Blog picture

Guest Faculty

Blog image VIKASH RANJAN Shared publicly - Apr 7 2020 6:33PM

mca 4 TCP/IP MODEL


 

TCP/IP Reference Model
The TCP/IP model does not same as OSI model. There is no universal agreement regarding how to define TCP/IP with a layered model but it is generally agreed that there are fewer layers than the seven layers of the OSI model.
TCP/IP model define 4 layers that are as follows:

1) The Host to Network Layer:
Below the internet layer is great void. The TCP/IP reference model does not really say much about what happens here, except to point out that the host has connect to the network using some protocol so it can transmit IP packets over it. This protocol is not specified and varies from host to host and network to network

2) Internet layer: 
Packet switching network depends upon a connectionless internetwork layer. This layer is known as internet layer, is the linchpin that holds the whole design together.

Its job is to allow hosts to insert packets into any network and have them to deliver independently to the destination. They may appear in a different order than they were sent in each case it is a job of higher layers to rearrange them in order to deliver them to proper destination.

The internet layer specifies an official packet format and protocol known as internet protocol. The job of internet layer is to transport IP packets to appropriate destination. Packet routing is very essential task in order to avoid congestion. For these reason it is said that TCP/IP internet layer perform same function as that of OSI network layer.

3) Transport layer: 
In the TCP/IP model, the layer above the internet layer is known as transport layer. It is developed to permit entities on the source and destination hosts to carry on a conversation. It specifies 2 end-to-end protocols 
1)TCP (Transmission Control Protocol) 
2)UDP (User Datagram Protocol)

i) TCP
It is a reliable connection-oriented protocol that permits a byte stream originating on one machine to be transported without error on any machine in the internet. It divides the incoming byte stream into discrete message and passes each one onto the internet layer. At the destination, the receiving TCP process collects the received message into the output stream. TCP deals with flow control to make sure a fast sender cannot swamp a slow receiver with more message than it can handle.

 ii) UDP 

It is an unreliable, connectionless protocol for applications that do not want TCP's sequencing on flow control and wish to offer their own. It is also used for client-server type request-reply queries and applications in which prompt delivery is more important than accurate delivery such as transmitting speech or video.



 

4) Application Layer: 
In TCP/IP model, session or presentation layer are not present. Application layer is present on the top of the Transport layer. It includes all the higher-level protocols which are virtual terminal (TELNET), file transfer (FTP) and electronic mail (SMTP).

The virtual terminal protocol permits a user on one machine to log into a distant machine and work there. The file transfer protocol offers a way to move data efficiently from one machine to another. Electronic mail was used for file transfer purpose but later a specialized protocol was developed for it.

File Transfer Protocol (FTP) It was designed to permit reliable transfer of files over different platforms.  FTP offers simple commands and makes the differences in storage methods across networks transparent to the user. The FTP client is able to interact with any FTP server; therefore the FTP server must also be able to interact with any FTP client. FTP does not offer a user interface, but it does offer an application program interface for file transfer. The client part of the protocol is called FTP and the server part of the protocol is known as FTPd. The suffix "d" means Daemon this is a legacy from UNIX computing where a daemon is a piece of software running on a server that offers a service.

Hyper Text Transfer Protocol (HTTP)
HTTP permits applications such as browsers to upload and download web pages. It makes use of TCP at the transport layer again to check reliability. HTTP is a connectionless protocol that sends a request, receives a response and then disconnects the connection. HTTP delivers HTML documents plus all the other components supported within HTML such as JavaScript, Visual script and applets.

A Hypertext Transfer Protocol (HTTP) client is also called a web browser (Mozilla FireFox, Internet Explorer, Google chrome etc.) Hypertext Transfer Protocol (HTTP) operates on a request-response model. A browser sends a request to a server for a file, and the server responds with the requested file if it is available.

Hypertext Transfer Protocol (HTTP) messages are English-based and flexible. 

Simple Mail Transfer Protocol (SMTP)
By using TCP, SMTP sends email to other computers that support the TCP/IP protocol suite. It supervises the email sending from the local mail host to a remote mail host. It is not reliable for accepting mail    from local users or distributing received mail to recipients this is the responsibility of the local mail system. 

SMTP makes use of TCP to establish a connection to the remote mail host, the mail is sent, any waiting mail is requested and then the connection is disconnected. It can also return a forwarding address if the intended recipient no longer receives email at that destination. To enable mail to be delivered across differing systems, a mail gateway is used. 
An electronic mail (e-mail) allows users to send mails across an internet. E-mail is one of the most widely used application services in internet and widely used in business activities. Currently, the electronic mail (e-mail) standard for the Internet is Simple Mail Transport Protocol (SMTP). SMTP is the Application Level protocol that handles message services over TCP/IP networks.

Simple Network Management Protocol (SNMP)
For the transport of network management information, SNMP is used as standardized protocol. Managed network devices can be cross-examined by a computer running to return details about their status and level of activity. Observing software can also trigger alarms if certain performance criteria drop below acceptable restrictions. At the transport layer SNMP protocol uses UDP. The use of UDP results in decreasing network traffic overheads. 

The SNMP Protocol has two sides, the agent and the management stations. The agent sends data about itself to the management station. The management station collects data from all the agents on the network. The protocol is not identical on each side.

The agent sends alerts called traps and answers requests that were sent by the management station. The management station catches and decodes the traps. The management station also

requests specific information from the agent. The agent is a server, router, printer, bridge or workstations.

Dynamic Host Configuration Protocol (DHCP)

Dynamic Host Configuration Protocol (DHCP) is used to dynamically (automatically) assign TCP/IP configuration parameters to network devices (IP addressSubnet Mask, Default Gateway, DNS server etc.) 

A computer that gets its configuration information by using Dynamic Host Configuration Protocol (DHCP) is known as a Dynam Host Configuration Protocol (DHCP) client.

DHCP clients communicate with a DHCP server to obtain IP addresses and related TCP/IP configuration information. DHCP server should be configured properly by the DHCP administrator.

the important messages exchanged between a Dynamic Host Configuration Protocol (DHCP) client and a DHCP Server.

DHCPDiscover Message

DHCP client sends a DHCP Discover broadcast on the network for finding a DHCP server. If there is no respond from a DHCP server, the client assigns itself an automatic private IP address (APIPA).

DHCPOffer Message

DHCP servers on a network that receive a DHCP Discover message respond with a DHCP Offer message, which offers the client an IP address lease.

DHCPRequest Message

Clients accept the first offer received by broadcasting a DHCP Request message for the offered IP address.

DHCPAcknowledgment Message

The server accepts the request by sending the client a DHCP Acknowledgment message.

DHCPNak Message

 

If the IP address requested by the DHCP client cannot be used (another device may be using this IP address), the DHCP server responds with a DHCPNak (Negative Acknowledgment) packet. After this, the client must begin the DHCP lease process again.



Post a Comment

Comments (0)