SlideShare a Scribd company logo
PROTOCOL STACK AND ADDRESSING BY  DNAA GROUP 11 protocol stack
TEAM MEMBERS D HANUSHA  1MS07IS025 N ISHITA.M  1MS07IS061 A RCHANA.H.V  1MS07IS012 A NANYA.B.NAIK  1MS07IS007 protocol stack
TABLE OF CONTENTS INTRODUCTION  OSI MODEL PHYSICAL LAYER  DATA LINK LAYER NETWORK LAYER TRANSPORT LAYER protocol stack
INTRODUCTION PROTOCOLS PROTOCOL STACK OSI MODEL protocol stack
OSI MODEL APPLICATION LAYER PRESENTATION LAYER SESSIONS LAYER TRANSPORT LAYER NETWORK LAYER DATA LINK LAYER PHYSICAL LAYER protocol stack
PHYSICAL LAYER It is the first and lowest layer of OSI model of computer networking. The physical layer consists of the basic hardware transmission technologies of a network Physical layer obtains the data obtained by data link layer in the form of frames which it will convert into bits Physical layer converts the data sent by data link layer into signals compatible with the transmission media protocol stack
Techniques Data present in the physical layer can be analog or digital. It has to be converted either to digital signal or analog signal For the conversion of digital to digital signals three techniques are used: 1.Line coding 2.Block coding 3.scrambling  protocol stack
Techniques For the conversion of digital data to analog signals the techniques used are 1.Amplitude shift keying 2.Frequency shift keying 3.Phase shift keying 4.Quadrature amplitude modulation protocol stack
Functions Of physical Layer Physical characteristics of interfaces and medium Representation of bits Line configuration Physical topology Transmission mode Autonegotiation protocol stack
Protocols of Physical Layer X.21 EIA-232-E ATM protocol stack
X.21 X.21 interface protocol is concerned only with the set-up and clearing operating between DTE and DCE associated with each call It is a circuit switching protocol using synchronous ASCII with odd parity to connect or disconnect a subscriber to bulic switching network Any data can be transferred through the network after call establishment is successful via x.21 protocol protocol stack
EIA-232-E It is also called RS-232-C.it is found in both synchronous and asynchronous environment Almost all modems conform to the EIA-232 standard and most PC have an EIA-232 port for connecting a modem or other devices protocol stack
ATM Asynchronous transfer mode is an electronic digital data transmission technology. It is mainly used to transfer real-time video conference and audio as well as image files, text and email ATM is a packet oriented transfer method that uses asynchronous time division multiplying techniques. It encodes the data into small sized cells and provides data link layer services that run over OSI layer. It is mainly designed for high speed(155 MBits) communication protocol stack
DATA LINK LAYER The  data link layer  is the second layer in the OSI seven-layer reference model. It responds to service requests from the network layer above it and issues service requests to the physical layer below it.  FUNCTIONS: 1)Framing 2)Addressing 3)Flow Control 4)Error Control 5)Media Access Control protocol stack
Framing Framing in this layer separates a message  from one source to a destination, or from other messages to other destinations, by adding a sender address and a destination address. TYPES: 1)Fixed-Size Framing 2)Variable-Size Framing Character-Oriented Protocols: flag trailer flag header Data from upper layer protocol stack
Error detection Data can be corrupted during transmission. TYPES of errors: 1)Single-Bit Error 2)Burst Error To detect or correct errors, we need to send extra (redundant) bits with data. Error detection: 1) The receiver has a list if valid codewords. 2) The original codeword has changed to an invalid one. protocol stack
Data word generator codeword Data word Checker Codeword SENDER RECEIVER Encoder Decoder Extract Discard Unreliable Transmission Data words Codewords Code fro error detection protocol stack 00 000 01 011 10 101 11 110
