The document provides an overview of the transport layer protocols, including TCP and UDP, highlighting their differences in reliability, connection orientation, and use cases. It also discusses standard client-server protocols like HTTP and FTP, explaining how they facilitate web communication and file transfers. Additionally, it covers email transmission through SMTP, the role of DNS in translating domain names to IP addresses, and the significance of domain names for website identification.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
7 views
Notes for CN for UG students
The document provides an overview of the transport layer protocols, including TCP and UDP, highlighting their differences in reliability, connection orientation, and use cases. It also discusses standard client-server protocols like HTTP and FTP, explaining how they facilitate web communication and file transfers. Additionally, it covers email transmission through SMTP, the role of DNS in translating domain names to IP addresses, and the significance of domain names for website identification.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 40
UNIT - 5
CHAPTER - 1
INTRODUCTION TO THE TRANSPORT LAYER
TRANSPORT LAYER PROTOCOL SIMPLE PROTOCOL STOP AND WAIT PROTOCOL GO BACK N PROTOCOL SLIDING WINDOW SELECTIVE REPEAT PRTOCOL BIDIRECTIONAL PROTOCOL (PIGGYBACKING) Bidirectional protocols (piggybacking) • A technique called piggybacking is used to improve the efficiency of bidirectional protocols. • When packet is carrying data from A to B, It can also carry acknowledgment feedback about arrived packets from B. • When B to A, it can also carry ack feedback about arrived packets from A UDP • User Datagram Protocol (UDP) – a communications protocol that facilitates the exchange of messages between computing devices in a network. • It’s an alternative to the transmission control protocol (TCP). • In a network that uses the Internet Protocol (IP), it is sometimes referred to as UDP/IP. • UDP divides messages into packets, called datagrams, which can then be forwarded by the devices in the network – switches, routers, security gateways – to the destination application/server. • While UDP does not number or reassemble the datagrams, it does include port numbers in the datagram header that help distinguish different user requests and an optional checksum capability that can help verify the integrity of the data transferred. What is TCP?
• TCP is a connection-oriented protocol, reliable.
• TCP uses combination of GBN and SR protocol to provide reliability. • TCP stands for Transmission Control Protocol a communications standard that enables application programs and computing devices to exchange messages over a network. • It is designed to send packets across the internet and ensure the successful delivery of data and messages over networks. • TCP uses checksum. • TCP is the most common transport layer protocol in the internet. Transmission control protocol (TCP) User datagram protocol (UDP)
TCP is a connection-oriented UDP is the Datagram oriented
protocol. Connection-orientation protocol. This is because there is no means that the communicating overhead for opening a connection, devices should establish a connection maintaining a connection, and before transmitting data and should terminating a connection. UDP is close the connection after efficient for broadcast and multicast transmitting the data. type of network transmission.
TCP is reliable as it guarantees the The delivery of data to the
delivery of data to the destination destination cannot be guaranteed in router. UDP.
TCP provides extensive error checking
mechanisms. It is because it provides UDP has only the basic error checking flow control and acknowledgement of mechanism using checksums. data. Sequencing of data is a feature There is no sequencing of data of Transmission Control in UDP. If the order is required, Protocol (TCP). this means that it has to be managed by the packets arrive in-order at the application layer. receiver.
TCP is comparatively slower UDP is faster, simpler, and
than UDP. more efficient than TCP.
Retransmission of lost packets There is no retransmission of
is possible in TCP, but not in lost packets in the User UDP. Datagram Protocol (UDP).
TCP has a (20-60) bytes UDP has an 8 bytes
variable length header. fixed-length header. TCP is heavy-weight. UDP is lightweight.
TCP doesn’t support
UDP supports Broadcasting. Broadcasting.
