Lecture 4
Lecture 4
E_mail: [email protected]
Addressing
Example:
07:01:02:01:2C:4B
A 6-byte (12 hexadecimal digits) physical address.
Specific Address
Protocol (IP) manages the routing of network transmission from the sender
to the receiver.
Features of TCP/IP Model
Flexibility: An administrator
• Process/Application layer
• Host-to-Host layer
• Internet layer
• Network Access Layer
Difference between TCP/IP and OSI network model:
Process/Application layer
The Application layer of the DoD model is equivalent to the upper three layers of the OSI
model, i.e., Session layer, Presentation layer, and Application layer.
Provides access to the services that operate at the lower layers of the DoD model.
It contains a protocol that implements user-level functions such as mail delivery, file
transfer, and remote login.
Host-to-Host layer
A host-to-host layer of the DoD model performs the same functions as the Transport layer
of the OSI reference model.
It handles issues such as flow control, reliable end-to-end communication, and ensuring
error-free delivery of the data.
Protocols that operate on the Host-to-Host layer are: TCP and UDP
Internet layer
Internet layer of the DoD model performs the same functions as the Network layer of the
OSI reference model.
It handles the packaging, addressing, and routing of packets among multiple networks.
This layer also establishes a connection between two computers to exchange the data.
Network Access Layer
Network medium: Cables like coaxial, twisted pair. Today, mostly, we use a wireless
medium such as Bluetooth, WI-FI.
It is a protocol used for transferring hypertext, i.e. (plain text, Images, sound, and video,
etc.) between two computers.
Hypertext is the text that is specially coded using a standard coding language called
Hypertext Markup Language (HTML).
It makes sure that the data transfer between the client and server is secure.
It established an encrypted connection between the browser and the web server using the
Secure
UDP does not provide reliability, flow control, and error recovery
mechanism.
File Transfer Protocol (FTP)
It also uses TCP port number 20 for the actual transmission of the files.
Trivial File Transfer Protocol (TFTP)
Trivial File Transfer Protocol is a simple file transfer protocol that is similar
to FTP.
It does not provide authentication and security while transferring the files.
Simple Mail Transfer Protocol (SMTP)