Error correction More redundant bits are required for error correction than for error detection. Example: let the code word transferred be 01001. Humming distance: between two words is the number of differences between corresponding bits. Minimum humming distance is chosen. protocol stack Data word Code word 00 00000 01 01011 10 10101 11 11110
Protocols Flow control refers to a  set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Error control in the data link layer is based on automatic repeat request, which is the retransmission of data. Protocols are implemented in software by using one of the common programming languages. Protocols Noiseless channels Noisy channel Stop and wait simplest Stop and wait ARQ Go back-N ARQ Selective repeat ARQ protocol stack
Simplest protocol sender site algorithm  While (true) { wait for event(); if(event ( request to send)) { get data(); make frame(); send frame(); } } protocol stack
Receiver site algorithm While ( true ) { wait for event(); if( event ( arrival notification)) { receive frame(); extract data(); deliver data(); [send frame] // for stop and wait protocol } } protocol stack
STOP AND WAIT PROTOCOL While(true) Can send= true { wait for event(); if( event(request to send)and can send) { get data(); make frame(); send frame(); can send= false; } Wait for event(); If ( event( arrival notification) { receive frame(); can send= true; } } protocol stack
POINT TO POINT PROTOCOL provides network address configuration. That is when a home user needs a temporary network address to connect to the internet. Defines format of the frame. Provides multiple network layer . Does not provide flow control. No sophisticated addressing mechanism to handle frames. Simple mechanism for error control. flag address control protocol Payload (variable) FCS flag protocol stack
Multiple access Data link layer consists of data link contol and multiple-access resolution. Lower sub layer is responsible for resolving access to the shared media. One of the methods is random access method. Here, no station is superior to another station and none is assigned the control over another. In controlled access method, the stations consult one another to find which station has the right to send. Channelization is a multiple access method in which the available bandwidth of a link is shared in time, frequency, or through code, between different stations. protocol stack
NETWORK LAYER This is the third layer from the bottom of protocol stack. There is a piece of network layer in each and every host and in the routers. It determines how packets are routed from one route to another. protocol stack
Network layer protocol stack
Important functions Main role of network layer is to move packets from a sending host to receiving host. Functions are categorized into three types Path determination: Determined by routing algorithms. Forwarding: Done by routers. Call set up: Routers establish connections with each other.  protocol stack
Network service model Defines characteristics of end to end transmission of data. Virtual circuit model Network determines the path between sender and receiver. Packets flow along the path set up. Routers are aware of the connection made. Connection oriented service.  Datagram model Networks sends packets with the address of destination. Packets flow towards nearest router along the destination. Routers are not aware of the connection made. They maintain a forwarding table. Connectionless service. protocol stack
Network layer protocols Internet protocol :  Responsible for network layer addressing. IP address: An address assigned to every interface. They are of two types: IPV4 and IPV6 protocol stack
IPV4 addressing 32 bit length(4 bytes) Represented in dotted decimal notation Eg: 193.32.216.9 Equivalent decimal notation  11000001 00100000 11011000 00001001 Two ways of assigning IP address: Manual configuration Dynamic host configuration protocol protocol stack
