Unit 1
Unit 1
LECTURE NOTES
V SEMESTER
Regulation – 2022
Academic Year 2024 – 2025(Even Semester)
Prepared by
Protocol: It defines a set of rules that a layer uses to exchange the information with
peer entity. These rules mainly concern about both the contents and order of the
messages used.
Interface: It is a way through which the message is transferred from one layer to
another layer.
1.5 TCP / IP PROTOCOL SUITE
reliable protocol as it detects the error and retransmits the damaged frames.
1.5.3 Internet Layer
The internet layer is the second layer of the TCP/IP model.
An internet layer is also known as the network layer.
The main responsibility of the internet layer is to send the packets from any network,
and they arrive at the destination irrespective of the route they take.
Internet layer handle the transfer of information across multiple networks through
router and gateway.
IP protocol is used in this layer, and it is the most significant part of the entire TCP/IP
suite.
1.5.4 Network Interface Layer
The network interface layer is the lowest layer of the TCP/IP model.
This layer is the combination of the Physical layer and Data Link layer defined in the
OSI reference model.
It defines how the data should be sent physically through the network.
This layer is mainly responsible for the transmission of the data between two devices
on the same network.
The functions carried out by this layer are encapsulating the IP datagram into frames
transmitted by the network and mapping of IP addresses into physical addresses.
The protocols used by this layer are Ethernet, token ring, FDDI, X.25, frame relay.
OSI consists of seven layers, and each layer performs a particular network function.
OSI model divides the whole task into seven smaller and manageable tasks. Each
layer is assigned a particular task.
The physical layer coordinates the functions required to transmit a bit stream over a physical
medium. The physical layer is concerned with the following functions:
Physical characteristics of interfaces and media - The physical layer defines the
characteristics of the interface between the devices and the transmission medium.
Representation of bits - To transmit the stream of bits, it must be encoded to signals.
The physical layer defines the type of encoding.
Signals: It determines the type of the signal used for transmitting the information.
Data Rate or Transmission rate - The number of bits sent each second –is also
defined by the physical layer.
Synchronization of bits - The sender and receiver must be synchronized at the bit
level. Their clocks must be synchronized.
1.6.2 Data Link Layer
It is responsible for transmitting frames from one node to the next node. The other
responsibilities of this layer are
Framing - Divides the stream of bits received into data units called frames.
Flow control- If the rate at which the data are absorbed by the receiver is less than
the rate produced in the sender, the Data link layer imposes a flow ctrl mechanism.
Error control- Used for detecting and retransmitting damaged or lost frames and to
prevent duplication of frames. This is achieved through a trailer added at the end of
the frame.
1.6.3 Network Layer
This layer is responsible for the delivery of packets from source to destination.
It determines the best path to move data from source to the destination based on the network
conditions, the priority of service, and other factors. The other responsibilities of this layer
are
Dialog control - Session layer acts as a dialog controller that creates a dialog between
two processes or we can say that it allows the communication between two processes
which can be either half-duplex or full-duplex.
Synchronization- Session layer adds some checkpoints when transmitting the data in
a sequence. If some error occurs in the middle of the transmission of data, then the
transmission will take place again from the checkpoint. This process is known as
Synchronization and recovery.
1.6.6 Presentation Layer
It is concerned with the syntax and semantics of information exchanged between two
systems. The other responsibilities of this layer are
Translation – Different computers use different encoding system, this layer is
responsible for interoperability between these different encoding methods. It will
change the message into some common format.
Encryption and Decryption-It means that sender transforms the original information
to another form and sends the resulting message over the n/w. and vice versa.
Compression and Expansion-Compression reduces the number of bits contained in
the information particularly in text, audio and video.
1.6.7 Application Layer
This layer enables the user to access the network. It handles issues such as network
transparency, resource allocation, etc. This allows the user to log on to remote user.
The other responsibilities of this layer are
FTAM (File Transfer, Access, Management) - Allows user to access files in a remote
host.
Mail services - Provides email forwarding and storage.
Directory services - Provides database sources to access information about various
sources and objects.
The services provided (often by the operating system) that provide the interface between
application and protocol software.
Features of HTTP
1. Connectionless protocol
2. Media independent
3. Stateless
4. Persistent cookie Instead of expiring when the web browser is closed as session cookies do, a
persistent cookie expires at a specific date or after a specific length of time. This means that, for
the cookie's entire lifespan, its information will be transmitted to the server every time the user
visits the website that it belongs to, or every time the user views a resource belonging to that
website from another website.
HTTP Caching enables the client to retrieve document faster and reduces load on the
server.
HTTP Caching is implemented at Proxy server, ISP router and Browser.
