Data Communication and Networking - Transport and Application Layer of the OSI model

s208060compug21 25 views 77 slides May 13, 2024
Slide 1
Slide 1 of 77
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68
Slide 69
69
Slide 70
70
Slide 71
71
Slide 72
72
Slide 73
73
Slide 74
74
Slide 75
75
Slide 76
76
Slide 77
77

About This Presentation

Concise explanation about the Transport and Application Layer of the OSI model


Slide Content

UNIT -5
TRANSPORT &
APPLICATION LAYER

TRANSPORT
LAYER
2Ms P Abirami Asst Prof Dept of Comp Sci

3Ms P Abirami Asst Prof Dept of Comp Sci

✓ 4
th
layer from the top.
✓provide the communication services directly to the application processes running on different hosts.
✓provides a logical communication between application processes running on different hosts.
✓protocols are implemented in the end systems but not in the network routers.
✓A computer network provides more than one protocol to the network applications. For example, TCP and UDP are
two transport layer protocols that provide a different set of services to the network layer.
✓protocols provide multiplexing/demultiplexing service. It also provides other services such as reliable data
transfer, bandwidth guarantees, and delay guarantees.
✓Each of the applications in the application layer has the ability to send a message by using TCP or UDP. The
application communicates by using either of these two protocols. Both TCP and UDP will then communicate with
the internet protocol in the internet layer. The applications can read and write to the transport layer. Therefore,
we can say that communication is a two-way process.
4Ms P Abirami Asst Prof Dept of Comp Sci

The services provided by the transport layer protocols can be divided into five
categories:
•End-to-end delivery
•Addressing
•Reliable delivery
•Flow control
•Multiplexing
5Ms P Abirami Asst Prof Dept of Comp Sci

TCP [Transmission Control Protocol] & UDP[User Datagram Protocol]
6Ms P Abirami Asst Prof Dept of Comp Sci

7Ms P Abirami Asst Prof Dept of Comp Sci

8Ms P Abirami Asst Prof Dept of Comp Sci

9Ms P Abirami Asst Prof Dept of Comp Sci

TCP
1.TCP SERVICES
2.TCP FEATURES
3.TCP SEGMENT
4.TCP CONNECTION
10Ms P Abirami Asst Prof Dept of Comp Sci

TCP FEATURES
11Ms P Abirami Asst Prof Dept of Comp Sci

TCP FEATURES
•NUMBERING SYSTEM
•FLOW CONTROL
•ERROR CONTROL
•CONGESTION CONTROL
12Ms P Abirami Asst Prof Dept of Comp Sci

TCP FEATURES
•FLOW CONTROL –receiver controls the amount of data sent by
sender to avoid overflowing
•ERROR CONTROL –implements error detection & error correction
during data transfer
•CONGESTION CONTROL –data sent by sender is not only controlled
by the receiver also by the level of congestion in the network
13Ms P Abirami Asst Prof Dept of Comp Sci

TCP FEATURES
•NUMBERING SYSTEM
•SEQUENCE NUMBER
•ACKNOWLEDGMENT NUMBER
BYTE NUMBER –byte of data transferred in each connection is numbered by TCP
from 0 –1
SEQUENCE NUMBER –1
st
data byte in the segment
14
DEPENDS ON BYTE NUMBER NOT THE SEGMENT NUMBER
Ms P Abirami Asst Prof Dept of Comp Sci

TCP FEATURES
SEQUENCE NUMBER –1
st
data byte in the segment
•Segment has 1 byte of data each
•Combo of control & data
•Used in establishing the connection, data transmission, connection termination
•Valid only if it has data
15Ms P Abirami Asst Prof Dept of Comp Sci

TCP FEATURES
ACKNOWLEDGMENT NUMBER –Cumulative , that is add 1 when last byte is received
e.g: x + 1 for x , 5043 for 5042
•It is used to confirm the byte has to be received
•It defines the number of next byte expects to be received
16Ms P Abirami Asst Prof Dept of Comp Sci

TCP SEGMENT
17Ms P Abirami Asst Prof Dept of Comp Sci

TCP SEGMENT
18Ms P Abirami Asst Prof Dept of Comp Sci

TCP SEGMENT
•Data packets in the TCP are called as segments
•Segment divide into -Header & data
•Header-20 to 60 bytes of data
19Ms P Abirami Asst Prof Dept of Comp Sci