IPV4 data packet format protocol stack 32bits  version Header length Type of service Data packet  length 16-bit identifier Flags  13-bit fragmentation offset Time-to-live  Upper-layer protocol Header checksum 32-bit source IP address 32-bit destination IP address Options(if any) Data
ICMP – Internet Control Message Protocol Used by routers, hosts and gateways. Used for error reporting when IP router in not able to find the path to the host specified as the target. protocol stack
TRANSPORT LAYER
Network layer oversees source to destination delivery of  individual packets, it does not recognize any relationship between those packets. It treats each one independently, as though each piece belonged to a separate message, whether or not it does. Transport layer on the other hand ensures that the whole message arrives intact and in order overseeing both error control and flow control at the source to destination level . Process to Process delivery protocol stack
Service Point Addressing Several programs run at the same time. Data transfer needed only between two specific processes. Port numbers of the destination process is assigned in the header which ensures that only the specific process responds to it. Segmentation and Reassembling The message is divided into transmittable segments.  Each segment contains a sequence number . This enables the correct reassembling of the message at the destination end and also in retransmission. protocol stack
Connection Control Two types:  Connectionless   : Treats each segment as a independent packet and delivers it.  Connection Oriented: sets  up a connection with the transport layer at the destination machine before delivering the packets. Flow Control Oversees the proper co-ordination of transfer between the source and destination. protocol stack
Error Control Sending Transport Layer make sure that the entire message arrives at the receiving transport layer without error (damage, loss or duplication). Terminologies: Reliable : Flow and error control present at the transport layer resulting in slower and more complex service. Non-Reliable: Uses Own Flow and error control mechanism or it needs fast service or nature of the service does not demand flow and error control (Real Time Application) protocol stack
User Datagram Protocol (UDP) It’s a connectionless, unreliable transport protocol. No services added to IP except process to process communication using port numbers. Limited error checking. UDP Operations Connectionless Services: It is important to note that the process which uses UDP cannot send a stream of data to UDP and expect UDP to chop them into different related user datagrams. Instead each request must be small enough to fit into one user datagram. protocol stack
Flow and  Error Control No Flow Control :  Receiver may overflow with incoming messages. No Error Control: Sender does not know if the message is lost or duplicated. Checksum is one error control mechanism and if the receiver detects an error through the checksum, the user datagram is silently discarded. UDP Uses Process that require simple request response communication with little concern for flow and error control. Process with internal flow and error mechanism.  Ex: Trivial File Transfer Protocol (TFTP) can easily use UDP protocol stack
Transmission Control Protocol (TCP) 16/09/09 It’s a connection oriented, reliable transport protocol. TCP Services:  Process to process communication using port numbers. Stream Delivery Service: Data is sent as a stream of bytes and obtained also as a stream of bytes. An environment is created in which the two processes seem to be connected by an imaginary tube that carries their data across the internet. Sending And Receiving Buffers:  Sending or receiving processes may not read or write data at the same speed, hence buffers are needed for storage.
