0% found this document useful (0 votes)
7 views

Notes for CN for UG students

The document provides an overview of the transport layer protocols, including TCP and UDP, highlighting their differences in reliability, connection orientation, and use cases. It also discusses standard client-server protocols like HTTP and FTP, explaining how they facilitate web communication and file transfers. Additionally, it covers email transmission through SMTP, the role of DNS in translating domain names to IP addresses, and the significance of domain names for website identification.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Notes for CN for UG students

The document provides an overview of the transport layer protocols, including TCP and UDP, highlighting their differences in reliability, connection orientation, and use cases. It also discusses standard client-server protocols like HTTP and FTP, explaining how they facilitate web communication and file transfers. Additionally, it covers email transmission through SMTP, the role of DNS in translating domain names to IP addresses, and the significance of domain names for website identification.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 40

UNIT - 5

CHAPTER - 1

INTRODUCTION TO THE TRANSPORT LAYER


TRANSPORT LAYER PROTOCOL
SIMPLE PROTOCOL
STOP AND WAIT PROTOCOL
GO BACK N PROTOCOL
SLIDING WINDOW
SELECTIVE REPEAT PRTOCOL
BIDIRECTIONAL PROTOCOL (PIGGYBACKING)
Bidirectional protocols (piggybacking)
• A technique called piggybacking is used to
improve the efficiency of bidirectional
protocols.
• When packet is carrying data from A to B, It
can also carry acknowledgment feedback
about arrived packets from B.
• When B to A, it can also carry ack feedback
about arrived packets from A
UDP
• User Datagram Protocol (UDP) – a
communications protocol that facilitates the exchange of
messages between computing devices in a network.
• It’s an alternative to the transmission control protocol (TCP).
• In a network that uses the Internet Protocol (IP), it is
sometimes referred to as UDP/IP.
• UDP divides messages into packets, called datagrams, which
can then be forwarded by the devices in the network
– switches, routers, security gateways – to the
destination application/server.
• While UDP does not number or reassemble the datagrams,
it does include port numbers in the datagram header that
help distinguish different user requests and an optional
checksum capability that can help verify the integrity of the
data transferred.
What is TCP?

• TCP is a connection-oriented protocol, reliable.


• TCP uses combination of GBN and SR protocol to provide
reliability.
• TCP stands for Transmission Control Protocol a
communications standard that enables application
programs and computing devices to exchange messages
over a network.
• It is designed to send packets across the internet and
ensure the successful delivery of data and messages over
networks.
• TCP uses checksum.
• TCP is the most common transport layer protocol in the
internet.
Transmission control protocol (TCP) User datagram protocol (UDP)

TCP is a connection-oriented UDP is the Datagram oriented


protocol. Connection-orientation protocol. This is because there is no
means that the communicating overhead for opening a connection,
devices should establish a connection maintaining a connection, and
before transmitting data and should terminating a connection. UDP is
close the connection after efficient for broadcast and multicast
transmitting the data. type of network transmission.

TCP is reliable as it guarantees the The delivery of data to the


delivery of data to the destination destination cannot be guaranteed in
router. UDP.

TCP provides extensive error checking


mechanisms. It is because it provides UDP has only the basic error checking
flow control and acknowledgement of mechanism using checksums.
data.
Sequencing of data is a feature
There is no sequencing of data
of Transmission Control
in UDP. If the order is required,
Protocol (TCP). this means that
it has to be managed by the
packets arrive in-order at the
application layer.
receiver.

TCP is comparatively slower UDP is faster, simpler, and


than UDP. more efficient than TCP.

Retransmission of lost packets There is no retransmission of


is possible in TCP, but not in lost packets in the User
UDP. Datagram Protocol (UDP).

TCP has a (20-60) bytes UDP has an 8 bytes


variable length header. fixed-length header.
TCP is heavy-weight. UDP is lightweight.

TCP doesn’t support


UDP supports Broadcasting.
Broadcasting.

