You are on page 1of 6

TRANSPORT LAYER 4: Flow Control: Fast host cannot keep pace

The transport layer is the fourth layer of the OSI with a slow one. Hence, this is a mechanism to
reference model. Transport layer provides regulate the flow of information. The amount of
transparent, reliable, and cost effective transfer memory on a computer is limited, and without
of data units between the upper layer entities in flow control a larger computer might flood a
the end systems. computer with so much information that it can't
The goal of the transport layer is to abstract the hold it all before dealing with it. Nowadays, this
structure and function of the network so that is not a big issue, as memory is cheap while
the upper layer can communicate without bandwidth is comparatively expensive, but in
needing to consider the network technology. earlier times it ,was more important. Flow
Functions of Transport Layer control allows the receiver to respond before it
1: End-to-End Delivery: The network layer is overwhelmed
oversees the end-to-end delivery of individual 5: Multiplexing: To improve transmission
packets but does not see any relationship efficiency, the transport layer has the option of
between those packets, even those belonging to multiplexing.
a single message. It treats each as an TRANSMISSION CONTROL PROTOCOL (TCP)
independent entity TCP is a connection-oriented reliable protocol. It
2: Addressing: The client needs the address of provides a reliable transport service between
the remote computer it wants to communicate pairs of processes executing on End Systems
with. Such remote computers have a unique (ES) using the network layer service provided by
address so that it can be distinguished from all the IP protocol it is the general protocol suite of
the other computers. the Internet; encompassing protocols for
3: Reliable Delivery: The reliable delivery network activities such as datagram delivery ad
considers the following issues given below: acknowledgement and protocols for user
*Error Control: When transferring data, the activity such as remote login (Telnet) and file
primary goal of reliability is error control. Data transfer protocol (FTP), A given Implementation
must be delivered to their destination exactly as of TCP/IP application typically contain a dozen
they originated from the source. The realities of or more protocols and facilities essential to the
physical data transport are that, while 100 use of TCP/IP application in a TCP/IP
percent error-free delivery is probably environment. It is a 2-layer predominant
impossible, transport layer protocols are transfer protocol that provides a reliable
designed to come as close as possible. connection oriented byte stream service
*Sequence Control: The second aspect of TCP PACKET FORMAT
reliability implemented at the transport layer is The following description summarise the TCP
sequence control. On the sending end, the packet fields illustrated in below
transport layer is responsible for ensuring that 1: Source Port and Destination Port: Identifies
data units received from the upper layers are points at which upper-layer source and
usable by the lower layers. destination processes receive TCP service
On the receiving end, it is responsible for 2: Sequence Number: Usually specifies the
ensuring that the various pieces of a number assigned 10 the first byte of data in the
transmission are correctly reassembled. current message. In the connection-
*Loss Control: The third aspect or reliability establishment phase, this field also can be used
cove red by the transport layer is loss control. to identify an initial sequence number to be
The transport layer ensures that all pieces of a used in an upcoming transmission.
transmission arrive at the destination, not just 3: Acknowledgment Number: Contain the
some of them. sequence number of the next byte of data the
*Duplication Control: The fourth aspect of ender of the packet expects to receive
reliability covered by the transport layer is 4: Data Offset: Indicates the number of 32-bil
duplication control. Transport layer functions words in the TCP header.
must guarantee that no pieces or data arrive at 5: Reserved: Remains reserved for future use.
the receiving system duplicated.
6: Flags(6 bits): For each flag, if set to I, the much information that it can't hold it all before
meaning is as follows: dealing with it. Flow control allows the receiver
*CWR: Congestion window reduced. to respond before it is overwhelmed.
*ECE: ECN-Echo: the CWR and ECE bits, defined 4: Congestion Avoidance: Network congestion
in RFC 3168 are used for the explicit congestion occurs when a queue buffer of a network node
notification function. is full and starts to drop packets. Automatic
*URG: Urgent pointer field significant. repeat request may keep the network in a
*ACK: Acknowledgment field significant. congested state. This situation can be avoided
*PSH: Push function. by adding congestion avoidance to the flow
*RST: Reset the connection. control. Including slow-start.