TCP SEGMENT
•Header –identify the sender / receiver of the data
•40 bytes of Option & Padding -for future purpose (data storage)
•16 bit of source port address & 16 bit of destination port address
[application used for sending & receiving purpose has 16 bit each]
•32 bits Sequence number –1
st
byte of the segment
•32 bits acknowledgment number –identify the next data to be received from sender to receiver
•16 bits window size –sender have tosend only 16 bit to receiver , to avoid overflow [window size determines the
receiver size]
•16 bits -4bits HLEN(Header length ), 6bits Reserved(Reserved for the future),
•6 bits controls (1bit each ) –
•URG -URGENT
•ACK -ACKNOWLEDGMENT
•PSH -PUSH
•RST -RESET
•SYN -SYNCHRONIZE
•FIN -FINAL
20
THE FLAG IS SET ON WHEN THESE CONTROL BITS ARE ACTIVE
•RESET BIT IS SET DURING RESET OTHER WISE IN OFF STATE
•PUSH BIT IS SET ON WHEN THE DATA IS PUSHED
•FIN BIT IS SET ON WHEN THE DATA TRANSMISSION IS COMPLETED
Ms P Abirami Asst Prof Dept of Comp Sci

TCP SEGMENT
•6 bits controls (1bit each ) –
•URG–The value of the URGENT pointer field is valid
•ACK-The value of the ACKNOWLEDGMENT field is valid
•PSH–PUSH the data
•RST–RESET the connection
•SYN –SYNCHRONIZE sequence number during connection
•FIN–Terminate the connection
•16 bits of CHECKSUM –Added into stream to check the error occurrence in
the data transfer, mandatory in TCP not in the UDP.
•16 bits of URGENT POINTER –it is used to store data when it is true
21Ms P Abirami Asst Prof Dept of Comp Sci

TCP SERVICES
22Ms P Abirami Asst Prof Dept of Comp Sci

TCP SERVICES
1.PROCESS –PROCESS COMMUNICATION
2.STREAM DELIVERY SERVICE
3.SENDING & RECEIVING BUFFER
4.FULL DUPLEX COMMUNICATION
5.CONNECTION ORIENTED SERVICES
6.RELIABLE SERVICES
23Ms P Abirami Asst Prof Dept of Comp Sci

1.PROCESS -PROCESS
•There are different port
•Eg:
•1 –communication
•7 -echo
•9 –discard
•11 –available users
24Ms P Abirami Asst Prof Dept of Comp Sci

2.STREAM DELIVERY SERVICES
•SENDING PROCESS
•RECEIVING PROCESS
•TCP act on sending process to send the stream of data to receiver
•TCP act on receiving process to receive the stream of data from sender
25
TCP PROCESS
Ms P Abirami Asst Prof Dept of Comp Sci

Stream delivery services
26
SENDING RECEIVING
TCP TCPSTREAM OF BYTES
Ms P Abirami Asst Prof Dept of Comp Sci

3. SENDING & RECEIVING BUFFER
1.BUFFER –STORAGE
2.SENDING & RECEIVING BUFFER
3.CIRCULAR ARRAY
4.SENDING BUFFER
5.RECEIVER BUFFER
27Ms P Abirami Asst Prof Dept of Comp Sci

3.SENDING & RECEIVING BUFFER
•BUFFER –TO STORE DATA
•Circular array is used
•Sender –white, Gray & Coloured
•Receiver –White & Coloured
28
WHITE DATA HAVE TO BE STORED BY THE SENDER
GRAY STORED DATA WAITING FOR THE ACKNOWLEDGMENT
COLOURED DATA IS READY TO SEND
WHITE EMPTY PLACE WAITING FOR THE DATA FROM THE SENDER THROUGH NETWORK
COLOURED IT IS ALREADY RECEIVED AND READ BY THE RECEIVER
Ms P Abirami Asst Prof Dept of Comp Sci

