramola Dhande
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
vasanthimuniasamy
 
Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
Kumar Alok
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
k33a
 
Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network ModelsWayne Jones Jnr
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
Mukesh Tekwani
 
Network Layer
Network LayerNetwork Layer
Network Layer
Dr Shashikant Athawale
 
Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)Ismail Mukiibi
 
MAC & IP addresses
MAC & IP addressesMAC & IP addresses
MAC & IP addresses
NetProtocol Xpert
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
Michael Lamont
 
Transport layer
Transport layer Transport layer
Transport layer
Mukesh Chinta
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
Shivani Godha
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
Melvin Cabatuan
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And ProtocolsSteven Cahill
 
IPv4
IPv4IPv4
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
VijayaLakshmi514
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
BE Smârt
 

What's hot (20)

TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network Models
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)
 
MAC & IP addresses
MAC & IP addressesMAC & IP addresses
MAC & IP addresses
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
Transport layer
Transport layer Transport layer
Transport layer
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 
IPv4
IPv4IPv4
IPv4
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Ip address
Ip addressIp address
Ip address
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
 

Similar to OSI model and TCP/IP model

layering.pdf
layering.pdflayering.pdf
layering.pdf
BoostHub
 
Networking essentials lect1
Networking essentials lect1Networking essentials lect1
Networking essentials lect1
Roman Brovko
 
3131471Scanned.ppt
3131471Scanned.ppt3131471Scanned.ppt
3131471Scanned.ppt
ssuserf21d85
 
Lecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptxLecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptx
Ronoh Kennedy
 
LECTURE-Transport-Layer_lec.ppt
LECTURE-Transport-Layer_lec.pptLECTURE-Transport-Layer_lec.ppt
LECTURE-Transport-Layer_lec.ppt
MonirHossain707319
 
UNit-4 Transport Layer and its protocols.pdf
UNit-4 Transport Layer  and its protocols.pdfUNit-4 Transport Layer  and its protocols.pdf
UNit-4 Transport Layer and its protocols.pdf
ManimegalaM3
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
AnaniaKapala
 
Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013Travis Leong Ping
 
NP-lab-manual (1).pdf
NP-lab-manual (1).pdfNP-lab-manual (1).pdf
NP-lab-manual (1).pdf
RaviRajput416403
 
NP-lab-manual.pdf
NP-lab-manual.pdfNP-lab-manual.pdf
NP-lab-manual.pdf
RaviRajput416403
 
NP-lab-manual.docx
NP-lab-manual.docxNP-lab-manual.docx
NP-lab-manual.docx
RaviRajput416403
 
10. tcp ip and do d model
10. tcp ip and do d model10. tcp ip and do d model
10. tcp ip and do d modelSwarndeep Singh
 
OSI model.pptx
OSI model.pptxOSI model.pptx
OSI model.pptx
SmtArunaAsafAliGovtP
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
N.Jagadish Kumar
 
Networking Fundamentals
Networking Fundamentals Networking Fundamentals
Networking Fundamentals
Vikas Gupta
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
nnmaurya
 
computerNetworkSecurity.ppt
computerNetworkSecurity.pptcomputerNetworkSecurity.ppt
computerNetworkSecurity.ppt
ChandrasekharBehera16
 
210202021018701 suratNetworkSecurity.ppt
210202021018701 suratNetworkSecurity.ppt210202021018701 suratNetworkSecurity.ppt
210202021018701 suratNetworkSecurity.ppt
jayvagasiya136
 

Similar to OSI model and TCP/IP model (20)

layering.pdf
layering.pdflayering.pdf
layering.pdf
 
Networking essentials lect1
Networking essentials lect1Networking essentials lect1
Networking essentials lect1
 
Lecture set 7
Lecture set 7Lecture set 7
Lecture set 7
 
3131471Scanned.ppt
3131471Scanned.ppt3131471Scanned.ppt
3131471Scanned.ppt
 
Lecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptxLecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptx
 
LECTURE-Transport-Layer_lec.ppt
LECTURE-Transport-Layer_lec.pptLECTURE-Transport-Layer_lec.ppt
LECTURE-Transport-Layer_lec.ppt
 