*SYN: Synchonorise the sequence number 5: Byte Orientation: The Transport Layer may
*FIN: No more data from sender. add the ability to view communication just as a
7: Window: Specifies the size of the sender's stream M bytes. This is nicer to deal with than
receive window (that is the buffer space random packet sizes, however, it rarely matches
available for incoming data). the communication model which will normally
8: Checksum: indicates whether the header was be a sequence of me sages of user defined sizes.
damaged in transit 6: Ports: Ports are essential ways to address
9: Urgent Pointer: Points to the first urgent data multiple entities in the same location. For
byte in the packet. example, the first line of a postal address is a
10: Options: Specifies various TCP options. kind of port and distinguishes between different
11: Data: Contains upper-layer information occupants of the same house.
UDP: USER DATAGRAM PROTOCOL
UDP is one of the core members of the Internet
protocol suite. The protocol was designed by
David P.
UDP uses a simple connectionless transmission
model with a minimum of protocol mechanism.
It has no handshaking dialogues, and thus
exposes any unreliability of the underlying
TCP SERVICE network protocol to the user's program. There
There is a long list of services that can be is no guarantee of delivery, ordering, or
optionally provided by the Transport Layer. All duplicate protection. UDP provides checksums
available services are for data integrity, and port numbers for
1: Connection-Oriented: This is normally easier addressing different functions at the source and
to deal with than connection-less models. so destination of the datagram.
where the Network layer only provide a With UDP, computer applications can send
connection-less service, often a connection- messages, in this case referred to as datagram,
oriented service is bt1ilt on top of that in th to other hosts on an Internet Protocol (IP)
Transport Layer network without prior communications to set
2: Reliable Data: Packets may be lost in routers. up special transmission channels or data paths.
switches, bridges and hosts due to network UDP is suitable for purposes where error
congestion. when the packet queues are filled checking and correction is either not necessary
and the network nodes have to delete packets. or is performed in the application, avoiding the
Packets may be lost or corrupted in Ethernet overhead of such processing at the network
due to interference and noise, since Ethernet interface level.
does not retransmit corrupted packets. Packets UDP provides two services not provided by the
may be delivered in the wrong order by an IP layer. It provides port numbers to help
underlying network. distinguish different user requests and,
3: flow Control: The amount of memory on a optionally, a checksum capability to verify that
computer is limited. and without now control a the data arrived intact.
larger computer might flood a computer with so
UDP Header Format own address. The server response also contains
A computer may sent UDP Packets without first destination address i.e,the address of the client.
establishing a connection to the recipient. the DNS is used for this addressing.
computer completes the appropriate fields in 3: Mail Services: This Application provides the
the UDP header (PCI) and forward the data basic for email forwarding the storage
together with the header for transmission by 4: Directory Services: This Application provides
the IP network layer distributed database source and access for
The UDP Header consist of four fields each of 2 global information about various objects and
bytes i length services
1: Source Port: UDP Packets from a client use 5: Authentication: Authenticates the sender or
this a service access point (SAP) to indicate the receiver of the message or both
session on the local client that originated the FILE TRANSFER PROTOCOL (FTP)
Packet. UPD Packet from a server carry the FTP allows the transfer on files one computer to
server SAP in the field. another. file can be in any format like text,
2: Destination Port: UDP Packets from a client graphics, sound etc. it activates the client-server
use this a service access point (SAP) to indicate relationship. thus whatever that can be stored
the service required from the remote in a computer can be moved with the FTP
server.UPD Packet from a server carry the client service
SAP in the field. Objectives of FTP
3: UDP Length: The Number of bytes comprising 1: Its main objective is to help in sharing of
the combined UDP Header information and programs and data
payload data 2: Inspiring the implicit use of remote computer
4: UDP Checksum: A Checksum to verify that 3: To protect the user from variation in file
the end to end data has not been corrupted by storage system among numerous hosts
routers or bridges in the network or by the 4: Effective an reliable sharing of data
processing in an end system. The algorithm to Mechanism of FTP
compute the Checksum is the standard internet 1: User Interface, 2: Client Control Process
Checksum algorithm. If this check is not 3: Client Data Transfer Process
required, the value of 0x0000 is placed in the
field in which case the data is not checked by
the receiver
APPLICATION LAYER
The application layer is the OSI layer closest to
the end user. which means that both the OSI
application layer and the user interact directly
with the software application. This layer
in1eracts with software applications that
implement a communicating component. Such
application programs fall outside the scope of
the OSI model.