29Ms P Abirami Asst Prof Dept of Comp Sci

4. FULL DUPLEX COMMUNICATION
30
•Infull-duplexmode,transmissionissimultaneouslybi-directional.
•Theenddevicescantransmitandreceivesimultaneously.
•Aprimeexampleoffull-duplexcommunicationsisthePSTNthat
providestwo-waycommunications.
Ms P Abirami Asst Prof Dept of Comp Sci

5.CONNECTION ORIENTED SERVICES
31
There is a sequence of operations that are needed to b followed by users.
1.Establishing Connection –(BETWEEN SENDER & RECEIVER)
It generally requires a session connection to be established just before any data is
transported or sent with a direct physical connection among sessions.
2.Transferring Data or Message –(BETWEEN SENDER & RECEIVER)
When this session connection is established, then we transfer or send message or data.
3.Releasing the Connection –(BETWEEN SENDER & RECEIVER)
After sending or transferring data, we release connection.
Ms P Abirami Asst Prof Dept of Comp Sci

6. RELIABLE SERVICES
32
SECURITY & INTEGRITY OF DATA TRANSMISSION
Ms P Abirami Asst Prof Dept of Comp Sci

TCP CONNECTION
33Ms P Abirami Asst Prof Dept of Comp Sci

TCP CONNECTION
•TCP is connection oriented
•Establish virtual path between the source and destination
•Messages are sendover the virtual path
•TCP uses the IP address to deliver individual segment to the receiver
•The lost/corrupted messages are retransmitted in TCP
•Connection oriented transmission has 3 phase
1.Connection establishment
2.Data transfer
3.Connection termination
34Ms P Abirami Asst Prof Dept of Comp Sci

TCP CONNECTION
1 –CONNECTION ESTABLISHMENT
1.TCP transfer data in full duplex mode
2.Two nodes can send segments simultaneously
3.The connection should be established before data transmission
4. The connection establishment in TCP is called as “Three Way Handshaking”
35Ms P Abirami Asst Prof Dept of Comp Sci

Three wayhandshaking
✓Server is in the passive open mode
✓Client is in the active open mode
✓The server program inform TCP, that it is ready to accept the connection ->
request for a passive open
✓The client program issues a request for an active open
36Ms P Abirami Asst Prof Dept of Comp Sci

Three steps:
STEP -1
•The client sends the first segment , SYN segment with SYN flag set
•SYN–cannot carry data but it consumes one sequence number
37
SEQ : 8000
S
SENDER - RECEIVER
Client - Server
SEQUENCE NO : 8000
SYN FLAG IS SET
Ms P Abirami Asst Prof Dept of Comp Sci

Three steps:
STEP -2
•The server sends the second segment , SYN + ACK with 2 flag bit set
•It cannot carry data but it consumes one sequence number
38
SEQ : 15000
ACK : 8001
A S
SENDER - RECEIVER
server - client
SEQUENCE NO : 15000
ACK : 8001
ACK & SYN FLAG IS SET
Ms P Abirami Asst Prof Dept of Comp Sci

Three steps:
STEP -3
•The client sends the third segment , just an ACK segment
•It cannot carry data & consumes no sequence number
39
SEQ : 8000
ACK : 15001
A
SENDER - RECEIVER
Client - Server
Ms P Abirami Asst Prof Dept of Comp Sci

40Ms P Abirami Asst Prof Dept of Comp Sci

•Simultaneous open -When both the processes issues an active open
•SYN Flooding Attack & Denial Of Service Attack –SYN flooding attack
belongs to a type of security attacks.
41Ms P Abirami Asst Prof Dept of Comp Sci

TCP CONNECTION
2 –DATA TRANSFER
✓The data transfer will be takeplace once the connection has established
between client and the server
✓Both client and server will send and acknowledge the data
✓The data travelling in the same direction as an acknowledgment are carried on
the same segment
✓TCP implementation have the option to SET/NOT SET the PUSH & URGENT flag
42Ms P Abirami Asst Prof Dept of Comp Sci

43
Three steps:
STEP -1
•The client sends the request to server to transfer the data( push the
data)
•Data – bytes from (8001-9000) as one segment and (9001-10000) as
another segment
SEQ : 8001
ACK:15001
AP
SENDER - RECEIVER
Client - Server
SEQUENCE NO : 8001
ACKNOWLEDGMENT NO:15001
ACK & PSH FLAGS ARE SET
Ms P Abirami Asst Prof Dept of Comp Sci

