Unit5 Oracle
Unit5 Oracle
The services provided by the transport layer protocols can be divided into five
categories:
o End-to-end delivery
o Addressing
o Reliable delivery
o Flow control
o Multiplexing
End-to-end delivery:
The transport layer transmits the entire message to the destination. Therefore, it ensures
the end-to-end delivery of an entire message from a source to the destination.
Reliable delivery:
The transport layer provides reliability services by retransmitting the lost and damaged
packets.
The reliable delivery has four aspects:
o Error control
o Sequence control
o Loss control
o Duplication control
Error Control
Loss Control
Loss Control is a third aspect of reliability. The transport layer ensures that all the
fragments of a transmission arrive at the destination, not some of them. On the sending
end, all the fragments of transmission are given sequence numbers by a transport layer.
These sequence numbers allow the receiver?s transport layer to identify the missing
segment.
Duplication Control
Duplication Control is the fourth aspect of reliability. The transport layer guarantees that
no duplicate data arrive at the destination. Sequence numbers are used to identify the
lost packets; similarly, it allows the receiver to identify and discard duplicate segments.
Flow Control
Flow control is used to prevent the sender from overwhelming the receiver. If the
receiver is overloaded with too much data, then the receiver discards the packets and
asking for the retransmission of packets. This increases network congestion and thus,
reducing the system performance. The transport layer is responsible for flow control. It
uses the sliding window protocol that makes the data transmission more efficient as well
as it controls the flow of data so that the receiver does not become overwhelmed.
Sliding window protocol is byte oriented rather than frame oriented.
Multiplexing
The transport layer uses the multiplexing to improve transmission efficiency.
UDP
o UDP stands for User Datagram Protocol.
o UDP is a simple protocol and it provides non sequenced transport functionality.
o UDP is a connectionless protocol.
o This type of protocol is used when reliability and security are less important than speed
and size.
o UDP is an end-to-end transport level protocol that adds transport-level addresses,
checksum error control, and length information to the data from the upper layer.
o The packet produced by the UDP protocol is known as a user datagram.
o Source port address: It defines the address of the application process that has delivered
a message. The source port address is of 16 bits address.
o Destination port address: It defines the address of the application process that will
receive the message. The destination port address is of a 16-bit address.
o Total length: It defines the total length of the user datagram in bytes. It is a 16-bit field.
o Checksum: The checksum is a 16-bit field which is used in error detection.
TCP
o TCP stands for Transmission Control Protocol.
o It provides full transport layer services to applications.
o It is a connection-oriented protocol means the connection established between both the
ends of the transmission. For creating the connection, TCP generates a virtual circuit
between sender and receiver for the duration of a transmission.
Where,
o Source port address: It is used to define the address of the application program in a
source computer. It is a 16-bit field.
o Destination port address: It is used to define the address of the application program in
a destination computer. It is a 16-bit field.
o Sequence number: A stream of data is divided into two or more TCP segments. The 32-
bit sequence number field represents the position of the data in an original data stream.
o Acknowledgement number: A 32-field acknowledgement number acknowledge the
data from other communicating devices. If ACK field is set to 1, then it specifies the
sequence number that the receiver is expecting to receive.
o Header Length (HLEN): It specifies the size of the TCP header in 32-bit words. The
minimum size of the header is 5 words, and the maximum size of the header is 15 words.
Therefore, the maximum size of the TCP header is 60 bytes, and the minimum size of the
TCP header is 20 bytes.
o Reserved: It is a six-bit field which is reserved for future use.
o Control bits: Each bit of a control field functions individually and independently. A
control bit defines the use of a segment or serves as a validity check for other fields.
Definition TCP establishes a virtual circuit before UDP transmits the data directly to the
transmitting the data. destination computer without verifying
whether the receiver is ready to receive
or not.
acknowledgement It waits for the acknowledgement of data It neither takes the acknowledgement,
and has the ability to resend the lost nor it retransmits the damaged frame.
packets.
Application Layer
The application layer in the OSI model is the closest layer to the end user which means
that the application layer and end user can interact directly with the software
application. The application layer programs are based on client and servers.
o n Client-server architecture, clients do not directly communicate with each other. For
example, in a web application, two browsers do not directly communicate with each
other.
o A server is fixed, well-known address known as IP address because the server is always
on while the client can always contact the server by sending a packet to the sender's IP
address.
o P2P (peer-to-peer) architecture: It has no dedicated server in a data center. The peers
are the computers which are not owned by the service provider. Most of the peers reside
in the homes, offices, schools, and universities.
o The peers communicate with each other without passing the information through a
dedicated server, this architecture is known as peer-to-peer architecture. The
applications based on P2P architecture includes file sharing and internet telephony.
It converts one format of data to another format of data if both sender and receiver
understand different formats; hence this layer is also called the translation layer.
It deals with the semantics and syntax of the data, so this layer is also called the syntax
layer.
It uses operations such as data compression, data encryption & decryption, data
conversion,
1. Common Application Service Element (CASE): This sublayer offers services to layer-7,
i.e., the application layer, and requests services from layer-5, i.e., the session layer. It
supports various application services, such as Reliable Transfer Service Element (RTSE),
Remote Operation Service Element (ROSE), Association Control Service Element (ACSE),
and Commitment Concurrency and Recovery (CCR).
2. Specific Application Service Element (SASE): This sublayer offers application-specific
protocols, such as Message Oriented Text Interchange Standard (MOTIS), Remote
Database Access (RDA), File Transfer Access and Manager (FTAM), Common
Management Information Protocol (CMIP), Virtual Terminal (VT), Distributed Transaction
Processing (DTP), Job Transfer and Manipulation (JTM), and others.
Protocols of the Presentation layer: