TCP/UDP Protocol Suite - Lecture #2

Summary

This document is Lecture #2 on the TCP/UDP protocol suite. It covers the TCP/IP model including application, transport, and internet layers. The lecture also discusses how the TCP/IP protocol works and its uses in internet banking and video streaming.

Full Transcript

TCP/UDP Protocol Suite Lecture #2 TCP/IP The TCP/IP protocol suite is a set of networking protocols that facilitates data transmission between computers, with Transmission Control Protocol (TCP) and Internet Protocol (IP) being its foundational elements. TCP/IP specifies how data...

TCP/UDP Protocol Suite Lecture #2 TCP/IP The TCP/IP protocol suite is a set of networking protocols that facilitates data transmission between computers, with Transmission Control Protocol (TCP) and Internet Protocol (IP) being its foundational elements. TCP/IP specifies how data should be packetized, addressed, transmitted, routed, and received on a network by providing end-to-end communication The TCP/IP suite is named after its core protocols, TCP and IP, which work together to enable communication across networks. TCP/IP model Defines a model that classifies four layers of data transmission categories. Application layer Transport layer Internet layer Data link layer. Covering the entire journey of a packet, from the time you requested this page in your browser to the delivery of the response by the web server and rendering of the contents of this page. How Does the TCP/IP Protocol Work? Whenever we send things like a simple text message, a file, or a video message over the internet, the TCP/IP model divides the data into packets, according to four-layered architecture. The data goes in order from the sender’s side, and on the receiver’s side, it follows the reverse order and is finally reassembled. TCP/IP is based on the client-server communication model, which means that a user of a first computer (the client) sends a service request to a second network computer or web hosting provider(server). In TCP/IP model, each client request is unique and unrelated to previous ones Cont. 1. Application Layer This layer performs the functions of the top three layers of the OSI model, i.e., the Application, Presentation, and Session Layer. Some of the protocols of the application layer are described below. HTTP:- It stands for Hypertext transfer protocol. This protocol enables us to access data via the internet. It sends data in plain text, audio, and video formats. It’s called a hypertext transfer protocol because it’s efficient enough to use in a hypertext environment where there are rapid jumps from one document to another. TELNET:- It establishes a connection between the local and remote computers in such a way that the local computer seems to be a remote terminal. SMTP:-The Simple Mail Transfer Protocol (SMTP) is the TCP/IP protocol that handles e-mail. The data is sent to another e-mail address using this protocol. FTP:- The FTP (File Transfer Protocol) is a standard internet protocol for transferring data from one computer to another. 2.Host-to-Host/Transport Layer This layer is similar to the OSI model’s Transport layer. Specifies how much data should be sent, when, and where at what rate. The message from the application layer is built upon this layer. Ensures that data units are supplied in a timely and error-free manner. Through error control, flow control, and segmentation or de- segmentation, the transport layer helps to control the link’s reliability. Also acknowledges the successful data transmission and sends the next data if no errors occur. Protocol used in Transport layer Transmission Control Protocol (TCP): -It is known for offering error-free and reliable communication between end systems. It does data segmentation and sequencing. It also features an acknowledgment feature and uses a flow control method to govern data flow. It is a very effective protocol, but it has a lot of overhead because of these features. Increased overhead translates to higher costs. TCP uses three-way handshaking to establish and acknowledge the connection between the two devices. User Datagram Protocol (UDP): -On the other side, it doesn’t have any of these properties. If your application does not require dependable transmission, one must use this protocol because it is relatively cost-effective. UDP is a connectionless protocol, so it does not provide assurance of data delivery. 3.Internet Layer The Internet layer’s primary function is to send packets from the source or computer to their destination, regardless of their route. The Internet layer or Network Layer provides a functional and procedural means for sending variable-length data sequences between nodes across multiple networks. Message delivery at the Internet layer does not guarantee reliable network layer protocol. The main protocols lie in the layer are IP:-The Internet Protocol (IP) is in charge of sending packets from a source host to a destination host based on the IP addresses in the packet headers. There are two variations of IP IPv6 and IPv4. ARP:- Address Resolution Protocol (ARP) is a protocol for resolving conflicts between computers. Its task is to determine a host’s hardware address from an IP address. ARP’s primary function is to convert 32-bit addresses to 48-bit addresses and vice versa. ARP is necessary because IP addresses in IP version 4 (IPv4) are 32 bits long, but MAC addresses are 48 bits long. Network Access Layer/Link Layer Network access or Link layer specifies the physical transmission of data over the network. This layer handles data transmission between two adjacent devices on the same network. It also determines how bits should be optically signaled by hardware devices that interface directly with a network media such as coaxial, optical, fiber, or twisted-pair cables. Uses Of TCP/IP Model The various uses of the TCP/IP Model are described below. 1.It provides a suite of communication protocols that allows data exchange between two devices possible or in general we can say that it makes the internet possible. 2.We all are aware of the importance of text communication in today’s environment. For text communication, flow control, and error control are mandatory because the text message’s size is minimal, and it must be delivered with minimal error to the right person. A small mistake in the text message can change the meaning of the whole message. So TCP/IP model handles the following operations to ensure the transition between sender and receiver is in order and error-free. Examples of text communication are WhatsApp, Instagram, Google Chat, and iMessage. Uses Of TCP/IP Model 3. Internet banking is possible due to this model because it provides reliability, efficiency, and security, making it possible for users to use such facilities online. 4. Online gaming and video streaming are also possible because TCP/IP model provides flexibility in choosing connection-oriented or connectionless transmission. Due to this flexibility, broadcasting sports and events to a mass audience is possible. 5. TCP/IP provides various functions like DNS, DHCP, Virtual Private Networking, Piggybacking, Error control, etc. This feature allows end- user to use the internet without fear of losing their privacy and integrity.