44
Three steps:
STEP -2
•The server sends the acknowledgment to server for the request of
transferring the data( push the data)
•Data – bytes from (8001-9000) as one segment and (9001-10000) as
another segment
SEQ : 15001
ACK:10001
AP
SENDER - RECEIVER
Server - Client
SEQUENCE NO : 15001
ACKNOWLEDGMENT NO:10001
ACK & PSH FLAGS ARE SET
Ms P Abirami Asst Prof Dept of Comp Sci

45
Three steps:
STEP -3
•The client sends the acknowledgment to server
SEQ : 10000
ACK:17001
A
SENDER - RECEIVER
Client- Server
SEQUENCE NO : 10000
ACKNOWLEDGMENT NO:17001
ACK FLAGS ARE SET
Ms P Abirami Asst Prof Dept of Comp Sci

46Ms P Abirami Asst Prof Dept of Comp Sci

TCP CONNECTION
3 –TERMINATE THE CONNECTION
✓The connection has been terminated between client and the server after the
data transmission
✓Three way handshaking
✓ACK & FIN flag is set
✓Client side –active close & Server side –passive close
47Ms P Abirami Asst Prof Dept of Comp Sci

48Ms P Abirami Asst Prof Dept of Comp Sci

•Half close –connection closes before the complete transmission
49Ms P Abirami Asst Prof Dept of Comp Sci

APPLICATION LAYER
50Ms P Abirami Asst Prof Dept of Comp Sci

•DOMAIN NAME SYSTEM
•NAME SPACE
•DOMAIN NAME SPACE
•DOMAIN
•REMOTE LOGGING
•TELNET
•E-MAIL
•FILE TRANSFER
51Ms P Abirami Asst Prof Dept of Comp Sci

DOMAIN NAME SPACE
(DNS)
•Naming database
•Internet domain names are located & translated into IP address
•It is hierarchical & decentralized naming system for computers
•Services or resources connected to internet / private network
•It assign domain name & mapping those to internet
52Ms P Abirami Asst Prof Dept of Comp Sci

How DNS works?...
53
server
server
server
server
Ms P Abirami Asst Prof Dept of Comp Sci

Name Space
•The name assigned to a machine are unique because the address are unique
•The map each other using unique name
•The way it is organised as:
•Flat Name Space
•Hierarchical Name Space -several parts such as –nature of the organisation, name,
department etc.,
•E.g(www.ethirajcollege_computerscience.edu.in)
54Ms P Abirami Asst Prof Dept of Comp Sci

Domain Name Space
•It is designed to have a hierarchical name space
•Inverted tree structure
•Root at the top
•Only 128 levels that is 0 –127
55Ms P Abirami Asst Prof Dept of Comp Sci

e.g: computerscience.ethirajcollege.edu.in
56
in
root
edu
ethirajcollege
computerscience
in
Edu.in
ethirajcollege.edu.in
computerscience.ethirajcollege.edu.in
Ms P Abirami Asst Prof Dept of Comp Sci

Domain
•Subtree of Domain Name Space
57Ms P Abirami Asst Prof Dept of Comp Sci

REMOTE LOGGING
•E.G STUDENT USE TO ACCESS COLLEGE LAB LOG IN ID FROM THEIR HOME
•USE REMOTE SITE FROM THEIR LOCAL SITE
•CLIENT/SERVER IS USED FOR THAT SERVICE
•FTP,EMAIL ARE USED
58Ms P Abirami Asst Prof Dept of Comp Sci

TELNET
•General purpose of client/server application program
•Terminal Network
•Standard TCP/IP protocol
•Local terminal is appearsate the remote system
•Time sharing environment –large computer supports multiple users
•Interaction between user and computer done through terminals
59Ms P Abirami Asst Prof Dept of Comp Sci

TELNET -logging
•TELNET
----------→NVT(Network Virtual Terminal)
-----→TCP/IP
-----→NVT
………..
60Ms P Abirami Asst Prof Dept of Comp Sci