TCP is used by HTTP, HTTPs, UDP is used by DNS, DHCP,
FTP, SMTP and Telnet. TFTP, SNMP, RIP, and VoIP. CHAPTER – 2
STANDARD CLIENT SERVER PROTOCOLS
• How the World Wide Web Works? • Now, we have understood that WWW is a collection of websites connected to the internet so that people can search and share information. • Now, let us understand how it works! • The Web works as per the internet's basic client-server format as shown in the following image. • The servers store and transfer web pages or information to user's computers on the network when requested by the users. • A web server is a software program which serves the web pages requested by web users using a browser. • A WEB PAGE CAN BE SIMPLE AND COMPOSITE • The computer of a user who requests documents from a server is known as a client. • Browser, which is installed on the user' computer, allows users to view the retrieved documents. • All the websites are stored in web servers. • Just as someone lives on rent in a house, a website occupies a space in a server and remains stored in it. • The server hosts the website whenever a user requests its WebPages, and the website owner has to pay the hosting price for the same. • The moment you open the browser and type a URL in the address bar or search something on Google, the WWW starts working. • are three main technologies involved in transferring information (web pages) from servers to clients (computers of users). • technologies include Hypertext Markup Language (HTML), Hypertext Transfer Protocol (HTTP) and Web browsers. WEB DOCCUMENTS • STATIC DOCCUMENT : STATIC DOCUMENTS PREPARED BY SEVERAL LANGAUGES (HTML, XSL, XML, XHTML) • DYNAMIC DOCCUMENTS : SCRIPTING TECHNOLOGIES USE TO CREATE DYNAMIC DOCUMENTS ARE JSP, PHP, ASP. • ACTIVE DOCUMENT : JAVA APPLET, JAVASCRIPT. Hypertext Transfer Protocol (HTTP): • Hyper Text Transfer Protocol (HTTP) is an application layer protocol which enables WWW to work smoothly and effectively. • It is based on a client-server model. • The client is a web browser which communicates with the web server which hosts the website. • This protocol defines how messages are formatted and transmitted and what actions the Web Server and browser should take in response to different commands. • you enter a URL in the browser, an HTTP command is sent to the Web server, and it transmits the requested Web Page. • When we open a website using a browser, a connection to the web server is opened, and the browser communicates with the server through HTTP and sends a request. • HTTP is carried over TCP/IP to communicate with the server. • The server processes the browser's request and sends a response, and then the connection is closed. • Thus, the browser retrieves content from the server for the user. What Is File Transfer Protocol (FTP)? • The term file transfer protocol (FTP) refers to a process that involves the transfer of files between computers over a network. • FTP uses 2 well known ports : port 20 – data connection, port 21 – control connection. • The process works when one party allows another to send or receive files over the internet. • Originally used as a way for users to communicated and exchange information between two physical computers, it is commonly used to store files in the cloud, which is usually a secure location that is held remotely. File types • ASCII file : this is the default format for transferring text file. Each character is encoded using NVT ASCII. • The senders transform the file from its own representation into NVT ASCII characters and receiver transforms the NVT ASCII characters to its own representation. • EBCDIC FILE : (Extended binary coded Decimal Interchange code) • IMAGE FILE : Nonprint ( this format used for files that will be stored and processed later. TELNET (the file is printable after transfer). FTP CAN USE FOLLOWING DATA STRUCTURE : • FILE STRUCTURE (DEFAULT) : THE file has no structure. It is continuous data stream. • RECORD STRUCTURE : The file is divided into record. This can be used only with text file. • PAGE STRUCTURE : the file is divided into pages, with having a page no. And page header. TRANSMISSION MODE IN FTP • STREAM MODE • BLOCK MODE • COMPRESSED MODE ELECTRONIC MAIL • E-mail is defined as the transmission of messages on the Internet. It is one of the most commonly used features over communications networks that may contain text, files, images, or other attachments. • Generally, it is information that is stored on a computer sent through a network to a specified individual or group of individuals. • Email messages are conveyed through email servers; it uses multiple protocols within the TCP/IP suite. • For example, SMTP is a protocol, stands for simple mail transfer protocol and used to send messages whereas other protocols IMAP or POP are used to retrieve messages from a mail server. • If you want