Functions of Application Layers
1: File Transfer, Access, and Management
(FTAM): This application allows a user to access FTP Has two Connections
files in a remote computer (to make changes or 1: Control Connection: this is a Control process
read data), to retrieve files from a remote Connection. during the complete FTP session,
computer: and to manage or control files in a control Connections remain Connected
remote computer 2: Data Connection: this Connection is present
2: Addressing: For communication between b/w various data transfer processes, during
client and server there is requirement of every file transfer this Connection opens and
address. When the client request is made to after completion of transfer process, this
server, it also contains server address and us Connection gets closed
DOMAIN NAME SPACE (DNS) by the user. Some even have a built-in editor
DNS is a directory lookup service that provides a that can do spell checking, grammar checking,
mapping between the name of a host on the and other tasks expected from a sophisticated
Internet and its numerical address. DNS is word processor. A user, of course, could
essential to the functioning of the lntenet.DNS is alternatively use his or her favourite text editor
service on a TCP/IP network which allows users or word processor to create the message and
of networks to utilise user-friendly names when import it, or cut and paste it, into the user agent
looking for other hosts (computers) instead of template.
having to remember and use their IP Addresses. Reading Messages :The second duty of the user
This system is used extensively on die Internet agent is to read the incoming messages. When a
and in many private enterprises today user invokes a user agent, it first checks the mail
Format of Domain Names in the incoming mailbox. Most user agents show
a one-line summary of each received mail. Each
e-mail contains the following fields.
1. A number field.
2. A flag field that shows the status of the mail
such as new, already read but not replied to, or
Domain Name Servers read and replied to.
In theory at least a single name server could 3. The size of the message.
contain the entire DNS database and respond to 4. The sender.
all queries about it. In practice, this server could 5. The optional subject field.
be so overloaded as to be useless. Furthermore, Replying to Messages After reading a message,
if it ever went down. the entire Internet would a user can use the user agent to reply to a
be crippled. To avoid the problems associated message. A user agent usually allows the user to
with having only a single source of information, reply to the original sender or to reply to all
the DNS name space is divided up into non- recipients of the message. The reply message
overlapping zones. Each zone contains some may contain the original message and the new
part of the tree and also contains name servers message.
holding the authoritative information about that Forwarding Messages Replying is defined as
zone. sending a message to the sender or recipients of
ELECTRONIC MAIL the copy. Forwarding is defined as sending the
One of the most popular Internet services is message to a third party. A user agent allows
electronic mail (e-mail). The designers of the the receiver to forward the message, with or
Internet probably never imagined the popularity without extra comments, to a third party.
of this application program. At the beginning of Handling Mailboxes A user agent normally
the Internet era, the messages sent by creates two mailboxes: an inbox and an outbox.
electronic mail were short and consisted of text Each box is a file with a special format that can
only; they let people exchange quick memos. be handled by the user agent. The inbox keeps
Today, electronic mail is much more complex. It all the received e-mails until they are deleted by
allows a message to include text, audio, and the user. The outbox keeps all the sent e-mails
video. It also allows one message to be sent to until the user deletes them. Most user agents
one or more recipients. today are capable of creating customized
Architecture mailboxes.
User Agent: The first component of an User Agent Types
electronic mail system is the user agent. It Command-Driven: Command-driven user agents
provides service to the user to make the process belong to the early days of electronic mail. They
of sending and receiving a message easier. are still present as the underlying user agents in
Composing Messages servers. A command-driven user agent normally
A user agent helps the user compose the e-mail accepts a one-character command from the
message to be sent out. Most user agents keyboard to perform its task.
provide a template on the screen to be filled in
MULTIPURPOSE INTERNET MAIL SNMP
EXTENSIONS (MIME) is an Internet standard SNMP is a frame work for managing devices in
that extends the format of email to support: an internet using TCP/IP suite. It provides
1.Text in character sets other than ASCII fundamental operations for monitoring and
2.Non-text attachments: audio, video, images, maintaining an internet.
application programs etc. ➢ SNMP uses the concept of manager and
3.Message bodies with multiple parts agent. Manager usually a host controls and
4.Header information in non-ASCII character monitors a set of agents, usually routers. A
sets management station, called a manager, is a host
Virtually all human-written Internet email and a that runs the SNMP client program. A managed
fairly large proportion of automated email is station, called an agent, is a router or host that
transmitted via SMTP in MIME format. runs the SNMP server program.
MIME-Version ➢ Management is achieved through simple
The presence of this header indicates the interaction between a manager and an agent.
message is MIME-formatted. The agent keeps performance information in a
Content-Type database. The manager has access to the values
This header indicates the Internet media type of in the database.
the message content, consisting of a type and Management with SNMP is based on three basic
subtype ideas
MIME, a specification for formatting non-ASCII 1. A manager checks an agent by requesting
messages so that they can be sent over the information that reflects the behavior of the
Internet. Many e-mail clients now support agent.