Segments The IP layer as a service provider for TCP cannot send data as a stream of bytes. Therefore  TCP groups a number of bytes together into a packet called segment.  TCP adds a header to each segment (for control purposes) and delivers the segment to the IP layer for transmission. Full Duplex Communication TCP offers full duplex service in which data can flow in both directions as each time. Reliable Service : TCP is reliable transfer protocol which uses an Acknowledgement mechanism to check the safe and sound arrival of data protocol stack
Comparison Between UDP and TCP protocol stack UDP TCP Packet Header Size 8 bytes 20 – 60 bytes Transport Layer Packet entity Datagram  Segment Port Numbering Yes Yes Error Detection Optional Yes Reliability: Error recovery by automatic repeat request (ARQ) No Yes Virtual circuits: Sequence numbering and reordering No Yes Flow control No Yes Congestion avoidance: Variable congestion window, slow start, time outs No Yes Multiple streams No No ECN support No Yes
THANK YOU protocol stack

More Related Content

PPTX
Security Threats at OSI layers
PPTX
Network protocols and vulnerabilities
PPTX
Network Protocol
PDF
SYSTEM NETWORK ADMINISTRATIONS GOALS and TIPS
PPTX
Cyber security tutorial2
PPT
Skr+3200+chapter+2+(kweh)
PPTX
Cyber security tutorial1
PDF
CISSP Week 6
Security Threats at OSI layers
Network protocols and vulnerabilities
Network Protocol
SYSTEM NETWORK ADMINISTRATIONS GOALS and TIPS
Cyber security tutorial2
Skr+3200+chapter+2+(kweh)
Cyber security tutorial1
CISSP Week 6

What's hot (17)

PPTX
SDN and Named Data Networking Security
PPTX
02 network models
PPTX
Internet protocol stack
PPTX
Basic Concepts of Computer Networking
PPTX
The OSI model
PPTX
lecture 2.pptx
PPT
presentation on TCP/IP protocols data comunications
PPTX
Orientation to Computer Networks
PPT
Data Link Layer
PPTX
Computer Network basic
PPTX
communication-protocols
PDF
CISSP Week 5
PDF
Analysis of network traffic by using packet sniffing tool wireshark
PPTX
Network Protocol Analysis
PPTX
Internet Protocols
PPT
NETWORK PROTOCOL
PDF
CS6601 DISTRIBUTED SYSTEMS
SDN and Named Data Networking Security
02 network models
Internet protocol stack
Basic Concepts of Computer Networking
The OSI model
lecture 2.pptx
presentation on TCP/IP protocols data comunications
Orientation to Computer Networks
Data Link Layer
Computer Network basic
communication-protocols
CISSP Week 5
Analysis of network traffic by using packet sniffing tool wireshark
Network Protocol Analysis
Internet Protocols
NETWORK PROTOCOL
CS6601 DISTRIBUTED SYSTEMS
Ad

Viewers also liked (11)

PPTX
CCCNA R&S-02-The TCP-IP and OSI Networking Models
PPT
Reti e internet
PDF
LTE Protocol Primer
PPT
Gsm presentation shaikot
PDF
Cdma2000
PDF
Wcdma Training
PDF
Architecture of the lte air interface
PPT
GSM ARCHITECTURE
PDF
LTE EPC Technology Essentials
PDF
Lte protocol-stack-mac-rlc-pdcp
CCCNA R&S-02-The TCP-IP and OSI Networking Models
Reti e internet
LTE Protocol Primer
Gsm presentation shaikot
Cdma2000
Wcdma Training
Architecture of the lte air interface
GSM ARCHITECTURE
LTE EPC Technology Essentials
Lte protocol-stack-mac-rlc-pdcp
Ad

Similar to group11_DNAA:protocol stack and addressing (20)

PPTX
OSI Model.It was created in 1983 by osi.
PPTX
Network fundamental
PPT
Unit 2.1 - OSI Model.ppt Physical Layer
PPT
PPTX
Chapter 1-2-Network Models_data_communication.pptx
PPTX
Pwani notes-Network Essentials.pp for Internet Protocoltx
PDF
DS Unit-4-Communication .pdf
PPTX
The Osi Model
PPT
Open Systems Interconnection (OSI) modelModel.ppt
PDF
Chap 1 introduction
PPT
18 internet protocols
PDF
Network Connectivity and Protocols and OSI Model
PPTX
Computer network coe351- part4- final
PDF
Tìm hiểu về internet và các giao thức phổ biến
PPTX
CN_ECE_6th SEM_OSI Layer.pptx
PDF
CS-324 Computer Networks.pdf
DOCX
OsiI model
PPT
02 protocols and tcp-ip
PDF
Computer Network Unit-1 ppt
OSI Model.It was created in 1983 by osi.