EMAIL
61Ms P Abirami Asst Prof Dept of Comp Sci

E-MAIL
•Beginning –only short message consist of text
•Later –text, audio, image, video
•Message can be sent to more than one recipients
•General architecture : I , II ,III, IV -SCENARIOS
•User agent
•Message transfer agent
•Message access agent
62Ms P Abirami Asst Prof Dept of Comp Sci

•USER AGENT
1.COMPOSING MESSAGES
2.READING MESSAGES
3.REPLYING TO MESSAGES
4.FORWARDING MESSAGES
5.HANDLING MAILBOX
•MESSAGE TRANSFER AGENT
1.SMTP –PROTOCOL TO TRANSFER MESSAGE
2.MTA –MAIL TRANSFER AGENT –CLIENT & SERVER
•MESSAGE ACCESS AGENT
1.POP –POST OFFFICE PROTOCOL –POP3 (VERSION 3)
2.IMAP –INTERNET MAIL ACCESS –IMAP4 (VERSION 4)
63Ms P Abirami Asst Prof Dept of Comp Sci

ARCHITECTURE
•FIRST SCENARIO
•SECOND SCENARIO
•THIRD SCENARIO
•FOURTH SCENARIO
64Ms P Abirami Asst Prof Dept of Comp Sci

ARCHITECTURE
65
SCENARIO SENDER RECEIVER USER AGENT MTA
FIRST SHARED SYSTEM TWO -
SECOND SYSETM1 SYSTEM2 TWO TWO
THIRD MAIL SERVER SYSTEM2 TWO TWO
FOURTH MAIL SERVERMAIL SERVER TWO TWO
Ms P Abirami Asst Prof Dept of Comp Sci

66
User
agent
FIRST
User
agent
Ms P Abirami Asst Prof Dept of Comp Sci

67
User
agent
SECOND
User
agent
INTERNET
MTA
CLIENT
MTA
SERVER
Ms P Abirami Asst Prof Dept of Comp Sci

68
User
agent
THIRD
User
agent
INTERNET
MTA
CLIENT
MTA
SERVER
MTA
SERVER
INTERNET
Ms P Abirami Asst Prof Dept of Comp Sci

69
User
agent
FOURTH
User
agent
INTERNET
MTA
CLIENT
MAA
SERVER
MTA
SERVER
INTERNET
MTA
SERVER
INTERNET
Ms P Abirami Asst Prof Dept of Comp Sci

FILE TRANSFER
70Ms P Abirami Asst Prof Dept of Comp Sci

FILE TRANSFER
•Transfer files from one computer to another
•Protocol –FTP provided by TCP/IP
•It provides two connections between hosts
1.Data transfer
2.Control information (command & responses)
•FTP uses TCP ports 20 –data connection & 21 –control information
•Different FTP for client & server
•Client –3 components
•Server –2 components
71Ms P Abirami Asst Prof Dept of Comp Sci

72
USER INTERFACE
CONTROL PROCESS
DATA TRANSFER PROCESS
DATA TRANSFER PROCESS
CONTROL PROCESS
TCP/IP
CONTROL
CONNECTION
CLIENT
SERVER
Ms P Abirami Asst Prof Dept of Comp Sci

•Control connection and data connection is done between the client &
server
•Control connection –remains connected
•Data connection –open & close for each file transfer
73Ms P Abirami Asst Prof Dept of Comp Sci

Communication over control connection
74
CONTROL PROCESS CONTROL PROCESS
NVT ASCIIT
CLIENT SERVER
Ms P Abirami Asst Prof Dept of Comp Sci

Communication over data connection
75
DATA TRANSFER
PROCESS
DATA TRANSFER
PROCESS
DATA CONNECTIONT
CLIENT SERVER
FILE TYPE
DATA STRUCTURE
TRANSMISSION MODE
Ms P Abirami Asst Prof Dept of Comp Sci

ANONYMOUS FTP
•To use FTP , user need account & password
•To use anonymous , FTP user can use
user name: anonymous
password : guest
76Ms P Abirami Asst Prof Dept of Comp Sci

MORE WAY TO GO……………
ALL THE BEST
77Ms P Abirami Asst Prof Dept of Comp Sci
Tags