0% found this document useful (0 votes)
2 views

Lecture 1.1.4

The document outlines the course objectives and outcomes for a Bachelor of Engineering program in Computer Science & Engineering, focusing on Network Operating Systems. It covers key concepts such as TCP/IP connections, UDP characteristics, and routing protocols, including static and dynamic routing. Additionally, it provides references for further learning and contact information for queries.

Uploaded by

anilskoooo137
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Lecture 1.1.4

The document outlines the course objectives and outcomes for a Bachelor of Engineering program in Computer Science & Engineering, focusing on Network Operating Systems. It covers key concepts such as TCP/IP connections, UDP characteristics, and routing protocols, including static and dynamic routing. Additionally, it provides references for further learning and contact information for queries.

Uploaded by

anilskoooo137
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 24

UNIVERSITY INSTITUTE OF TECHNOLOGY

COMPUTER SCIENCE & ENGINEERING


Bachelor of Engineering (Computer Science & Engineering)
Network Operating System
22CSH-397
Dayal Chandra Sati (E13263)

ADDRESSING IP Routing DISCOVER . LEARN . EMPOWER


COURSE OBJECTIVES
The Course aims to:
1. Make students learn about basics of Networks and
Operating system concepts that will help them to
understand the requirements of Network Operating
System.

2. Make students learn about deployment of Network


Operating System’s roles and services.

3. Facilitate students in building analytical and creative


thinking so that they can move themselves in the field of
core server usage for social and technical reasons.
COURSE OUTCOMES
CO Title Level
Numbe
r
CO1 Students will recall basic concepts of Networks, Understand &
Operating System and to build up the basic concepts of Remember
Network Operating System.
CO2 Student would be able to deploy Server 2008/2012 and Implement
make use of it as a technical platform.
CO3 Students will prepare themselves for placements in Apply
Companies focusing on Networking and Server
environment and further being research oriented in the
field of Computer Networks.
CO4 analyze the working of virtual machines Analyze
3
CO5 Identify the role of active directory Analyze
Establishing a TCP Connection
A B
SYN

CK
SYN A

ACK
Data
Data

Three-way handshake to establish connection


Host A sends a SYN (open) to the host B
Host B returns a SYN acknowledgment (SYN ACK)
Host A sends an ACK to acknowledge the SYN ACK

4
Tearing Down the Connection
B

SYN A

FIN A
ACK

ACK
ACK
SYN

FIN
FIN
Data

C
CK

K
A
time

Closing the connection


Finish (FIN) to close and receive remaining bytes
And other host sends a FIN ACK to acknowledge
Reset (RST) to close and not receive remaining bytes

5
User Datagram Protocol (UDP)
Connectionless, unreliable
Alternative to TCP
end-to-end protocol
Not guaranteed delivery
No preservation of sequence
No protection against duplication or packet lost
Minimum overhead
No flow control-receiver may overflow with msgs.
Less complex, simple than TCP, Easy to implement
UDP header consumes less network overhead.

6
Why Would Anyone Use UDP?
• Finer control over what data is sent and when
As soon as an application process writes into the socket
… UDP will package the data and send the packet

• No delay for connection establishment


UDP just blasts away without any formal preliminaries
… which avoids introducing any unnecessary delays

• No connection state
No allocation of buffers, parameters, sequence #s, etc.
… making it easier to handle many active clients at once

• Small packet header overhead


UDP header is only eight-bytes long
7
TCP Vs UDP
Acronym for Transmission Control Protocol User Datagram Protocol or Universal Datagram Protocol
Connection TCP is a connection-oriented protocol. UDP is a connectionless protocol.
Function As a message makes its way across the internet UDP is also a protocol used in message transport or transfer. This is
frommm one computer to another. This is not connection based which means that one program can send a
connection based. load of packets to another and that would be the end of the
relationship.

