CCN-NEP-C5-The Transport and Application Layer
CCN-NEP-C5-The Transport and Application Layer
• Flow Control:
Flow control is used to prevent the sender from overloading at the receiver. If the receiver
is overloaded with too much data, then the receiver discards the packets and asking for
the retransmission of packets. This increases network congestion and thus, reducing the
system performance. The transport layer uses the sliding window protocol that makes
the data transmission more efficient and flow control of data so that the receiver does
not become overloaded.
• Addressing:
The transport layer provides the user address which is specified as a statio n or port. The
port variable represents a particular Transport Service user of a specified station known
as a Transport Service access point (TSAP). Each station has only one transport entity.
The transport layer protocols need to know which upper-layer protocols are
communicating.
Where,
Source port address: It defines the address of the application process that has delivered
a message. The source port address is of 16 bits address.
Destination port address: It defines the address of the application process that will
receive the message. The destination port address is of a 16-bit address.
Total length: It defines the total length of the user datagram in bytes. It is a 16-bit field.
Checksum: The checksum is a 16-bit field which is used in error detection.
TCP
TCP stands for Transmission Control Protocol. It provides full transport layer services to
applications. It is a connection-oriented protocol means the connection established
between both the ends of the transmission. For creating the connection, TCP generates
a virtual circuit between sender and receiver for the duration of a transmission.
Where,
Source port address: It is used to define the address of the application program in a
source computer. It is a 16-bit field.
Destination port address: It is used to define the address of the application program in a
destination computer. It is a 16-bit field.
Sequence number: A stream of data is divided into two or more TCP segments. The 32-
bit sequence number field represents the position of the data in an original data stream.
Acknowledgement number: A 32-field acknowledgement number acknowledge the data
from other communicating devices. If ACK field is set to 1 , then it specifies the sequence
number that the receiver is expecting to receive.
Header Length (HLEN): It specifies the size of the TCP header. The minimum size of the
header is 5 words, and the maximum size of the header is 15 words . Therefore, the
maximum size of the TCP header is 60 bytes , and the minimum size of the TCP header is
20 bytes.
Reserved: It is a six-bit field which is reserved for future use.
Control bits: Each bit of a control field functions individually and independently. A control
bit defines the use of a segment or serves as a validity check for other fields
Basis
TCP UDP
for Comparison
It is a Connection-Oriented
Connection Type It is a Connectionless protocol
protocol
• DNS is a directory service that provides a mapping between the name of a host on
the network and its numerical address.
• DNS is required for the functioning of the internet.
• Each node in a tree has a domain name, and a full domain name is a sequence of
symbols specified by dots.
• DNS is a service that translates the domain name into IP addresses. This allows
the users of networks to utilize user-friendly names when looking for other hosts
instead of remembering the IP addresses.
• For example, suppose the FTP site at EduSoft had an IP address of
132.147.165.50, most people would reach this site by specifying ftp.EduSoft.com.
Therefore, the domain name is more reliable than IP address.
• The domain name space is divided into three different sections: generic
domains, country domains, and inverse domain.
Generic Domains
• It defines the registered hosts according to their generic behavior.
• Each node in a tree defines the domain name, which is an index to the DNS
database.
It uses three-character labels, and these labels describe the organization type.
Label Description
Country Domain
The format of country domain is same as a generic domain, but it uses two -character
country abbreviations (e.g., us for the United States) in place of three character
organizational abbreviations.
Inverse Domain
The inverse domain is used for mapping an address to a name.
When the server has received a request from the client, and the server contains the
files of only authorized clients.
To determine whether the client is on the authorized list or not, it sends a query to
the DNS server and ask for mapping an address to the name.
Working of DNS
• DNS is a client/server network communication protocol. DNS clients send
requests to the server while DNS servers send responses to the client.
• Client requests contain a name which is converted into an IP address known as a
forward DNS lookup while requests containing an IP address which is converted
into a name known as reverse DNS lookups.
• DNS implements a distributed database to store the name of all the hosts
available on the internet.
• If a client like a web browser sends a request containing a hostname, then a piece
of software such as DNS resolver sends a request to the DNS server to obtain the
IP address of a hostname. If DNS server does not contain the IP address
associated with a hostname, then it forwards the request to another DNS server.
If IP address has arrived at the resolver, which in turn completes the request over
the internet protocol.
Electronic mail:
Electronic mail, commonly known as email, is a method of exchanging messages over
the internet.
Basics of email:
An email address: This is a unique identifier for each user, typically in the format of
name@domain.com.
An email client: This is a software program used to send, receive and manage emails,
such as Gmail, Outlook, or Apple Mail.
An email server: This is a computer system responsible for storing and forwarding emails
to their intended recipients.
To send an email:
• Compose a new message in your email client.