Server sets expiration date (Expires header) for each page, beyond which it is not
cached.
HTTP Cache document is returned to client only if it is an updated copy by checking
against If-Modified-Since header.
If cache document is out-of-date, then request is forwarded to the server and response
is cached along the way.
session.
The data connection is opened and then closed for each file transfer activity.
When a user starts an FTP session, the control connection opens.
While the control connection is open, the data connection can be opened and closed
multiple times if several files are transferred.
FTP can transfer a file across the data connection using one of the following three
transmission modes: stream mode, block mode, or compressed mode.
The stream mode is the default mode; data are delivered from FTP to TCP as a
continuous stream of bytes.
In the block mode, data can be delivered from FTP to TCP in blocks.
In the compressed mode, data can be compressed and delivered from FTP to TCP.
When the sender and the receiver of an e-mail are on the same system, we need only
two User Agents and no Message Transfer Agent
When the sender and the receiver of an e-mail are on different system, we need two
UA, two pairs of MTA (client and server), and two MAA (client and server).
Working of Email
When Alice needs to send a message to Bob, she runs a UA program to prepare the
message and send it to her mail server.
The mail server at her site uses a queue (spool) to store messages waiting to be sent.
The message, however, needs to be sent through the Internet from Alice’s site to
Bob’s site using an MTA.
Here two message transfer agents are needed: one client and one server.
The server needs to run all the time because it does not know when a client will ask
for a connection.
The client can be triggered by the system when there is a message in the queue to be
sent.
The user agent at the Bob site allows Bob to read the received message.
Bob later uses an MAA client to retrieve the message from an MAA server running
on the second server.
The mail transfer begins with the client authenticating the user and identifying the
mailbox they want to access.
Client Commands LOGIN, AUTHENTICATE, SELECT, EXAMINE, CLOSE, and
LOGOUT
Server Responses OK, NO (no permission), BAD (incorrect command),
When user wishes to FETCH a message, server responds in MIME format.
Message attributes such as size are also exchanged.
Flags are used by client to report user actions. SEEN, ANSWERED, DELETED,
RECENT
POP commands are generally abbreviated into codes of three or four letters
1. UID - This command opens the connection
2. STAT - It is used to display number of messages currently in the mailbox
3. LIST - It is used to get the summary of messages
4. RETR -This command helps to select a mailbox to access the messages
5. DELE - It is used to delete a message
6. RSET - It is used to reset the session to its initial state
7. QUIT - It is used to log off the session
Working of DNS
The following six steps shows the working of a DNS. It maps the host name to an IP address:
1. The user passes the host name to the file transfer client.
2. The file transfer client passes the host name to the DNS client.
3. Each computer, after being booted, knows the address of one DNS server. The DNS
client sends a message to a DNS server with a query that gives the file transfer server
name using the known IP address of the DNS server.
4. The DNS server responds with the IP address of the desired file transfer server.
5. The DNS server passes the IP address to the file transfer client.
6. The file transfer client now uses the received IP address to access the file transfer
server.
SNMP MANAGER
A manager is a host that runs the SNMP client program
The manager has access to the values in the database kept by the agent.
A manager checks the agent by requesting the information that reflects the behavior
of the agent.
A manager also forces the agent to perform a certain function by resetting values
in the agent database.
For example, a router can store in appropriate variables the number of packets
received and forwarded.
The manager can fetch and compare the values of these two variables to see if the
router is congested or not.
SNMP AGENT
The agent is a router that runs the SNMP server program.
The agent is used to keep the information in a database while the manager is used to
access the values in the database.
o For example, a router can store the appropriate variables such as a number of
packets received and forwarded while the manager can compare these variables
to determine whether the router is congested or not.
Agents can also contribute to the management process.
A server program on the agent checks the environment, if something goes wrong, the
agent sends a warning message to the manager.
Structure of Management Information (SMI)
To use SNMP, we need rules for naming objects.
SMI is a protocol that defines these rules.
SMI is a guideline for SNMP
It emphasizes three attributes to handle an object: name, data type, and encoding
method.
Its functions are:
1. To name objects.
2. To define the type of data that can be stored in an object.
3. To show how to encode data for transmission over the network.
SNMP MESSAGES/PDU
GetRequest
The GetRequest PDU is sent from the manager (client) to the agent (server) to retrieve the
value of a variable or a set of variables.
GetNextRequest
The GetNextRequest PDU is sent from the manager to the agent to retrieve the value of a
variable.
GetBulkRequest
The GetBulkRequest PDU is sent from the manager to the agent to retrieve a large amount of
data. It can be used instead of multiple GetRequest and GetNextRequest PDUs.