Network fundamental
Unit 2.1 - OSI Model.ppt Physical Layer
Chapter 1-2-Network Models_data_communication.pptx
Pwani notes-Network Essentials.pp for Internet Protocoltx
DS Unit-4-Communication .pdf
The Osi Model
Open Systems Interconnection (OSI) modelModel.ppt
Chap 1 introduction
18 internet protocols
Network Connectivity and Protocols and OSI Model
Computer network coe351- part4- final
Tìm hiểu về internet và các giao thức phổ biến
CN_ECE_6th SEM_OSI Layer.pptx
CS-324 Computer Networks.pdf
OsiI model
02 protocols and tcp-ip
Computer Network Unit-1 ppt

Recently uploaded (20)

PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PPTX
master seminar digital applications in india
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Cell Types and Its function , kingdom of life
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
master seminar digital applications in india
Microbial diseases, their pathogenesis and prophylaxis
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
VCE English Exam - Section C Student Revision Booklet
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Complications of Minimal Access Surgery at WLH
Cell Types and Its function , kingdom of life
2.FourierTransform-ShortQuestionswithAnswers.pdf
Week 4 Term 3 Study Techniques revisited.pptx
Final Presentation General Medicine 03-08-2024.pptx
FourierSeries-QuestionsWithAnswers(Part-A).pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Microbial disease of the cardiovascular and lymphatic systems
human mycosis Human fungal infections are called human mycosis..pptx
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Supply Chain Operations Speaking Notes -ICLT Program

group11_DNAA:protocol stack and addressing

  • 1. PROTOCOL STACK AND ADDRESSING BY DNAA GROUP 11 protocol stack
  • 2. TEAM MEMBERS D HANUSHA 1MS07IS025 N ISHITA.M 1MS07IS061 A RCHANA.H.V 1MS07IS012 A NANYA.B.NAIK 1MS07IS007 protocol stack
  • 3. TABLE OF CONTENTS INTRODUCTION OSI MODEL PHYSICAL LAYER DATA LINK LAYER NETWORK LAYER TRANSPORT LAYER protocol stack
  • 4. INTRODUCTION PROTOCOLS PROTOCOL STACK OSI MODEL protocol stack
  • 5. OSI MODEL APPLICATION LAYER PRESENTATION LAYER SESSIONS LAYER TRANSPORT LAYER NETWORK LAYER DATA LINK LAYER PHYSICAL LAYER protocol stack
  • 6. PHYSICAL LAYER It is the first and lowest layer of OSI model of computer networking. The physical layer consists of the basic hardware transmission technologies of a network Physical layer obtains the data obtained by data link layer in the form of frames which it will convert into bits Physical layer converts the data sent by data link layer into signals compatible with the transmission media protocol stack
  • 7. Techniques Data present in the physical layer can be analog or digital. It has to be converted either to digital signal or analog signal For the conversion of digital to digital signals three techniques are used: 1.Line coding 2.Block coding 3.scrambling protocol stack
  • 8. Techniques For the conversion of digital data to analog signals the techniques used are 1.Amplitude shift keying 2.Frequency shift keying 3.Phase shift keying 4.Quadrature amplitude modulation protocol stack
  • 9. Functions Of physical Layer Physical characteristics of interfaces and medium Representation of bits Line configuration Physical topology Transmission mode Autonegotiation protocol stack
  • 10. Protocols of Physical Layer X.21 EIA-232-E ATM protocol stack
  • 11. X.21 X.21 interface protocol is concerned only with the set-up and clearing operating between DTE and DCE associated with each call It is a circuit switching protocol using synchronous ASCII with odd parity to connect or disconnect a subscriber to bulic switching network Any data can be transferred through the network after call establishment is successful via x.21 protocol protocol stack
  • 12. EIA-232-E It is also called RS-232-C.it is found in both synchronous and asynchronous environment Almost all modems conform to the EIA-232 standard and most PC have an EIA-232 port for connecting a modem or other devices protocol stack
  • 13. ATM Asynchronous transfer mode is an electronic digital data transmission technology. It is mainly used to transfer real-time video conference and audio as well as image files, text and email ATM is a packet oriented transfer method that uses asynchronous time division multiplying techniques. It encodes the data into small sized cells and provides data link layer services that run over OSI layer. It is mainly designed for high speed(155 MBits) communication protocol stack
  • 14. DATA LINK LAYER The data link layer is the second layer in the OSI seven-layer reference model. It responds to service requests from the network layer above it and issues service requests to the physical layer below it. FUNCTIONS: 1)Framing 2)Addressing 3)Flow Control 4)Error Control 5)Media Access Control protocol stack