• Enter the recipient’s email address in the “To” field.
• Add a subject line to summarize the content of the message.
• Write the body of the message.
• Attach any relevant files if needed.
• Click “Send” to deliver the message to the recipient’s email server.
• Emails can also include features such as cc (carbon copy) and bcc (blind carbon
copy) to send copies of the message to multiple recipients, and reply, reply all, and
forward options to manage the conversation.
Components of E-Mail System :
1. User Agent (UA),
2. Message Transfer Agent (MTA),
3. Mail Box
4. Spool file.
User Agent (UA) :
• The UA is normally a program which is used to send and receive mail.
• Sometimes, it is called as mail reader.
• It accepts variety of commands for composing, receiving and replying to
messages as well as for manipulation of the mailboxes.
Message Transfer Agent (MTA) :
• MTA is actually responsible for transfer of mail from one system to another.
• To send a mail, a system must have client MTA and system MTA.
• It transfers mail to mailboxes of recipients if they are connected in the same
machine.
• It delivers mail to peer MTA if destination mailbox is in another machine.
• The delivery from one MTA to another MTA is done by Simple Mail Transfer
Protocol.
Mailbox :
• It is a file on local hard drive to collect mails.
• Delivered mails are present in this file.
• The user can read it delete it according to his/her requirement.
• To use e-mail system each user must have a mailbox .
• Access to mailbox is only to owner of mailbox.
Spool file :
• This file contains mails that are to be sent.
• User agent appends outgoing mails in this file using SMTP.
• MTA extracts pending mail from spool file for their delivery.
Architecture of WWW
The WWW is mainly a distributed client/server service where a client using the browser
can access the service using a server. The Service that is provided is distributed over
many different locations commonly known as sites/websites.
Each website holds one or more documents that are generally referred to as web pages.
Where each web page contains a link to other pages on the same site or at other sites.
These pages can be retrieved and viewed by using browsers.
• In the above case, the client sends some information that belongs to site A.
• It generally sends a request through its browser (It is a program that is used to fetch
the documents on the web) and also the request generally contains other information
like the address of the site, web page(URL).
• The server at site A finds the document then sends it to the client.
• After that when the user or say the client finds the reference to another document
that includes the web page at site B.
• The reference generally contains the URL of site B.
• And the client is interested to take a look at this document too.
• Then after the client sends the request to the new site and then the new page is
retrieved.
Components of WWW
Client/Browser
The Client/Web browser is basically a program that is used to communicate with the
webserver on the Internet.
• Each browser mainly comprises of three components and these are:
• Controller
• Interpreter
• Client Protocols
• The Controller mainly receives the input from the input device, after that it uses
the client programs in order to access the documents.
• After accessing the document, the controller makes use of an interpreter in order
to display the document on the screen.
• An interpreter can be Java, HTML, javascript mainly depending upon the type of
the document.
• The Client protocol can be FTP, HTTP, TELNET.
Server
The Computer that is mainly available for the network resources and in order to provide
services to the other computer upon request is generally known as the server.
The Web pages are mainly stored on the server.
Whenever the request of the client arrives then the corresponding document is sent to
the client.
The connection between the client and the server is TCP.
It can become more efficient through multithreading or multiprocessing. Because in this
case, the server can answer more than one request at a time.
URL
• URL is an abbreviation of the Uniform resource locator.
• It is basically a standard used for specifying any kind of information on the
Internet.
• In order to access any page, the client generally needs an address.
• To facilitate the access of the documents throughout the world HTTP generally
makes use of Locators.
URL mainly defines the four things:
• Port -The URL can optionally contain the port number of the server. If the port
number is included then it is generally inserted in between the host and path and is
generally separated from the host by the colon.
• Path- It indicates the pathname of the file where the information is located.
HTML
• HTML is an abbreviation of Hypertext Markup Language.
• It is generally used for creating web pages.
• It is mainly used to define the contents, structure, and organization of the web page.
XML
• XML is an abbreviation of Extensible Markup Language.
• It mainly helps in order to define the common syntax in the semantic web.
Features of WWW
• Provides a system for Hypertext information
• Open standards and Open source
• Distributed.
• Mainly makes the use of Web Browser in order to provide a single interface for many
services.
• Dynamic
• Interactive
• Cross-Platform
Advantages of WWW
• It mainly provides all the information for Free.
• Provides rapid Interactive way of Communication.
• It is accessible from anywhere.
• It has become the Global source of media.
• It mainly facilitates the exchange of a huge volume of data.
Disadvantages of WWW
• It is difficult to prioritize and filter some information.
• There is no guarantee of finding what one person is looking for.
• There occurs some danger in case of overload of Information.
• There is no quality control over the available data.
• There is no regulation.