0% found this document useful (0 votes)
0 views

TCP IP Layers and Protocols

The document outlines various application layer protocols, including SMTP for email transmission, Telnet for remote logins, FTP and TFTP for file transfers, SNMP for network management, and HTTP/HTTPS for web communication. It also discusses DNS for hostname resolution and DHCP for dynamic IP address assignment. Additionally, it covers transport layer protocols like TCP and UDP, and network layer protocols such as IP and ICMP, detailing their functions and characteristics.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
0 views

TCP IP Layers and Protocols

The document outlines various application layer protocols, including SMTP for email transmission, Telnet for remote logins, FTP and TFTP for file transfers, SNMP for network management, and HTTP/HTTPS for web communication. It also discusses DNS for hostname resolution and DHCP for dynamic IP address assignment. Additionally, it covers transport layer protocols like TCP and UDP, and network layer protocols such as IP and ICMP, detailing their functions and characteristics.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 39

Some of application layer

protocols and their functions

32 Compiled by Asado Sh 12/14/2024


Application layer protocol- Simple Mail
Transfer Protocol (SMTP)
 Governs the transmission of mail messages and attachments
 SMTP is used in the case of outgoing messages
 More powerful protocols such as POP3 and IMAP4 are needed and
available to manage incoming messages
 POP3(Post Office Protocol version 3) is the older protocol
 IMAP4(Internet Mail Access Protocol version 4) is the more
advanced protocol

33 Compiled by Asado Sh 12/14/2024


Application layer protocol- Telnet
 Telnet is a protocol used to log on to remote hosts using the
TCP/IP protocol suite.
 Using Telnet, a TCP connection is established and keystrokes on
the user’s machine act like keystrokes on the remotely connected
machine.
 Often, Telnet is used to connect two dissimilar systems (such as
PCs and UNIX machines).
 Through Telnet, you can control a remote host over LANs and
WANs such as the Internet.
 For example, network managers can use Telnet to log on to a
router from a computer elsewhere on their LAN and modify the
router’s configuration.
34 Compiled by Asado Sh 12/14/2024
Application layer protocol- File Transfer
Protocol (FTP)
 File Transfer Protocol (FTP) lets us transfer files, and it can
accomplish this between any two machines using it.
 But accessing a host through FTP is only the first step.
 Users must then be subjected to an authentication login that’s
usually secured with passwords and usernames
implemented by system administrators to restrict access.
 FTP’s functions are limited to listing and manipulating
directories, typing file contents, and copying files
between hosts.

35 Compiled by Asado Sh 12/14/2024


36 Compiled by Asado Sh 12/14/2024
37 Compiled by Asado Sh 12/14/2024
Trivial File Transfer Protocol (TFTP)
 Trivial File Transfer Protocol (TFTP) is stock version of FTP, but
it’s the protocol of choice if you know exactly what you want and
where to find it because it’s fast and so easy to use!
 But TFTP doesn’t offer the abundance of functions that FTP does
because it has no directory-browsing abilities, meaning that
it can only send and receive files

 There’s no authentication as with FTP, so it’s even more


insecure, and few sites support it because of the inherent security
risks.
 A significant difference between FTP and TFTP is that TFTP relies
on UDP at the Transport layer, but FTP uses TCP protocol.
38 Compiled by Asado Sh 12/14/2024
Simple Network Management Protocol
(SNMP)
 Simple Network Management Protocol (SNMP) collects and
manipulates valuable network information.
 It gathers data from a network management station (NMS) at fixed
or random intervals, requiring them to disclose certain
information, or even asking for certain information from the
device.
 In addition, network devices can inform the NMS about
problems as they occur so the network administrator is
alerted.

39 Compiled by Asado Sh 12/14/2024


SNMP

40 Compiled by Asado Sh 12/14/2024


Hypertext Transfer Protocol (HTTP)
 It’s used to manage communications between web browsers
and web servers and opens the right resource when you
click a link, wherever that resource may actually reside.
 In order for a browser to display a web page, it must find the
exact server that has the right web page, plus the exact details
that identify the information requested.
 The browser can understand what you need when you enter a
Uniform Resource Locator (URL), which we usually refer to as a
web address, e.g. http://www.lammle.com/forum and
http://www.lammle.com/blog.
 Each URL defines the protocol used to transfer data, the name of
the server, and the particular web page on that server.