  • 15. Framing Framing in this layer separates a message from one source to a destination, or from other messages to other destinations, by adding a sender address and a destination address. TYPES: 1)Fixed-Size Framing 2)Variable-Size Framing Character-Oriented Protocols: flag trailer flag header Data from upper layer protocol stack
  • 16. Error detection Data can be corrupted during transmission. TYPES of errors: 1)Single-Bit Error 2)Burst Error To detect or correct errors, we need to send extra (redundant) bits with data. Error detection: 1) The receiver has a list if valid codewords. 2) The original codeword has changed to an invalid one. protocol stack
  • 17. Data word generator codeword Data word Checker Codeword SENDER RECEIVER Encoder Decoder Extract Discard Unreliable Transmission Data words Codewords Code fro error detection protocol stack 00 000 01 011 10 101 11 110
  • 18. Error correction More redundant bits are required for error correction than for error detection. Example: let the code word transferred be 01001. Humming distance: between two words is the number of differences between corresponding bits. Minimum humming distance is chosen. protocol stack Data word Code word 00 00000 01 01011 10 10101 11 11110
  • 19. Protocols Flow control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Error control in the data link layer is based on automatic repeat request, which is the retransmission of data. Protocols are implemented in software by using one of the common programming languages. Protocols Noiseless channels Noisy channel Stop and wait simplest Stop and wait ARQ Go back-N ARQ Selective repeat ARQ protocol stack
  • 20. Simplest protocol sender site algorithm While (true) { wait for event(); if(event ( request to send)) { get data(); make frame(); send frame(); } } protocol stack
  • 21. Receiver site algorithm While ( true ) { wait for event(); if( event ( arrival notification)) { receive frame(); extract data(); deliver data(); [send frame] // for stop and wait protocol } } protocol stack
  • 22. STOP AND WAIT PROTOCOL While(true) Can send= true { wait for event(); if( event(request to send)and can send) { get data(); make frame(); send frame(); can send= false; } Wait for event(); If ( event( arrival notification) { receive frame(); can send= true; } } protocol stack
  • 23. POINT TO POINT PROTOCOL provides network address configuration. That is when a home user needs a temporary network address to connect to the internet. Defines format of the frame. Provides multiple network layer . Does not provide flow control. No sophisticated addressing mechanism to handle frames. Simple mechanism for error control. flag address control protocol Payload (variable) FCS flag protocol stack
  • 24. Multiple access Data link layer consists of data link contol and multiple-access resolution. Lower sub layer is responsible for resolving access to the shared media. One of the methods is random access method. Here, no station is superior to another station and none is assigned the control over another. In controlled access method, the stations consult one another to find which station has the right to send. Channelization is a multiple access method in which the available bandwidth of a link is shared in time, frequency, or through code, between different stations. protocol stack
  • 25. NETWORK LAYER This is the third layer from the bottom of protocol stack. There is a piece of network layer in each and every host and in the routers. It determines how packets are routed from one route to another. protocol stack
  • 27. Important functions Main role of network layer is to move packets from a sending host to receiving host. Functions are categorized into three types Path determination: Determined by routing algorithms. Forwarding: Done by routers. Call set up: Routers establish connections with each other. protocol stack
  • 28. Network service model Defines characteristics of end to end transmission of data. Virtual circuit model Network determines the path between sender and receiver. Packets flow along the path set up. Routers are aware of the connection made. Connection oriented service. Datagram model Networks sends packets with the address of destination. Packets flow towards nearest router along the destination. Routers are not aware of the connection made. They maintain a forwarding table. Connectionless service. protocol stack
  • 29. Network layer protocols Internet protocol : Responsible for network layer addressing. IP address: An address assigned to every interface. They are of two types: IPV4 and IPV6 protocol stack
  • 30. IPV4 addressing 32 bit length(4 bytes) Represented in dotted decimal notation Eg: 193.32.216.9 Equivalent decimal notation 11000001 00100000 11011000 00001001 Two ways of assigning IP address: Manual configuration Dynamic host configuration protocol protocol stack