TCP is used by HTTP, HTTPs, UDP is used by DNS, DHCP,


FTP, SMTP and Telnet. TFTP, SNMP, RIP, and VoIP.
CHAPTER – 2

STANDARD CLIENT SERVER PROTOCOLS



How the World Wide Web Works?
• Now, we have understood that WWW is a
collection of websites connected to the
internet so that people can search and share
information.
• Now, let us understand how it works!
• The Web works as per the internet's basic
client-server format as shown in the following
image.
• The servers store and transfer web pages or
information to user's computers on the network
when requested by the users.
• A web server is a software program which serves
the web pages requested by web users using a
browser.
• A WEB PAGE CAN BE SIMPLE AND COMPOSITE
• The computer of a user who requests documents
from a server is known as a client.
• Browser, which is installed on the user' computer,
allows users to view the retrieved documents.
• All the websites are stored in web servers.
• Just as someone lives on rent in a house, a website
occupies a space in a server and remains stored in it.
• The server hosts the website whenever a user
requests its WebPages, and the website owner has to
pay the hosting price for the same.
• The moment you open the browser and type a URL
in the address bar or search something on Google,
the WWW starts working.
• are three main technologies involved in transferring
information (web pages) from servers to clients
(computers of users).
• technologies include Hypertext Markup Language
(HTML), Hypertext Transfer Protocol (HTTP) and Web
browsers.
WEB DOCCUMENTS
• STATIC DOCCUMENT : STATIC DOCUMENTS
PREPARED BY SEVERAL LANGAUGES (HTML,
XSL, XML, XHTML)
• DYNAMIC DOCCUMENTS : SCRIPTING
TECHNOLOGIES USE TO CREATE DYNAMIC
DOCUMENTS ARE JSP, PHP, ASP.
• ACTIVE DOCUMENT : JAVA APPLET,
JAVASCRIPT.
Hypertext Transfer Protocol (HTTP):
• Hyper Text Transfer Protocol (HTTP) is an application
layer protocol which enables WWW to work smoothly
and effectively.
• It is based on a client-server model.
• The client is a web browser which communicates with
the web server which hosts the website.
• This protocol defines how messages are formatted and
transmitted and what actions the Web Server and
browser should take in response to different
commands.
• you enter a URL in the browser, an HTTP command is
sent to the Web server, and it transmits the requested
Web Page.
• When we open a website using a browser, a
connection to the web server is opened, and
the browser communicates with the server
through HTTP and sends a request.
• HTTP is carried over TCP/IP to communicate
with the server.
• The server processes the browser's request
and sends a response, and then the connection
is closed.
• Thus, the browser retrieves content from the
server for the user.
What Is File Transfer Protocol (FTP)?
• The term file transfer protocol (FTP) refers to a
process that involves the transfer of files between
computers over a network.
• FTP uses 2 well known ports : port 20 – data
connection, port 21 – control connection.
• The process works when one party allows another
to send or receive files over the internet.
• Originally used as a way for users to communicated
and exchange information between two physical
computers, it is commonly used to store files in
the cloud, which is usually a secure location that is
held remotely.
File types
• ASCII file : this is the default format for transferring
text file. Each character is encoded using NVT
ASCII.
• The senders transform the file from its own
representation into NVT ASCII characters and
receiver transforms the NVT ASCII characters
to its own representation.
• EBCDIC FILE : (Extended binary coded Decimal
Interchange code)
• IMAGE FILE : Nonprint ( this format used for files
that will be stored and processed later. TELNET
(the file is printable after transfer).
FTP CAN USE FOLLOWING DATA
STRUCTURE :
• FILE STRUCTURE (DEFAULT) : THE file has no
structure. It is continuous data stream.
• RECORD STRUCTURE : The file is divided into
record. This can be used only with text file.
• PAGE STRUCTURE : the file is divided into
pages, with having a page no. And page
header.
TRANSMISSION MODE IN FTP
• STREAM MODE
• BLOCK MODE
• COMPRESSED MODE
ELECTRONIC MAIL
• E-mail is defined as the transmission of messages on
the Internet. It is one of the most commonly used
features over communications networks that may
contain text, files, images, or other attachments.
• Generally, it is information that is stored on a computer
sent through a network to a specified individual or
group of individuals.
• Email messages are conveyed through email servers; it
uses multiple protocols within the TCP/IP suite.
• For example, SMTP is a protocol, stands for simple mail
transfer protocol and used to send messages whereas
other protocols IMAP or POP are used to retrieve
messages from a mail server.
