0% found this document useful (0 votes)
23 views26 pages

Lecture 4

Uploaded by

k3ro.morris
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views26 pages

Lecture 4

Uploaded by

k3ro.morris
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

Computer Networks

Lecture (4 ) Addressing and


TCP/IP Protocols

Dr. Islam Mohammed Ibrahim

E_mail: [email protected]
Addressing

 Four levels of addresses are used in an internet employing the TCP/IP


protocols: physical, logical, port, and specific.
Addressing
Port Address

 Port address is a 16-bit address represented by one decimal number


ranged from (0-65535) to choose a process among multiple processes on
the destination host.
 Destination port number is needed for delivery.
Example
Physical Address

Physical addresses are imprinted on the NIC. Most local-area networks


(Ethernet) use a physical address written as 12 hexadecimal digits; every
byte (2 hexadecimal digits). known also as the MAC address

Example:
07:01:02:01:2C:4B
A 6-byte (12 hexadecimal digits) physical address.
Specific Address

E-mail address ([email protected])


Universal Resource Locator (URL) (www.ksu.edu.sa)

The Domain Name System (DNS) translates human-friendly


computer hostnames ( URL) into IP addresses.

For example, www.example.com is translated to 208.77.188.166


TCP/IP PROTOCOL SUITE History

 TCP/IP model was introduced in 1974.

 TCP/IP stands for Transmission Control Protocol/Internet Protocol.

 The Transmission Control Protocol (TCP) handles reliable delivery of


messages, and The Internet.

 Protocol (IP) manages the routing of network transmission from the sender
to the receiver.
Features of TCP/IP Model

A list of features of TCP/IP Model –


 Support from vendors: TCP/IP receives support from many hardware and
software vendors.

 Interoperability: It can be installed and used on every platform.

 Flexibility: An administrator

can automatically assign an IP address to a host.


TCP/IP PROTOCOL SUITE Vs. OSI model
TCP/IP and the DoD Model

 DoD stands for Department of Defense. It is a smaller version of the OSI


reference model.
TCP/IP DoD model has four layers that are:

• Process/Application layer
• Host-to-Host layer
• Internet layer
• Network Access Layer
Difference between TCP/IP and OSI network model:
Process/Application layer

 The Application layer of the DoD model is equivalent to the upper three layers of the OSI
model, i.e., Session layer, Presentation layer, and Application layer.

 Enable applications to communicate with each other.

 Provides access to the services that operate at the lower layers of the DoD model.

 It contains a protocol that implements user-level functions such as mail delivery, file
transfer, and remote login.
Host-to-Host layer

 A host-to-host layer of the DoD model performs the same functions as the Transport layer
of the OSI reference model.

 It handles issues such as flow control, reliable end-to-end communication, and ensuring
error-free delivery of the data.

 Protocols that operate on the Host-to-Host layer are: TCP and UDP
Internet layer

 Internet layer of the DoD model performs the same functions as the Network layer of the
OSI reference model.

 It handles the packaging, addressing, and routing of packets among multiple networks.

 This layer also establishes a connection between two computers to exchange the data.
Network Access Layer

• The Hardware connected to Network access layer are:

 Network medium: Cables like coaxial, twisted pair. Today, mostly, we use a wireless
medium such as Bluetooth, WI-FI.

 Network Interface Card (NIC) has two types of addresses.


The TCP/IP DoD Protocols
Hypertext Transfer Protocol (HTTP)

 It is a protocol used for transferring hypertext, i.e. (plain text, Images, sound, and video,
etc.) between two computers.

 Hypertext is the text that is specially coded using a standard coding language called
Hypertext Markup Language (HTML).

 It provides standard communication between web browsers and web servers.

 It uses TCP port number 80


Hypertext Transfer Protocol Secure (HTTPS)

 It encrypts the data that is being retrieved by HTTP

 It makes sure that the data transfer between the client and server is secure.

 It established an encrypted connection between the browser and the web server using the
Secure

 It increases the speed of data transfer as compared to HTTP.


Secured Protocols

• SSL (secured socket layer)


• TLS (Transport layer security)
Transport Protocols

• There are the following two protocols at this layer:


• Transmission Control Protocol (TCP)
• User Datagram Protocol (UDP)

• Transmission Control Protocol (TCP)


• It takes a large block of information from an application layer and breaks them into
segments.
• It is a full-duplex, connection-oriented, and reliable protocol
User Datagram Protocol (UDP)

 User Datagram Protocol (UDP) It is fast, connectionless, and unreliable


protocol.

 It has been designed to send data packets over the network.

 UDP does not provide reliability, flow control, and error recovery
mechanism.
File Transfer Protocol (FTP)

 It is the standard protocol that uses to transfer files between computers


and servers over a network such as the Internet.

 FTP server helps you to download, upload, and delete files.

 It uses TCP port number 21 to maintain the connection.

 It also uses TCP port number 20 for the actual transmission of the files.
Trivial File Transfer Protocol (TFTP)

 Trivial File Transfer Protocol is a simple file transfer protocol that is similar
to FTP.

 It uses UDP port number 69 for TFTP server.

 It does not provide authentication and security while transferring the files.
Simple Mail Transfer Protocol (SMTP)

 SMTP, the acronym is associated with Sending Mail To People.

 SMTP uses TCP protocol

 The default SMTP port number is 25.

 Secondary SMTP port number is 26.

 SMTP over SSL/TLS port number is 465.


Thank
You!

You might also like