UNit-4 Transport Layer and its protocols.pdf
UNit-4 Transport Layer  and its protocols.pdfUNit-4 Transport Layer  and its protocols.pdf
UNit-4 Transport Layer and its protocols.pdf
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
 
Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013
 
NP-lab-manual (1).pdf
NP-lab-manual (1).pdfNP-lab-manual (1).pdf
NP-lab-manual (1).pdf
 
NP-lab-manual.pdf
NP-lab-manual.pdfNP-lab-manual.pdf
NP-lab-manual.pdf
 
NP-lab-manual.docx
NP-lab-manual.docxNP-lab-manual.docx
NP-lab-manual.docx
 
TCP Vs UDP
TCP Vs UDP TCP Vs UDP
TCP Vs UDP
 
10. tcp ip and do d model
10. tcp ip and do d model10. tcp ip and do d model
10. tcp ip and do d model
 
OSI model.pptx
OSI model.pptxOSI model.pptx
OSI model.pptx
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
Networking Fundamentals
Networking Fundamentals Networking Fundamentals
Networking Fundamentals
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
 
computerNetworkSecurity.ppt
computerNetworkSecurity.pptcomputerNetworkSecurity.ppt
computerNetworkSecurity.ppt
 
210202021018701 suratNetworkSecurity.ppt
210202021018701 suratNetworkSecurity.ppt210202021018701 suratNetworkSecurity.ppt
210202021018701 suratNetworkSecurity.ppt
 

More from Rubal Sagwal

Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
Rubal Sagwal
 
Cloud and Virtualization Security
Cloud and Virtualization SecurityCloud and Virtualization Security
Cloud and Virtualization Security
Rubal Sagwal
 
Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)
Rubal Sagwal
 
ER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMSER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMS
Rubal Sagwal
 
Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...
Rubal Sagwal
 
Overview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and ArchitectureOverview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and Architecture
Rubal Sagwal
 
Practical Implementation of Virtual Machine
Practical Implementation of Virtual MachinePractical Implementation of Virtual Machine
Practical Implementation of Virtual Machine
Rubal Sagwal
 
Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software
Rubal Sagwal
 
Accessing virtualized published applications
Accessing virtualized published applicationsAccessing virtualized published applications
Accessing virtualized published applications
Rubal Sagwal
 
Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization      Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization
Rubal Sagwal
 
Managing Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine ResourcesManaging Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine Resources
Rubal Sagwal
 
Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms
Rubal Sagwal
 
Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation
Rubal Sagwal
 
Principles of virtualization
Principles of virtualizationPrinciples of virtualization
Principles of virtualization
Rubal Sagwal
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
Rubal Sagwal
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
Rubal Sagwal
 
Basics of Network Layer and Transport Layer
Basics of Network Layer and Transport LayerBasics of Network Layer and Transport Layer
Basics of Network Layer and Transport Layer
Rubal Sagwal
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and Standards
Rubal Sagwal
 
Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP
Rubal Sagwal
 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network Device
Rubal Sagwal
 

More from Rubal Sagwal (20)

Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Cloud and Virtualization Security
Cloud and Virtualization SecurityCloud and Virtualization Security
Cloud and Virtualization Security
 
Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)
 
ER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMSER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMS
 
Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...
 
Overview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and ArchitectureOverview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and Architecture
 
Practical Implementation of Virtual Machine
Practical Implementation of Virtual MachinePractical Implementation of Virtual Machine
Practical Implementation of Virtual Machine
 
Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software
 
Accessing virtualized published applications
Accessing virtualized published applicationsAccessing virtualized published applications
Accessing virtualized published applications
 
Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization      Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization
 
Managing Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine ResourcesManaging Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine Resources
 
Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms
 
Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation
 
Principles of virtualization
Principles of virtualizationPrinciples of virtualization
Principles of virtualization
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
 
Basics of Network Layer and Transport Layer
Basics of Network Layer and Transport LayerBasics of Network Layer and Transport Layer
Basics of Network Layer and Transport Layer
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and Standards
 
Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP
 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network Device
 

Recently uploaded

Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 

Recently uploaded (20)

Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 

OSI model and TCP/IP model

  • 1. Computer Networks OSI Model and Protocols Date: Department of Computer Engineering Presented By: Rubal Sagwal NIT, Kurukshetra Department of Computer Engineering 1ADAD
  • 2. Contents • Introduction to Layers and Protocols. • OSI Model • OSI Model layer functioning. • TCP/IP Model • Addressing scheme ADAD 2
  • 3. OSI Model(activity) Introduction to OSI – Functions of Seven Layers ADAD 3
  • 4. What is Layer ADAD 4 Network Hardware Physical devices Software Set of Instructions Layers
  • 6. OSI Model • Open System Interconnection. • Firstly introduced in 1970s. • An open system is a set of protocols that allow any two different systems to communicate. • Protocols: Set of rules. • OSI model itself is not a protocol, it is a model that define protocols for network communication. • Seven separate but related layers. ADAD 6
  • 8. Encapsulation • A packet (header and data) at level 7 is encapsulated in a packet at level 6. • The whole packet at level 6 is encapsulated in a packet at level 5 and so on. ADAD 8
  • 9. Layers in OSI Model Functions of Seven Layers ADAD 9
  • 10. Organization of Layers • 7 layers can be thought of belonging to three subgroup. • These are: ADAD 10 Layer 1 • Physical • Data link • Network Layer 2 • Transport layer Layer 3 • Session • Presentation • Application
  • 11. 1. Physical Layer Physical characteristics of interfaces and medium: Define physical transmission medium (Guided or Unguided). Interface between devices and transmission medium. Representation of bits: PL consist of bits (0s and 1s), so, data -> bits ->signals (electrical or optical). Data rate  Transmission rate (means the number of bits sent per second). Synchronization of bits: Sender and receiver must not receive the same bit rate but must be at same time (synchronized clock0. ADAD 11
  • 12. 1. Physical Layer Line configuration: Connection (point-to-point or multipoint) of devices to the medium. Physical topology: Topological Structure (Bus, Star, Mesh etc) Transmission mode: Simplex, half-duplex or full duplex. ADAD 12
  • 13. 2. Data Link Layer Framing: Arranging bit streams into Data Frames. Physical addressing (machine address): Add header to the frame to define the sender and receiver of the data packet. Flow Control; Not to overload receiver Error Control: Error Free Access Control: Which device has access to the link at specific time instance. ADAD 13
  • 14. 3. Network Layer Source-to-destination delivery Logical Addressing (network address) Routing ADAD 14
  • 15. 4. Transport Layer Process-to-process delivery (applications) Service-point addressing: Send data to the correct process on particular computer. Segmentation and reassembly Divide into segments and assign sequence number. Reassembly at destination according to sequence number. Connection control Connectionless or connection oriented Flow control Error control Without damage, loss or duplication ADAD 15
  • 16. 5. Session Layer It establish, maintains and synchronize the interaction among communicating systems. Dialog control (half-duplex or full duplex at application level) Synchronization ADAD 16
  • 17. 6. Presentation Layer Semantics and Syntax Translation: Change the format according receivers end. Encryption and Decryption Compression Reduce the size (Video, audio, images etc) ADAD 17
  • 18. 7. Application Layer User Interface File transfer, access and management Mail services Directory service (database) ADAD 18
  • 20. TCP/IP • Transmission Control Protocol / Internet Protocol. • Four Layers: ADAD 20 • Application Layer • Presentation Layer • Session Layer Application Layer • Data Link Layer • Physical Layer Transport Layer Internet Layer Host-to-Network (Network Interface) Layer
  • 22. TCP/IP Layer Functioning • PHYSICAL LAYER: Doesn’t define any specific protocol, define physical structure. • NETWORK LAYER: Supports internetworking protocol (ARP, RARP, ICMP and IGMP). • TRANSPORT LAYER: Responsible for delivery of message from a process to another process (TCP and UDP). • APPLICATION LAYER: Is a combination of Session, Presentation and Application Layer of OSI Model. ADAD 22
  • 23. Addressing Physical – Logical – Port – Specific Address ADAD 23