41 Compiled by Asado Sh 12/14/2024


42 Compiled by Asado Sh 12/14/2024
Hypertext Transfer Protocol Secure
(HTTPS)
 Hypertext Transfer Protocol Secure (HTTPS) is also known as
Secure Hypertext Transfer Protocol.
 It uses Secure Sockets Layer (SSL).
 Sometimes you’ll see it referred to as SHTTP or S-HTTP, which
were slightly different protocols, but since Microsoft supported
HTTPS, it became the de facto standard for securing web
communication.
 But no matter-as indicated, it’s a secure version of HTTP that arms
you with a whole bunch of security tools for keeping
transactions between a web browser and a server secure.
43 Compiled by Asado Sh 12/14/2024
Domain Name Service (DNS)
 The Domain Name System (DNS) is a directory lookup service
that provides a mapping between the name of a host on the
Internet and its numerical address.
 Domain Name Service (DNS)-resolves hostnames- to IP addresses
specifically, Internet names, such as www.hu.edu.et
 But you don’t have to actually use DNS. You just type in the IP
address of any device you want to communicate with and find the
IP address of a URL by using the Ping program.

For example, >ping www.cisco.com will return the IP address


resolved by DNS.

44 Compiled by Asado Sh 12/14/2024


Domain Name System (DNS)
Resolves domain names to IP addresses and vice versa
•An IP address identifies hosts on a network and the Internet as
well, but DNS was designed to make our lives easier.
•The IP address would change and no one would know
what the new one was.
•DNS allows you to use a domain name to specify an IP
address.

www.hu.edu.et DNS Server 10.1.0.15

45 Compiled by Asado Sh 12/14/2024


Domain Name
 A domain name is represented by a series of character
strings, called labels, separated by dots.
 Each label represents a level in the domain naming
hierarchy.
 E.g In the domain name www.google.com, com is the
top-level domain (TLD), google is the second-level
domain, and www is the third-level domain.
 Each second-level domain can contain multiple third level
domains.
 E.g In addition to www.google.com, Google also owns
the following domains: news.google.com,
46 maps.google.com,
Compiled by Asado Sh and mail.google.com. 12/14/2024
DNS cont’d…
 The very last section of the domain is called its top-level
domain (TLD) name

15-47 Compiled by Asado Sh 12/14/2024


Top-level domains, including some relatively new ones
48 Compiled by Asado Sh 12/14/2024
Dynamic Host Configuration Protocol
(DHCP)
 Dynamic Host Configuration Protocol (DHCP) assigns IP
addresses to hosts dynamically.
 It allows for easier administration and works well in small to very
large network environments.
 Many types of hardware can be used as a DHCP server, including a
Cisco router.
 A DHCP address conflict occurs when two hosts use the
same IP address.This sounds bad, and it is!

49 Compiled by Asado Sh 12/14/2024


 A lot of information a DHCP server can provide to a host when
the host is requesting an IP address from the DHCP server.
 Here’s a list of the most common types of information a DHCP
server can provide:
 IP address
 Subnet mask
 Domain name
 Default gateway (routers)
 DNS server address

50 Compiled by Asado Sh 12/14/2024


This is the four-step process a client takes to receive an IP address
from a DHCP server:
1. The DHCP client broadcasts a DHCP Discover
message looking for a DHCP server (Port 67).
2. The DHCP server that received the DHCP Discover message
sends a layer 2 unicast DHCP Offer message back to the host.
3. The client then broadcasts to the server a DHCP Request
message asking for the offered IP address and possibly other
information.
4. The server finalizes the exchange with a unicast DHCP
Acknowledgment message.
Etc….

51 Compiled by Asado Sh 12/14/2024


Some of Transport layer
protocols and their functions

52 Compiled by Asado Sh 12/14/2024


TCP(Transmission Control Protocol)
 TCP: takes large blocks of information from an application and
breaks them into segments.
 It numbers and sequences each segment to keep the order
the application intended.
 After these segments are sent on the transmitting host, TCP
waits for an acknowledgment of the receiving end’s.
 Retransmitting any segments that aren’t acknowledged.
 It is Connection oriented means that a virtual connection is
established before any user data is transferred.

53 Compiled by Asado Sh 12/14/2024


TCP cont’d..
 TCP can also recognize duplicate messages and will
discard them appropriately.
 If the sending computer is transmitting too fast for the
receiving computer, TCP can employ flow control
mechanisms to slow data transfer.
 TCP can also communicates delivery information to the upper-
layer protocols and applications it supports.
 All these characteristics makes TCP an end-to-end reliable
transport protocol.

54 Compiled by Asado Sh 12/14/2024


TCP SEGMENT FORMAT

15-55 Compiled by Asado Sh 12/14/2024


Some of fields in TCP segment
 Source port : This is the port number of the application on the
host sending the data.
 Destination port: This is the port number of the application
requested on the destination host.
 Sequence number: A number used by TCP that puts the data
back in the correct order or retransmits missing or
damaged data during a process called sequencing.
 Acknowledgment number: The value is the TCP octet that is
expected next.

