Transport Layer CN
Transport Layer CN
Transport Layer CN
Types of Service
The transport layer also determines the type of service provided to the users from the
session layer. An error-free point-to-point communication to deliver messages in the
order in which they were transmitted is one of the key functions of the transport layer.
Error Control
Error detection and error recovery are an integral part of reliable service, and therefore
they are necessary to perform error control mechanisms on an end-to-end basis. To
control errors from lost or duplicate segments, the transport layer enables unique
segment sequence numbers to the different packets of the message, creating virtual
circuits, allowing only one virtual circuit per session.
Flow Control
The underlying rule of flow control is to maintain a synergy between a fast process and
a slow process. The transport layer enables a fast process to keep pace with a slow
one. Acknowledgements are sent back to manage end-to-end flow control. Go back N
algorithms are used to request retransmission of packets starting with packet number
N. Selective Repeat is used to request specific packets to be retransmitted.
Connection Establishment/Release
The transport layer creates and releases the connection across the network. This
includes a naming mechanism so that a process on one machine can indicate with
whom it wishes to communicate. The transport layer enables us to establish and delete
connections across the network to multiplex several message streams onto one
communication channel.
Multiplexing/De multiplexing
The transport layer establishes a separate network connection for each transport
connection required by the session layer. To improve throughput, the transport layer
establishes multiple network connections. When the issue of throughput is not
important, it multiplexes several transport connections onto the same network
connection, thus reducing the cost of establishing and maintaining the network
connections.
When several connections are multiplexed, they call for demultiplexing at the receiving
end. In the case of the transport layer, the communication takes place only between
two processes and not between two machines. Hence, communication at the transport
layer is also known as peer-to-peer or process-to-process communication.
UDP
o UDP stands for User Datagram Protocol.
o UDP is a simple protocol and it provides non sequenced transport
functionality.
o UDP is a connectionless protocol.
o This type of protocol is used when reliability and security are less important
than speed and size.
o UDP is an end-to-end transport level protocol that adds transport-level
addresses, checksum error control, and length information to the data from
the upper layer.
o The packet produced by the UDP protocol is known as a user datagram.
Where,
o Source port address: It defines the address of the application process that
has delivered a message. The source port address is of 16 bits address.
o Destination port address: It defines the address of the application process
that will receive the message. The destination port address is of a 16-bit
address.
o Total length: It defines the total length of the user datagram in bytes. It is a
16-bit field.
o Checksum: The checksum is a 16-bit field which is used in error detection.
TCP
o TCP stands for Transmission Control Protocol.
o It provides full transport layer services to applications.
o It is a connection-oriented protocol means the connection established
between both the ends of the transmission. For creating the connection, TCP
generates a virtual circuit between sender and receiver for the duration of a
transmission.
o Stream data transfer: TCP protocol transfers the data in the form of
contiguous stream of bytes. TCP group the bytes in the form of TCP segments
and then passed it to the IP layer for transmission to the destination. TCP
itself segments the data and forward to the IP.
o Reliability: TCP assigns a sequence number to each byte transmitted and
expects a positive acknowledgement from the receiving TCP. If ACK is not
received within a timeout interval, then the data is retransmitted to the
destination.
The receiving TCP uses the sequence number to reassemble the segments if
they arrive out of order or to eliminate the duplicate segments.
o Flow Control: When receiving TCP sends an acknowledgement back to the
sender indicating the number the bytes it can receive without overflowing its
internal buffer. The number of bytes is sent in ACK in the form of the highest
sequence number that it can receive without any problem. This mechanism is
also referred to as a window mechanism.
o Multiplexing: Multiplexing is a process of accepting the data from different
applications and forwarding to the different applications on different
computers. At the receiving end, the data is forwarded to the correct
application. This process is known as demultiplexing. TCP transmits the
packet to the correct application by using the logical channels known as
ports.
o Logical Connections: The combination of sockets, sequence numbers, and
window sizes, is called a logical connection. Each connection is identified by
the pair of sockets used by sending and receiving processes.
o Full Duplex: TCP provides Full Duplex service, i.e., the data flow in both the
directions at the same time. To achieve Full Duplex service, each TCP should
have sending and receiving buffers so that the segments can flow in both the
directions. TCP is a connection-oriented protocol. Suppose the process A
wants to send and receive the data from process B. The following steps
occur:
o Establish a connection between two TCPs.
o Data is exchanged in both the directions.
o The Connection is terminated.
Where,
DNS
An application layer protocol defines how the application processes running
on different systems, pass the messages to each other.
Label Description
Inverse Domain
The inverse domain is used for mapping an address to a name. When the
server has received a request from the client, and the server contains the
files of only authorized clients. To determine whether the client is on the
authorized list or not, it sends a query to the DNS server and ask for mapping
an address to the name.
Working of DNS
o DNS is a client/server network communication protocol. DNS clients send
requests to the. server while DNS servers send responses to the client.
o Client requests contain a name which is converted into an IP address known
as a forward DNS lookups while requests containing an IP address which is
converted into a name known as reverse DNS lookups.
o DNS implements a distributed database to store the name of all the hosts
available on the internet.
o If a client like a web browser sends a request containing a hostname, then a
piece of software such as DNS resolver sends a request to the DNS server
to obtain the IP address of a hostname. If DNS server does not contain the IP
address associated with a hostname, then it forwards the request to another
DNS server. If IP address has arrived at the resolver, which in turn completes
the request over the internet protocol.
Electronic Mail (e-mail) is one of most widely used services of Internet. This
service allows an Internet user to send a message in formatted manner
(mail) to the other Internet user in any part of world. Message in mail not only
contain text, but it also contains images, audio and videos data. The person
who is sending mail is called sender and person who receives mail is
called recipient. It is just like postal mail service. Components of E-Mail
System : The basic components of an email system are : User Agent (UA),
Message Transfer Agent (MTA), Mail Box, and Spool file. These are explained
as following below.
1. User Agent (UA) : The UA is normally a program which is used to send and
receive mail. Sometimes, it is called as mail reader. It accepts variety of
commands for composing, receiving and replying to messages as well as for
manipulation of the mailboxes.
2. Message Transfer Agent (MTA) : MTA is actually responsible for transfer of
mail from one system to another. To send a mail, a system must have client
MTA and system MTA. It transfer mail to mailboxes of recipients if they are
connected in the same machine. It delivers mail to peer MTA if destination
mailbox is in another machine. The delivery from one MTA to another MTA is
done by Simple Mail Transfer
Protocol.
3. Mailbox : It is a file on local hard drive to collect mails. Delivered mails are
present in this file. The user can read it delete it according to his/her
requirement. To use e-mail system each user must have a mailbox . Access
to mailbox is only to owner of mailbox.
4. Spool file : This file contains mails that are to be sent. User agent appends
outgoing mails in this file using SMTP. MTA extracts pending mail from spool
file for their delivery. E-mail allows one name, an alias, to represent several
different e-mail addresses. It is known as mailing list, Whenever user have
to sent a message, system checks recipient’s name against alias database.
If mailing list is present for defined alias, separate messages, one for each
entry in the list, must be prepared and handed to MTA. If for defined alias,
there is no such mailing list is present, name itself becomes naming address
and a single message is delivered to mail transfer entity.
The building blocks of the Web are web pages which are formatted in HTML
and connected by links called "hypertext" or hyperlinks and accessed by
HTTP. These links are electronic connections that link related pieces of
information so that users can access the desired information quickly.
Hypertext offers the advantage to select a word or phrase from text and thus
to access other pages that provide additional information related to that
word or phrase.
A web page is given an online address called a Uniform Resource Locator
(URL). A particular collection of web pages that belong to a specific URL is
called a website, e.g., www.facebook.com, www.google.com, etc. So, the
World Wide Web is like a huge electronic book whose pages are stored on
multiple servers across the world.
Small websites store all of their WebPages on a single server, but big
websites or organizations place their WebPages on different servers in
different countries so that when users of a country search their site they
could get the information quickly from the nearest server.
8.9M
285
So, the web provides a communication platform for users to retrieve and
exchange information over the internet. Unlike a book, where we move from
one page to another in a sequence, on World Wide Web we follow a web of
hypertext links to visit a web page and from that web page to move to other
web pages. You need a browser, which is installed on your computer, to
access the Web.
The World Wide Web was invented by a British scientist, Tim Berners-Lee in
1989. He was working at CERN at that time. Originally, it was developed by
him to fulfill the need of automated information sharing between scientists
across the world, so that they could easily share the data and results of their
experiments and studies with each other.
Internet and Hypertext were available at this time, but no one thought how
to use the internet to link or share one document to another. Tim focused on
three main technologies that could make computers understand each other,
HTML, URL, and HTTP. So, the objective behind the invention of WWW was to
combine recent computer technologies, data networks, and hypertext into a
user-friendly and effective global information system.
How the Invention Started:
In March 1989, Tim Berners-Lee took the initiative towards the invention of
WWW and wrote the first proposal for the World Wide Web. Later, he wrote
another proposal in May 1990. After a few months, in November 1990, along
with Robert Cailliau, it was formalized as a management proposal. This
proposal had outlined the key concepts and defined terminology related to
the Web. In this document, there was a description of "hypertext project"
called World Wide Web in which a web of hypertext documents could be
viewed by browsers. His proposal included the three main technologies
(HTML, URL, and HTTP).
In 1990, Tim Berners-Lee was able to run the first Web server and browser at
CERN to demonstrate his ideas. He used a NeXT computer to develop the
code for his Web server and put a note on the computer "The machine is a
server. Do Not Power It DOWN!!" So that it was not switched off accidentally
by someone.
The moment you open the browser and type a URL in the address bar or
search something on Google, the WWW starts working. There are three main
technologies involved in transferring information (web pages) from servers to
clients (computers of users). These technologies include Hypertext Markup
Language (HTML), Hypertext Transfer Protocol (HTTP) and Web browsers.
Web Browser:
In the beginning, browsers were used only for browsing due to their limited
potential. Today, they are more advanced; along with browsing you can use
them for e-mailing, transferring multimedia files, using social media sites,
and participating in online discussion groups and more. Some of the
commonly used browsers include Google Chrome, Mozilla Firefox, Internet
Explorer, Safari, and more.