Transmission Control Protocol/Internet Protocol (TCP/IP)
Transmission Control Protocol/Internet Protocol (TCP/IP)
PROTOCOL/INTERNET PROTOCOL
(TCP/IP)
CONTENTS
1. Introduction
2. Layered Protocols
3. Data Packages
8. TCP/IP applications
MPLS -VPN NW Components & Services / IP Addressing
BRBRAITT 2
MPLS -VPN NW Components & Services / IP Addressing
The TCP/IP protocol suite is the engine for the Internet and networks worldwide. Its
simplicity and power has lead to its becoming the single network protocol of choice in
the world today.
The TCP/IP protocol suite is so named for two of its most important protocols:
Transmission Control Protocol (TCP) and
Internet Protocol (IP).
IP - is responsible for:
Moving packet of data from node to node. IP forwards each packet based
on a four-byte destination address (the IP number).
BRBRAITT 3
MPLS -VPN NW Components & Services / IP Addressing
FIG 2
3.0 Data Packages
The important thing to remember about the TCP/IP protocol stack is that each layer
plays a role in the overall communication process. Each layer invokes services that
are necessary for that layer to perform its role. As an outgoing transmission passes
down through the stack, each layer includes a bundle of relevant information called a
header along with the actual data. The little data package containing the header and
the data then becomes the data that is repackaged at the next lower level with the next
lower layer's header.
The data package created at the Application layer is called a message.
The data package created at the Transport layer, which encapsulates the
Application layer message, is called a segment if it comes from the Transport
BRBRAITT 4
MPLS -VPN NW Components & Services / IP Addressing
layer's TCP protocol. If the data package comes from the Transport layer's
UDP protocol, it is called a datagram.
The data package at the Internet layer, which encapsulates the Transport layer
segment, is called a datagram.
The data package at the Network Access layer, which encapsulates and may
subdivide the datagram, is called a frame. This frame is then turned into a bit-
stream at the lowest sublayer of the Network Access layer.
FIG .3: Each Layer is adding the Header to the actual data
4.0 Application layer
The application layer is provided by the program that uses TCP/IP for
communication. An application is a user process cooperating with another process
usually on a different host.
Examples of applications include Telnet, File Transfer Protocol (FTP), Network File
System (NFS), and Domain Name Service (DNS).
5.0 Transport layer
The Transport layer serves as an interface between network applications and the
network and provides a method for addressing network data to particular applications.
In the TCP/IP system, applications can address data through either the TCP or UDP
protocol module using port numbers.
The interface between the Application and Transport layers is defined by port
numbers and Sockets. Each process that wants to communicate with another process
identifies itself to the TCP/IP protocol suite by one or more ports.
A port is a 16-bit number, used by the host-to-host protocol to identify to which
higher-level protocol or application program (process) it must deliver incoming
messages.
BRBRAITT 5
MPLS -VPN NW Components & Services / IP Addressing
Application Layer
Transport Layer
Inter Network
Multiplexing Layer Demultiplexing
Fig 4
The transport layer provides the end-to-end data transfer by delivering data from an
application to its remote peer. Multiple applications can be supported simultaneously.
BRBRAITT 6
MPLS -VPN NW Components & Services / IP Addressing
BRBRAITT 7
MPLS -VPN NW Components & Services / IP Addressing
Unreliable
Best-effort service
As a result, applications using UDP as the transport protocol have to provide their
own end-to-end integrity, flow control, and congestion control, if it is so desired.
Usually, UDP is used by applications that need a fast transport mechanism and can
tolerate the loss of some data.
6.0 Network layer
The internetwork layer, also called the internet layer or the network layer, provides
the "virtual network" image of an internet (this layer shields the higher levels from the
physical network architecture below it).
Internet Protocol (IP) is the most important protocol in this layer. It is a
connectionless protocol that doesn't assume reliability from lower layers. IP protocol
hides the underlying physical network by creating a virtual network view.
It is an unreliable, best-effort, and connectionless packet delivery protocol. Best-effort
means that the packets sent by IP may be lost, arrive out of order, or even be
duplicated. IP assumes higher layer protocols will address these anomalies. (IP does
not provide reliability, flow control, or error recovery. These functions must be
provided at a higher level.)
IP provides a routing function that attempts to deliver transmitted messages to their
destination.
A message unit in an IP network is called an IP datagram. This is the basic unit of
information transmitted across TCP/IP networks.
Important and common protocols associated with the TCP/IP internetwork layer are:
Internet Protocol (IP)
Internet Control Message Protocol (ICMP)
Address Resolution Protocol (ARP)
Reverse Address Resolution Protocol (RARP)
Bootstrap Protocol (BOOTP)
Dynamic Host Configuration Protocol (DHCP)
These protocols perform datagram addressing, routing and delivery, dynamic address
configuration, and resolve between the internetwork layer addresses and the network
interface layer addresses.
6.1 Internet Control Message Protocol (ICMP)
When a router or a destination host must inform the source host about errors in
datagram processing, it uses the Internet Control Message Protocol (ICMP).
6.2 Internet Group Management Protocol (IGMP)
Similar to ICMP, the Internet Group Management Protocol (IGMP) is also an integral
part of IP. It allows hosts to participate in IP multicasts. IGMP further provides
routers with the capability to check if any hosts on a local subnet are interested in a
particular multicast.
BRBRAITT 8
MPLS -VPN NW Components & Services / IP Addressing
BRBRAITT 9
MPLS -VPN NW Components & Services / IP Addressing
Examples are IEEE 802.2, X.25 (which is reliable in itself), ATM, FDDI, and even
SNA.
8.0 TCP/IP Applications
The highest-level protocols within the TCP/IP protocol stack are application
protocols. They communicate with applications on other internet hosts and are the
user-visible interface to the TCP/IP protocol suite.
All application protocols have some characteristics in common: They can be user-
written applications or applications standardized and shipped with the TCP/IP
product. Indeed, the TCP/IP protocol suite includes application protocols such as:
Telnet for interactive terminal access to remote internet hosts.
FTP (file transfer protocol) for high-speed disk-to-disk file transfers.
SMTP (simple mail transfer protocol) as an internet mailing system.
Above protocols are some of the most widely implemented application protocols, but
many others also exist. Each particular TCP/IP implementation will include a lesser or
greater set of application protocols. They use either UDP or TCP as a transport
mechanism. Remember that UDP is unreliable and offers no flow-control, so in this
case, the application has to provide its own error recovery, flow control, and
congestion control functionality.
It is often easier to build applications on top of TCP because it is a reliable stream,
connection-oriented, congestion-friendly, flow control enabled protocol. As a result,
most application protocols will use TCP, but there are applications built on UDP to
achieve better performance through reduced protocol overhead.
BRBRAITT 10