  • 31. IPV4 data packet format protocol stack 32bits version Header length Type of service Data packet length 16-bit identifier Flags 13-bit fragmentation offset Time-to-live Upper-layer protocol Header checksum 32-bit source IP address 32-bit destination IP address Options(if any) Data
  • 32. ICMP – Internet Control Message Protocol Used by routers, hosts and gateways. Used for error reporting when IP router in not able to find the path to the host specified as the target. protocol stack
  • 34. Network layer oversees source to destination delivery of individual packets, it does not recognize any relationship between those packets. It treats each one independently, as though each piece belonged to a separate message, whether or not it does. Transport layer on the other hand ensures that the whole message arrives intact and in order overseeing both error control and flow control at the source to destination level . Process to Process delivery protocol stack
  • 35. Service Point Addressing Several programs run at the same time. Data transfer needed only between two specific processes. Port numbers of the destination process is assigned in the header which ensures that only the specific process responds to it. Segmentation and Reassembling The message is divided into transmittable segments. Each segment contains a sequence number . This enables the correct reassembling of the message at the destination end and also in retransmission. protocol stack
  • 36. Connection Control Two types: Connectionless : Treats each segment as a independent packet and delivers it. Connection Oriented: sets up a connection with the transport layer at the destination machine before delivering the packets. Flow Control Oversees the proper co-ordination of transfer between the source and destination. protocol stack
  • 37. Error Control Sending Transport Layer make sure that the entire message arrives at the receiving transport layer without error (damage, loss or duplication). Terminologies: Reliable : Flow and error control present at the transport layer resulting in slower and more complex service. Non-Reliable: Uses Own Flow and error control mechanism or it needs fast service or nature of the service does not demand flow and error control (Real Time Application) protocol stack
  • 38. User Datagram Protocol (UDP) It’s a connectionless, unreliable transport protocol. No services added to IP except process to process communication using port numbers. Limited error checking. UDP Operations Connectionless Services: It is important to note that the process which uses UDP cannot send a stream of data to UDP and expect UDP to chop them into different related user datagrams. Instead each request must be small enough to fit into one user datagram. protocol stack
  • 39. Flow and Error Control No Flow Control : Receiver may overflow with incoming messages. No Error Control: Sender does not know if the message is lost or duplicated. Checksum is one error control mechanism and if the receiver detects an error through the checksum, the user datagram is silently discarded. UDP Uses Process that require simple request response communication with little concern for flow and error control. Process with internal flow and error mechanism. Ex: Trivial File Transfer Protocol (TFTP) can easily use UDP protocol stack
  • 40. Transmission Control Protocol (TCP) 16/09/09 It’s a connection oriented, reliable transport protocol. TCP Services: Process to process communication using port numbers. Stream Delivery Service: Data is sent as a stream of bytes and obtained also as a stream of bytes. An environment is created in which the two processes seem to be connected by an imaginary tube that carries their data across the internet. Sending And Receiving Buffers: Sending or receiving processes may not read or write data at the same speed, hence buffers are needed for storage.
  • 41. Segments The IP layer as a service provider for TCP cannot send data as a stream of bytes. Therefore TCP groups a number of bytes together into a packet called segment. TCP adds a header to each segment (for control purposes) and delivers the segment to the IP layer for transmission. Full Duplex Communication TCP offers full duplex service in which data can flow in both directions as each time. Reliable Service : TCP is reliable transfer protocol which uses an Acknowledgement mechanism to check the safe and sound arrival of data protocol stack
  • 42. Comparison Between UDP and TCP protocol stack UDP TCP Packet Header Size 8 bytes 20 – 60 bytes Transport Layer Packet entity Datagram Segment Port Numbering Yes Yes Error Detection Optional Yes Reliability: Error recovery by automatic repeat request (ARQ) No Yes Virtual circuits: Sequence numbering and reordering No Yes Flow control No Yes Congestion avoidance: Variable congestion window, slow start, time outs No Yes Multiple streams No No ECN support No Yes