• If you want to login to your mail account, you just need
to enter a valid email address, password, and the mail
servers used to send and receive messages.
• Although most of the webmail servers automatically
configure your mail account, therefore, you only required to
enter your email address and password.
• However, you may need to manually configure each account
if you use an email client like Microsoft Outlook or Apple
Mail.
• In addition, to enter the email address and password, you
may also need to enter incoming and outgoing mail servers
and the correct port numbers for each one.
• Email messages include three components, which are as
follows:
• Message envelope: It depicts the email's electronic format.
• Message header: It contains email subject line and
sender/recipient information.
• Message body: It comprises images, text, and other file
attachments.
SMTP( port no. 25)
• SMTP stands for Simple Mail Transfer Protocol.
• SMTP is a set of communication guidelines that allow
software to transmit an electronic mail over the internet
is called Simple Mail Transfer Protocol.
• It is a program used for sending messages to other
computer users based on e-mail addresses.
• It provides a mail exchange between users on the same
or different computers, and it also supports:
– It can send a single message to one or more recipients.
– Sending message can include text, voice, video or graphics.
– It can also send the messages on networks outside the
internet.
• The main purpose of SMTP is used to set up
communication rules between servers.
• The servers have a way of identifying
themselves and announcing what kind of
communication they are trying to perform.
• They also have a way of handling the errors
such as incorrect email address.
• For example, if the recipient address is wrong,
then receiving server reply with an error
message of some kind.
SSH
• SSH has mainly four components, SSH
Transport Layer Protocol (SSH-TRANS), SSH
Authentication Protocol (SSH-AUTH), SSH
Connection Protocol (SSH-CONN) and SSH
Applications, as shown in below image.
• These SSH components are supposed to run at
the Application layer of TCP/IP protocol suite.
• SSH Transport Protocol (SSH-TRANS)
• SSH Transport Protocol (SSH-TRANS) is the
component of SSH which allows to establish a
secure connection between SSH client and SSH
server over TCP.
• SSH Transport Protocol (SSH-TRANS) negotiates
different security parameters between the client
and the server, for example, encryption
algorithm, HMAC algorithm etc, to create the
secure tunnel between SSH client and SSH server.
• SSH Connection Protocol (SSH-CONN)
• SSH Connection Protocol (SSH-CONN) is the
component of SSH, which allows to run multiple
channels over the secure connection established.
• SSH Authentication Protocol (SSH-AUTH)
• SSH Authentication Protocol (SSH-AUTH) is the
component of SSH which allows to
authenticate the SSH client for the server.
• SSH Applications
• Once the secure connection is established
between SSH client and SSH Server, SSH allows
different application programs to use the
established secure connection.
• Remote console login, SFTP (Secure File
Transfer Protocol) etc., are the examples of
different applications.
What is DNS?
• The Domain Name System (DNS) is the phonebook of
the Internet.
• Humans access information online through domain
names, like nytimes.com or espn.com.
• Web browsers interact through Internet Protocol (IP)
addresses.
• DNS translates domain names to IP addresses so
browsers can load Internet resources.
• Each device connected to the Internet has a unique IP
address which other machines use to find the device.
• DNS servers eliminate the need for humans to
memorize IP addresses such as 192.168.1.1 (in IPv4), or
more complex newer alphanumeric IP addresses such
as 2400:cb00:2048:1::c629:d7a2 (in IPv6).
Name Space
1. Flat Name Space
2. Hierarchical Name Space
3. Domain Name Space
FQDN(Fully Qualified Domain)=
challenger.atc.fhda.edu.
PQDN(Partially Qualified Domain Name)
What is a domain name?
• A domain name is your website name.
• A domain name is the address where Internet users can access your
website.
• A domain name is used for finding and identifying computers on the
Internet.
• Computers use IP addresses, which are a series of number. However, it is
difficult for humans to remember strings of numbers.
• Because of this, domain names were developed and used to identify
entities on the Internet rather than using IP addresses.
• A domain name can be any combination of letters and numbers, and it
can be used in combination of the various domain name extensions,
such as .com, .net and more.
The domain name must be registered before you can use it.
• Every domain name is unique.
• No two websites can have the same domain name. If someone types
in www.yourdomain.com, it will go to your website and no one else's.

You might also like