You are on page 1of 8

UNIT-V

Internet Protocols & Transport Protocol


Contents:
INTERNET PROTOCOLS: Principles of Internetworking, Internet Protocol Operation,
Internet Protocol, IPv6.

TRANSPORT PROTOCOLS: Connection-Oriented Transport Protocol Mechanisms, TCP,


UDP, Wireless Networks: Fixed Broadband Wireless Access, WiMAX/IEEE 802.16,
Bluetooth.

Introduction:
Internet protocol is the foundation of all internet-based protocols and internetworking
that is the set greater and standards which governs the internet environment are called internet
protocols.
Principles of internetworking:
The basic principles or the overall requirements of an internet working facility are as follows:
1. Provide a link between network that is with minimum physical length establish a
connection between the networks.
2. Provide the routing and delivery access between the different networks.
3. Provide an accounting service that keeps track of the use of various networks, routers
and state information of each.
4. The internetworking facility accommodates number of differences among the
networks these includes:
i. Different addressing schemes.
ii. Different maximum packet size.
iii. Different network access mechanisms.
iv. Different time constraints.
v. Different error recovery techniques.
vi. Status reporting
vii. Routing techniques etc.,

Internet Protocol Operation:

Fig(1): Example of Internet Protocol Operation


Note: LAPF – Appending frame relay
Internet protocol provides a connection less or datagram services between end
systems. There is no. of advantages to this approach such as
i. Connection less internet is flexible.
ii. Connection less internet service can be made highly robust.
iii. It is best for connection less transport protocol.
The fig (1) above shows typical example using IP in which two LANs are
interconnected by a frame relay WAN.
The data transmitted by end system “A” must pass through the router “Y” before reaching
the detrition. So, router “X” constructs a new frame by appending a frame relay LAPF.
With the Internet Protocol approach, each unit of data is passed from router to router in an
attempt to get from source to destination. Because delivery is not guaranteed, there is no
particular reliability requirement on any of the networks. Thus, the protocol will work with
any combination of network types. Because the sequence of delivery is not guaranteed,
successive data units can follow different paths through the internet. This allows the protocol
to react to both congestion and failure in the internet by changing routes.

The operation of IP controlled internet is depending on the design issues such as routing,
datagram lifetime, fragmentation and re-assembly, error control and flow control.

Internet Protocol:
Internet protocol is a part of TCP/TP protocol suite and it is the most widely used
internetworking protocol. Internet protocol is specified in two aspects.

1. The interface with higher layer (that is to specify the services that provides).
2. The actual protocol format and mechanisms.
The Parameters associated with primitives of IP are as follows (for both transmission and
reception).
• Source address: Internetwork address of sending IP entity.
• Destination address: Internetwork address of destination IP entity.
• Protocol: Recipient protocol entity (an IP user, such as TCP).
• Type-of-service indicators: Used to specify the treatment of the data unit in its
transmission through component networks.
• Identification: Used in combination with the source and destination addresses and
user protocol to identify the data unit uniquely. This parameter is needed for
reassembly and error reporting.
• Don’t fragment identifier: Indicates whether IP can fragment data to accomplish
delivery.
• Time to live: Measured in seconds.
• Data length: Length of data being transmitted.
• Option data: Options requested by the IP user.
• Data: User data to be transmitted.
The identification, don’t fragment identifier, and time to live parameters are present in
the Send primitive but not in the Deliver primitive. These three parameters provide
instructions to IP that are not of concern to the recipient IP user.
The options parameter allows for future extensibility and for inclusion of parameters
that are usually not invoked. The currently defined options are as follows:

• Security: Allows a security label to be attached to a datagram.


• Source routing: A sequenced list of router addresses that specifies the route to be
followed. Routing may be strict (only identified routers may be visited) or loose
(other intermediate routers may be visited).
• Route recording: A field is allocated to record the sequence of routers visited by the
datagram.
• Stream identification: Names reserved resources used for stream service. This
service provides special handling for volatile periodic traffic (e.g., voice).
• Timestamping: The source IP entity and some or all intermediate routers add a
timestamp (precision to milliseconds) to the data unit as it goes by.

Transport Protocol:
The transport protocol provides services to transport service users (TS users) such as
FTP, SMTP, TELNET.
That is the local transport entity communicates with some remote transport entity
using the services of some lower layer such as IP.

Connection Oriented Transport Control Mechanisms:


Transport Control Protocols

Connection Oriented Connection Less Transport


Transport Protocol protocols (or) Datagram Services

Reliable sequencing Variable n/w


Network service service

Reliable Sequencing Network Service:


Let us assume that the network service accepts messages of arbitrary length and, with
virtually 100% reliability, delivers them in sequence to the destination. Examples of such
networks are as follows:

• A highly reliable packet-switching network with an X.25 interface


• A frame relay network using the LAPF control protocol
• An IEEE 802.3 LAN using the connection-oriented LLC service

In all of these cases, the transport protocol is used as an end-to-end protocol between
two systems attached to the same network, rather than across an internet.
The assumption of a reliable sequencing networking service allows the use of a quite
simple transport protocol. Four issues need to be addressed:
• Addressing
• Multiplexing
• Flow control
• Connection establishment/termination

Unreliable Network Service:


A more difficult case for a transport protocol is that of an unreliable network service.
Examples of such networks are as follows:
• An internetwork using IP
• A frame relay network using only the LAPF core protocol.
• An IEEE 802.3 LAN using the unacknowledged connectionless LLC service.
The problem is not just that segments are occasionally lost, but that segments may arrive out
of sequence due to variable transit delays. As we shall see, elaborate machinery is required to
cope with these two interrelated network deficiencies. We shall also see that a discouraging
pattern emerges. The combination of unreliability and non-sequencing creates problems with
every mechanism we have discussed so far. Generally, the solution to each problem raises
new problems. Although there are problems to be overcome for protocols at all levels, it
seems that there are more difficulties with a reliable connection-oriented transport protocol
than any other sort of protocol. In the remainder of this section, unless otherwise noted, the
mechanisms discussed are those used by TCP. Seven issues need to be addressed:
• Ordered delivery
• Retransmission strategy
• Duplicate detection
• Flow control
• Connection establishment
• Connection termination
• Failure recovery

TCP:
TCP is designed to provide reliable communication between pairs of processes (TCP
users) across a variety of reliable and unreliable networks and internets. TCP provides two
useful facilities for labelling data: push and urgent:
• Data stream push: Ordinarily, TCP decides when sufficient data have accumulated to
form a segment for transmission. The TCP user can require TCP to transmit all
outstanding data up to and including that labelled with a push flag. On the receiving
end, TCP will deliver these data to the user in the same manner. A user might request
this if it has come to a logical break in the data.
• Urgent data signalling: This provides a means of informing the destination TCP user
that significant or “urgent” data is in the upcoming data stream. It is up to the
destination user to determine appropriate action.
TCP Implementation policy options:

Four implementation polices are

i. Senator delivering policy


ii. Accept policy
iii. Re-Transmission policy
iv. Acknowledge policy

UDP:
The UDP protocol specified in RFC 768. It provides connection less service for
application-level procedures. UDP is basically unreliable service.

The functionality of UDP involves in

1. Inward data collection


2. Outward data derivation
3. Request response
4. Real time application.

Wireless network: Fixed Broadband Wireless Access:

House

Wire link

Office
Switching Center Base Station Antenna

Govt. Agency
The greatest development in the field of communication is the wireless local loop
(WLL) or Fixed wireless access are developed. The most prominent fixed broadband wireless
access is referred to as wetware.
The above fig (1) shows simple fixed broadband wireless access configuration which
can provide service to one or more cells.
Switching Center: It is typically a telephone company local office which provides
connections to local and long-distance telephone networks. It is connected to the base station
by highspeed wired link.

Base Station: It is connected to the no. of sub-ordinate base station antennas, each of which
provides services to no. of subscribers such as direct to home, privately owned office and
government agencies.

Advantages of Broadband Wireless Access:


1. Cost: Wireless systems are less expensive than wired systems.
2. Installation Time: Broadband wireless access systems can rapidly installed.
3. Selective Installation: Radio units are installed only for those subscribers who want to
the service at a given time.

WiMAX / IEEE 802.16:

Fig (1): Elements of the WiMAX N/W Reference Model

Broadband wireless access services are standardized by IEEE802.16. It is the standard


WiMAX developed in the year 1999 with the following standard services.
1. Use wireless link between microwave and millimetre wave radios.
2. Use licensed spectrum.
3. These are used in the scale of metropolitan.
4. Provide public network service through free and paying customers.
Note: WiMAX can provide more quality of service with the speed of greater than 2mbps.

Access Service Network (ASN):


The set of network functions needed to provide radio access to WiMAX subscribers.

Network Access Provider (NAP):


NAP provides WiMAX radio access to one or more network service providers.

Connectivity Service Network (CSN):


Set of Network functions that provide IP connectivity to WiMAX subscribers. Its
functions include Internet access, Authentication.

Network Service Provider (NSP):


It is a business entity that provides IP connectivity WiMAX services to the
subscribers.

ASN Gateway:
It provides connectivity between ASN and NSP, it includes the functions such as
routing and load balancing.
The fig (2) shows standard protocol architecture of IEEE 802.16 WiMAX.

Bluetooth:
Bluetooth was developed by Bluetooth special internet group and this group get a
patent on the year 2009. At that time 920 million users utilizing the services. It is
standardized by the committee as IEEE 802.15.01. It is used to provide universal short range
wireless capability by the use of 2.4 GHz band.
It is available globally for unlicensed low power users. The distance between two
Bluetooth devices is about 10 meters with the speed of 720kbps.
Bluetooth Applications:
1. Make calls from wireless headset connected to a cell phone.
2. Wireless linking between computer and printer.
3. MP3 player wirelessly connected to the downloaded.
4. Wireless connection to monitor air conditioner, microwave oven etc.,
Bluetooth Protocol Stack:
LMP – Liok Manager protocol
L2CAP – Logical Link Control and Adaptation Protocol
RFComm – Radio Frequency Communication Control
Vcard/Vcall – Virtual Card/Virtual Calendar
OBEX – Object Exchange Protocol
WAE – Wireless Application Environment
WAP – Wireless Application Protocol
PPP – Point to Point Protocol
AT Command – Attention Sequence Commands
SDP – Service Discovery Protocol

You might also like