Usage TCP is suited for applications that require high UDP is suitable for applications that need fast, efficient
reliability, and transmission time is relatively less transmission, such as games. UDP's stateless nature is also useful
critical. for servers that answer small queries from huge numbers of clients.

Use by other HTTP, HTTPs, FTP, SMTP, Telnet DNS, DHCP, TFTP, SNMP, RIP, VOIP.
protocols
Ordering of data TCP rearranges data packets in the order UDP has no inherent order as all packets are independent of each
packets specified. other. If ordering is required, it has to be managed by the
application layer.
Speed of transfer The speed for TCP is slower than UDP. UDP is faster because error recovery is not attempted. It is a "best
effort" protocol.
Reliability There is absolute guarantee that the data There is no guarantee that the messages or packets sent would
transferred remains intact and arrives in the same reach at all.
order in which it was sent.
Header Size TCP header size is 20 bytes UDP Header size is 8 bytes.

8
Common Header Fields Source port, Destination port, Check Sum Source port, Destination port, Check Sum
Streaming of data Data is read as a byte stream, no distinguishing Packets are sent individually and are checked for integrity only
indications are transmitted to signal message (segment) if they arrive. Packets have definite boundaries which are
boundaries. honored upon receipt, meaning a read operation at the receiver
socket will yield an entire message as it was originally sent.

Weight TCP is heavy-weight. TCP requires three packets to set UDP is lightweight. There is no ordering of messages, no
up a socket connection, before any user data can be tracking connections, etc. It is a small transport layer designed
sent. TCP handles reliability and congestion control. on top of IP.

Data Flow Control TCP does Flow Control. TCP requires three packets to UDP does not have an option for flow control
set up a socket connection, before any user data can be
sent. TCP handles reliability and congestion control.

Error Checking TCP does error checking and error recovery. Erroneous UDP does error checking but simply discards erroneous
packets are retransmitted from the source to the packets. Error recovery is not attempted.
destination.
Fields 1. Sequence Number, 2. AcK number, 3. Data offset, 4. 1. Length, 2. Source port, 3. Destination port, 4. Check Sum
Reserved, 5. Control bit, 6. Window, 7. Urgent Pointer
8. Options, 9. Padding, 10. Check Sum, 11. Source port,
12. Destination port

Acknowledgement Acknowledgement segments No Acknowledgment


Handshake SYN, SYN-ACK, ACK No handshake (connectionless protocol)

9
Routing Protocols
Interior and Exterior Routing

 An internet can be so large that one routing protocol cannot handle the task of updating routing table
of all routers

Thus, an internet is divided into autonomous systems (AS)


AS is a group of networks and routers under the authority of a single administration

Interior routing

•Routing inside an autonomous system


• Each AS can chose its own interior routing protocol
• Examples: RIP and OSPF

Exterior routing

•Routing between autonomous systems


•Only one exterior routing protocol is usually used for exterior routing
• Examples: BGP
10
11
Dynamic Vs Static Routing

12
13
14
IP ROUTING

STATIC ROUTING-MANUAL

DEFAULT ROUTING:

A default route is the route that takes effect when no other route is available for an IP destination
address.
Default Routing Configuration
Routing Table
IP Routing
A host or a router has a router table with an entry for each destination or a combination of
destinations to route IP packets.
Methods for populating a routing table:

• Ustatic routing- information entered manually by administrator, cannot update


automatically, can be used for small network

• Using dynamic routing-updated periodically by dynamic routing protocols RIP,OSPF.

General format of routing table.

21
22
REFERENCES

1. Reference Book: T1: Data Communications and Networking, Behrouz A. Forouzan, 5th Edition,
Tata Mcgraw Hill Publication.

2. Video Lecture on YouTube URL: https://www.youtube.com/watch?v=IfzGf4kI2a8

3. Relevant Web Link


https://www.javatpoint.com/network-addressing
https://www.javatpoint.com/tcp-vs-udp
https://en.wikipedia.org/wiki/IP_routing

23
THANK YOU

For queries
Email: [email protected]
24

You might also like