  • 24. Relationship of layers and Addresses in TCP/IP ADAD 24 • SPECIFIC ADDRESS • (Processes) Application Layer • PORT ADDRESS • (SCTP, TCP, UDP)Transport Layer • LOGICAL ADDRESS • (IP and other protocols)Network Layer • PHYSIAL ADDRESS • (Underlying physical Networks) Host-to- network
  • 25. Physical Address • Address of a node as defined by LAN or WAN. • Included in the frame used by DLL (Data link layer). • Address format depends upon network. ADAD 25
  • 26. Logical Address • IP Address. • Used for Universal Communication. • Identify each host uniquely in a network. • Currently is 32 bit address. ADAD 26
  • 27. Port Address • Process Address. • For example: Computer A can communicate with computer B by using TALNET. At the same time A can communicate with C using File transfer Protocol. For these process to receive data simultaneously we need method to label the process, i.e Port Address. ADAD 27
  • 28. Specific Address • URLs (www.google.com) • Email Address (abc123@gmail.com) ADAD 28
  • 29. Protocols TCP – UDP – IP – ICMP – ARP/RARP ADAD 29
  • 31. Delivery Process 1. Node-to-Node Delivery: The Data link layer is responsible for delivery of frames between two neighboring nodes over a link, called node-to-node delivery. 2. Host-to-Host: Network layer is responsible for delivery of datagrams between two hosts. 3. Process-to-Process: Transport layer is responsible for delivery of data from process-to-process (application program). ADAD 31
  • 32. Connectionless Vs Connection Oriented Connectionless • For sending data from source to destination, no need to establish any connection. • Packets are not numbered; they may be delayed or lost may arrive out of sequence. • No acknowledgement. • Ex: UDP Connection Oriented • Connection is first established between the sender and the receiver. • Data are transferred. • Connection is released. • Ex: TCP and SCTP. ADAD 32
  • 33. UDP • User Datagram Protocol. • Connectionless Protocol and Unreliable (No flow and error control). • Then why are we using it? • Very simple protocol. • If a process wants to send a small message and does not care much about reliability. • For small message (no need to generate any connection). • Multicasting ADAD 33
  • 34. Well known port used by UDP • Command for Unix: $grep ftp /etc/services ftp 21/udp ADAD 34 Port Protocol Description 7 Echo Print a received datagram back to sender. 9 Discard Discards any datagram that is received. 11 User Active user. 13 Daytime Returns the date and time 53 Nameserver Domain Name Service
  • 35. User datagram of UDP • UDP packets called User Datagrams, have fixed size header of 8 bytes. Fields are as follows: 1. Source Port Number: Used by process running on the source host. • 16 bit long (range from 0 to 216 = 65535) 2. Destination Port Number: used by the process running on destination host. • 16 bit long. 3. Length: 16-bit long (0 to 65535). • Define the length of user datagram header plus data. UDP datagram length field is not that much important because it is encapsulated within IP packet. 4. Checksum: for detection of error. ADAD 35
  • 36. Operation of UDP • Connectionless Services: it means each datagram sent by UDP is independent datagram. • There is no relationship between the different user datagram even if they are coming from same source process or going to same destination. • Are not numbered (nothing common). • No connection establishment, no termination. • Can’t send stream of data and chop them into different related datagrams. • Only for short messages that can fit into one datagram. • Flow and Error Control: Very simple and unreliable. • No flow control hence no windows, can overflow. • Sender doesn’t know message has lost or duplicate, except a small checksum that is not enough. • Encapsulation and Decapsulation: within IP datagram. ADAD 36
  • 37. Use of UDP • Suitable for process that requires simple request- response communication, like FTP. • Suitable for a process with internal flow and error control like Trivial File Transfer Protocol (which has its own error and flow control). • Suitable for multicasting. • Used for route updating protocol. ADAD 37
  • 38. TCP • Transmission Control Protocol. • Like UDP, use port numbers. • Connection oriented (create virtual connection between two TCPs to send data). • Use flow and error control. • Full duplex communication. • Connection oriented and reliable protocol. ADAD 38