to login to your mail account, you just need to enter a valid email address, password, and the mail servers used to send and receive messages. • Although most of the webmail servers automatically configure your mail account, therefore, you only required to enter your email address and password. • However, you may need to manually configure each account if you use an email client like Microsoft Outlook or Apple Mail. • In addition, to enter the email address and password, you may also need to enter incoming and outgoing mail servers and the correct port numbers for each one. • Email messages include three components, which are as follows: • Message envelope: It depicts the email's electronic format. • Message header: It contains email subject line and sender/recipient information. • Message body: It comprises images, text, and other file attachments. SMTP( port no. 25) • SMTP stands for Simple Mail Transfer Protocol. • SMTP is a set of communication guidelines that allow software to transmit an electronic mail over the internet is called Simple Mail Transfer Protocol. • It is a program used for sending messages to other computer users based on e-mail addresses. • It provides a mail exchange between users on the same or different computers, and it also supports: – It can send a single message to one or more recipients. – Sending message can include text, voice, video or graphics. – It can also send the messages on networks outside the internet. • The main purpose of SMTP is used to set up communication rules between servers. • The servers have a way of identifying themselves and announcing what kind of communication they are trying to perform. • They also have a way of handling the errors such as incorrect email address. • For example, if the recipient address is wrong, then receiving server reply with an error message of some kind. SSH • SSH has mainly four components, SSH Transport Layer Protocol (SSH-TRANS), SSH Authentication Protocol (SSH-AUTH), SSH Connection Protocol (SSH-CONN) and SSH Applications, as shown in below image. • These SSH components are supposed to run at the Application layer of TCP/IP protocol suite. • SSH Transport Protocol (SSH-TRANS) • SSH Transport Protocol (SSH-TRANS) is the component of SSH which allows to establish a secure connection between SSH client and SSH server over TCP. • SSH Transport Protocol (SSH-TRANS) negotiates different security parameters between the client and the server, for example, encryption algorithm, HMAC algorithm etc, to create the secure tunnel between SSH client and SSH server. • SSH Connection Protocol (SSH-CONN) • SSH Connection Protocol (SSH-CONN) is the component of SSH, which allows to run multiple channels over the secure connection established. • SSH Authentication Protocol (SSH-AUTH) • SSH Authentication Protocol (SSH-AUTH) is the component of SSH which allows to authenticate the SSH client for the server. • SSH Applications • Once the secure connection is established between SSH client and SSH Server, SSH allows different application programs to use the established secure connection. • Remote console login, SFTP (Secure File Transfer Protocol) etc., are the examples of different applications. What is DNS? • The Domain Name System (DNS) is the phonebook of the Internet. • Humans access information online through domain names, like nytimes.com or espn.com. • Web browsers interact through Internet Protocol (IP) addresses. • DNS translates domain names to IP addresses so browsers can load Internet resources. • Each device connected to the Internet has a unique IP address which other machines use to find the device. • DNS servers eliminate the need for humans to memorize IP addresses such as 192.168.1.1 (in IPv4), or more complex newer alphanumeric IP addresses such as 2400:cb00:2048:1::c629:d7a2 (in IPv6). Name Space 1. Flat Name Space 2. Hierarchical Name Space 3. Domain Name Space FQDN(Fully Qualified Domain)= challenger.atc.fhda.edu. PQDN(Partially Qualified Domain Name) What is a domain name? • A domain name is your website name. • A domain name is the address where Internet users can access your website. • A domain name is used for finding and identifying computers on the Internet. • Computers use IP addresses, which are a series of number. However, it is difficult for humans to remember strings of numbers. • Because of this, domain names were developed and used to identify entities on the Internet rather than using IP addresses. • A domain name can be any combination of letters and numbers, and it can be used in combination of the various domain name extensions, such as .com, .net and more. The domain name must be registered before you can use it. • Every domain name is unique. • No two websites can have the same domain name. If someone types in www.yourdomain.com, it will go to your website and no one else's.