56 Compiled by Asado Sh 12/14/2024


Cont’d…
 Header length: The number of 32-bit words in the TCP header,
which indicates where the data begins.
 Reserved: for future use, Always set to zero.
 Code bits/flags: Controls functions used to set up and terminate a
session.
-it used to determine segment purpose, e.g. SYN, ACK
 Window: is window size the sender willing to accept, in octets.
 Checksum: The cyclic redundancy check (CRC), used because TCP
doesn’t trust the lower layers and checks everything.
The CRC checks the header and data fields

-TCP keeps check that if bytes are damaged, through checksum.


Etc….

57 Compiled by Asado Sh 12/14/2024


User Datagram Protocol (UDP)
 User Datagram Protocol (UDP) is basically the scaled-down
economy model of TCP, which is why UDP is sometimes referred to
as a thin protocol.
 Like a thin person , a thin protocol doesn’t take up a lot of room—
or in this case, require much bandwidth on a network.
 UDP does not sequence the segments and does not care
about the order in which the segments arrive at the destination.
 UDP just sends the segments off and forgets about them.

58 Compiled by Asado Sh 12/14/2024


UDP cont’d…
 It doesn’t follow segments, check up on them, or even allow
for an acknowledgment of safe arrival. Because of this, it’s referred
to as an unreliable protocol.
 This does not mean that UDP is ineffective, only that it
doesn’t deal with reliability issues at all.
 Furthermore, UDP doesn’t create a virtual circuit or
doesn’t contact the destination before delivering information to
it.
- Because of this, it’s also considered a connectionless protocol.

59 Compiled by Asado Sh 12/14/2024


UDP cont’d…
NOTE:
 Since UDP assumes that the application will use its own
reliability method, it doesn’t use any itself.
 This presents an application developer with a choice when
running the Internet Protocol stack: TCP for reliability or
UDP for faster transfers.
 TCP sequences the segments so they get put back together in
exactly the right order, which is something UDP just can’t
do.

60 Compiled by Asado Sh 12/14/2024


UDP in short
 Minimum overhead.
 Used to send short messages.
 Not reliable as TCP (out of order, missing datagram, duplicate
datagram).
 Lack of flow control and error control
 Faster and efficient
 Communication takes place using ports.
 Header contains following information:
 Source port number (16 bits)
 Destination port number (16 bits)
 Total length(16 bits)
 checksum(16 bits)

61 Compiled by Asado Sh 12/14/2024


62 Compiled by Asado Sh 12/14/2024
63 Compiled by Asado Sh 12/14/2024
Some of Internet or Network layer
protocols and their functions

64 Compiled by Asado Sh 12/14/2024


Internet Protocol (IP) (Layer 3 protocol)
 Used for data communication in packet switched network
 Unreliable and connectionless (no specific path)
 Unreliable
 Data corruption
 Packet lost
 Out of order
 Packet called Datagram
 Internetworking computers
 Internet Protocol versions: IPv4, IPv6

65 Compiled by Asado Sh 12/14/2024


IP

66 Compiled by Asado Sh 12/14/2024


Cont’d…
 Source & destination IP address (32 bits each): contain IP
address of sender and intended recipient.
 Options (variable length): Mainly used to record a route, or
timestamps, or specify routing.
 Identification: copied into fragment, allows destination to
know which fragments belong to which datagram
 Fragment Offset (12 bits): specifies the offset in the original
datagram of the data being carried in the fragment
 Measured in units of 8 bytes starting at 0
 Flags (3 bits): control fragmentation

67 Compiled by Asado Sh 12/14/2024


ICMP (Internet Control Message Protocol)(Layer 3)
 Used to report errors with delivery of IP data.
 E.g. if particular service or host not reachable or to check
routers are correctly routing .
 Ping tool uses ICMP to check host is reachable and how long it
takes to reach.
 ICMP message is delivered in IP packet.
 Error reporting not error correction.
 Two types of messages
 Error reporting message
 Problems with router or host e.g. destination unreachable, time exceeded,
parameters problem
 Query message
68 Compiled by Asado Sh 12/14/2024
 Help in getting specific information. e.g. neighbors
ICMP Errors
 Network Errors:
 Host or network unreachable
 Network congestion message:
 When router buffers too many packets, and don’t process
with same speed as received, generates source quench
message.Too many messages results congestion.
 Time exceed
 ICMP timeout message is generated when host is
unreachable.

69 Compiled by Asado Sh 12/14/2024


IGMP Layer 3
 Internet Group Management Protocol
 IGMP-is used to facilitate the simultaneous
transmission of a message to a group of recipients.
 Protocol that manages group membership.
 Provides information to multicast routers about the
membership status of hosts.
 Routers use IGMP to determine which hosts belong to a
multicast group
 Hosts use IGMP to join or leave a multicast group.

70 Compiled by Asado Sh 12/14/2024

You might also like