  • 39. TCP Services 1. Process-to-Process communication: Using port numbers. ADAD 39 Port Protocol Description 7 Echo Print a received datagram back to sender. 9 Discard Discards any datagram that is received. 11 User Active user. 13 Daytime Returns the date and time 20 FTP, Data File transfer Protocol(data connection) 21 FTP, Control FTP (control connection) 25 SMTP Simple Mail Transfer Protocol 53 Nameserver Domain Name Service 80 HTTP Hypertext Transfer Protocol
  • 40. TCP Services 2. Stream Delivery Services: Stream Oriented Protocol. • Allow the sending process to deliver data as a stream of bytes and allows to receiving process to obtain as a stream. • Create an imaginary “tube” that carries their data across the internet. ADAD 40
  • 41. TCP Services Sending and Receiving Buffers: Because sending and receiving processes may not write or read data at the same speed TCP needs buffer for storage. Useful in Segmentation also. ADAD 41
  • 42. TCP Features 1. Numbering System: No segment number but, Segment Number=(Sequence number and Acknowledgement number). 2. Byte Numbers: store byte into sending buffer and number them (generate random numbers between 0 to 2^35-1) 3. Sequence Number: After the byte no. sequence number is assigned. SN number for each segment is the number of the first byte carried in that segment. 4. Acknowledgement Number: Conform the byte is received. And define the number of byte that next except to receive. 5. Flow control 6. Error control 7. Congestion Control ADAD 42
  • 44. TCP Segment Fields 1. Source Port Address: 16 bit; sender’s port number. 2. Destination Port Address: 16-bit; receiver’s port number. 3. Sequence Number: 32-bit; Define the number assigned to the first byte of data contained that segment. 4. Acknowledgement Number: 32-bit; define byte number that the receiver of the segment is expecting (X) to receive from the other party then reply would be X+1. 5. Header Length: 4-bit; header can be between 20 to 60 bytes. 6. Reserved: 6-bit; reserved for future. 7. Window size: 16-bit; value is normally referred to as receiving window. 8. Checksum 9. Urgent Pointer: Valid only if urgent flag is set. 10. Options: any optional data. ADAD 44
  • 45. TCP Segment Fields 7. Control: 6 different flags. ADAD 45 Flag Description URG 16-bit; valid only if urgent flag is set; is used when segment contains some urgent data. ACK Successful Acknowledgement. PSH PUSH similar to URG; tells the receiver to process these packets as they are received instead of buffering them. RST Reset the connection. SYN Synchronization flag, is used as a first step in establishing a 3-way handshake between two hosts FIN Finished; Terminate the connection.
  • 46. A TCP Connection • Connection Oriented – use a virtual path between source and destination. • All the segments belong to a message are sent over this path. • Use a single path for entire message; acknowledgement process and retransmission of damaged or lost frames. • Path is virtual not physical. • Three phases: Three-Way Handshaking 1. Connection Establishment 2. Data Transfer 3. Connection Termination ADAD 46
  • 47. TCP Connection Establishment • Full-Duplex Mode • For transmission/ communication of data each party has to take permission of receiver. • The process works like: 1. The server program tells its TCP that it is ready to accept a connection (if it is passive). 2. The client program issue a request for an active open. 3. A client that need to establish a connection tells to the particular server that it need to generate a connection. 4. Starts Three-way handshaking process. 5. Each connection shows Sequence number, acknowledgement number, control flags and window size. ADAD 47
  • 48. 1. TCP Connection Establishment Using Three- way Handshake ADAD 48
  • 49. 1. TCP Connection Establishment Using Three- way Handshake 1. Client send first SYN segment, in which SYN flag is set for synchronization of sequence number. 2. Server send two flag bits set: SYN+ACK. 3. Client send just an ACK segment just to acknowledge of second segment from server. Now connection is established. And ready to transfer data. ADAD 49
  • 51. 3. Connection Termination Using Three-Way Handshake ADAD 51
  • 52. IP (Internet Protocol) • Network layer protocol. • Host-to-host delivery. • Two main protocols are: 1. IPv4 2. IPv6 ADAD 52
  • 57. OSI Model Vs TCP/IP Comparison between OSI model and TCP/IP ADAD 57
  • 59. Ethernet Address Comparison between OSI model and TCP/IP ADAD 59