MIME, which enables them to send and receive 2. A manager forces an agent to perform a task
graphics, audio, and video files via the Internet by resetting values in the agent database.
mail system. In addition, MIME supports 3. An agent contributes the management
messages in character sets other than ASCII process by warning the manager of an unusual
MIME (Multi-Purpose Internet Mail Extensions) situation.
is an extension of the original Internet e-mail Role of SNMP
protocol that lets people use the protocol to SNMP has some very specific roles in network
exchange different kinds of data files on the management. It defines the format of the
Internet: audio, video, images, application packet to be send from a manager to an agent
programs, and other kinds, as well as the ASCII and vice versa. It also interprets the result and
text handled in the original protocol, the Simple creates statistics. The packet exchange contains
Mail Transport Protocol (SMTP). the object names (variables) and their status
There are many predefined MIME types, such as (values). SNMP is response for reading and
GIF graphics files and PostScript files. It is also changing these values.
possible to define your own MIME types. In SNMP messages:
addition to e-mail applications, Web browsers SNMP does not send only a PDU, it embeds the
also support various MIME types. This enables PDU in a message. A message in SNMPv3 is
the browser to display or output files that are made of four elements: version, header,
not in HTML format. security parameter and data.
MIME (Multi-Purpose Internet Mail Extensions) The version, defines the current version (3)
is an extension of the original Internet e-mail The header contains values for message
protocol that lets people use the protocol to identification, maximum message size, message
exchange different kinds of data files on the flag and a message security model.
Internet: audio, video, images, application The message security parameter is used to
programs, and other kinds, as well as the ASCII create a message digest.
text handled in the original protocol, the Simple
Mail Transport Protocol (SMTP).
WORLD WIDE WEB(WWW) Components of World Wide Web
WWW is the most popular internet tool. It is 1: Web Clients: Web clients are also referred to
also known as Web With the help of WWW, as browsers which provide a graphical user
user can easily access and present the interface for content display These may run on
documents on the internet. These documents IBM-compatible PCs, Apple Macintosh
stored on the server. In other words, web is a computers, UNIX platforms and other platforms
collection of interlinked hypertext documents which provide a number of facilities. following
which are accessed through internet. Hypertext are the few most popular browsers:
documents are also known as 'Web Pages. In a *Microsoft's Internet Explorer *Firefox Mozilla
set of web pages (websites), the first one is *Google's Chrome.
called Home Page. The information is available 2: Web Servers: Web servers are group of both
on WWW via HTTP (Hypertext Transfer software and hardware that act as information
Protocol). storehouses. These programs can be executed
A system of 'interlinked hypertext documents' over IBM PCs. Apple Macintosh computers,
which can he accessed via the internet is UNIX platforms. etc. The most popular Web
referred to as the web. TCP/IP is the clients arc Microsoft's internet informa1ion
fundamental transport mechanism used in the Server and Netscape's Communications Server.
World Wide Web. various companies set up 3: Hypertext Mark-up Language (HTML): This
websites which are collection of web pages language is used for creating the documents
Web uses browsers like Internet Explorer or and webpages. it uses a variety of tags and
Google Chrome for accessing the web pages attributes which define the structure and layout
which are text files, created using HTML code. of the web document
Web pages may also contain JavaScript code 4: Uniform Resource Locater (URL): The Uniform
and other commands. Each web page may be a Resource Locator is a unique address assigned
union of text, pictures, audio clips, animations to a specific Website or web page. This is
and other data which can be electronically entered in the address bar of the browser to
presented. Web pages use hyperlinks for visit a particular site or page.
navigation on the web 5: Hypertext Transfer Language (HTTP): HTIP is
WWW Architecture the protocol which guides the working of the
The general architecture of the WWW is 2 web. This protocol decides how a message is
tiered. This architecture has a web client which formatted and transmitted over the internet. It
displays the information content and a web also takes the decision that what will be the
server which provides information to the client action of servers and browsers in response to
(when requested) the different commands
For e-commerce applications this architecture 6: CGI (Common Gateway Interface): CGI is a
works as basic. It develops software where standard for web server to transfer the web
functions are spread over the applications user's request to an application program and
server(where applications exist) data servers also transferring the received data back to the
(where data are stored) and collection of user. For example, when the user requests an
networked PCs (which are used by the URL. the server will immediately display the
information users) requested page. But when a user fills out a form
and submits it on a web page, it is processed by
an application program

You might also like