0% found this document useful (0 votes)
16 views41 pages

TECH2100 Week 5 Workshop

This document covers the Transport Layer protocols in networking, focusing on TCP and UDP, detailing their functionalities, advantages, and use cases. It explains TCP's reliability and connection-oriented nature, including the three-way handshake, while highlighting UDP's speed and connectionless approach for real-time applications. Additionally, it includes activities for practical application and understanding of these protocols in real-world scenarios.

Uploaded by

Thuy Linh Vu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views41 pages

TECH2100 Week 5 Workshop

This document covers the Transport Layer protocols in networking, focusing on TCP and UDP, detailing their functionalities, advantages, and use cases. It explains TCP's reliability and connection-oriented nature, including the three-way handshake, while highlighting UDP's speed and connectionless approach for real-time applications. Additionally, it includes activities for practical application and understanding of these protocols in real-world scenarios.

Uploaded by

Thuy Linh Vu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 41

TECH2100

Introduction to Information
Networks
Lesson 5
Transport Layer Protocols
COMMONWEALTH OF AUSTRALIA
Copyright Regulations 1969

WARNING

This material has been reproduced and communicated to you by or on behalf of


Kaplan Business School pursuant to Part VB of the Copyright Act 1968 (the Act).

The material in this communication may be subject to copyright under the Act. Any
further reproduction or communication of this material by you may be the subject of
copyright protection under the Act.

Do not remove this notice.


Subject Learning Outcomes

1 Evaluate the main technologies,


models and protocols used in data
communications and networking.
2 Explain the purpose and functionality
of layered computer network models.
3 Identify problems that emerge among
the networks that constitute today's
internet architecture.
4 Recommend and apply solutions for
common internet architecture problems.
Transport Layer Protocols
• The Transport Layer in the OSI model
ensures reliable delivery of data between
applications on different hosts with error
recovery and flow control mechanisms.
• The transport layer receives data from the
Session Layer, breaks it into segments
with a header for delivery to the Network
Layer, and reassembles segments into
data to pass to the Session Layer.
Transmission Control Protocol
(TCP)
• TCP is a reliable protocol that works on
the transport layer of the OSI model. It
ensures ordered, error-checked data
delivery between applications over an IP
network.
• Managing network connections for reliable
and efficient data transmission by
controlling flow and preventing congestion.
Connection-oriented communication
using three-way handshake
• TCP is connection-oriented and requires a
three-way handshake to establish a
connection before data transmission.
• The three-way handshake is a process that
involves three steps to establish a connection
between two hosts:
1. The client sends a SYN packet to the server.
2. The server responds with a SYN-ACK packet.
3. The client sends an ACK packet back to the
server, establishing the connection.
TCP controls
• TCP uses flow control to prevent the sender
from overloading the receiver. The receiver
sets a receive window indicating the amount
of data it can handle, and the sender adjusts
its transmission accordingly.
• TCP uses congestion control to avoid
congestion by monitoring the network for
signs of congestion and adjusting its
transmission rate accordingly for stable and
reliable data transmission.
Activity
Discuss the benefits and drawbacks of TCP,
including its use of flow and congestion control, as
well as its reliance on a three-way handshake.

In your groups, identify a real-world scenario where


TCP is used and discuss how the protocol would be
implemented in that scenario.

Present your scenario and findings to the rest of the


class.
User Datagram Protocol
(UDP)
• UDP is a lightweight, connectionless transport
protocol used in IP networks alongside TCP. It
transmits data without establishing a dedicated
end-to-end connection.
• UDP delivers data packets between internet
applications without reliability, flow control, or
error-checking mechanisms.
• UDP is faster and more efficient than other
protocols for real-time applications. It is ideal for
sending small messages or packets of data where
low latency is prioritised over guaranteed delivery.
Connectionless communication
• UDP is a connectionless protocol used for real-
time applications like online gaming, video
streaming, and VoIP due to its speed and
efficiency.
• UDP is commonly used for real-time multimedia
applications, including video streaming and VoIP,
due to its low latency and fast data transmission.
• Similarly, network management applications such
as SNMP often use UDP as it does not require a
connection to be established before data
transmission.
Comparison of UDP and TCP
• TCP is reliable and connection-oriented,
while UDP is fast and connectionless.
• TCP is best for applications where
reliability is crucial, like email and file
transfer, while UDP is ideal for low-latency
applications like online gaming and VoIP.
Activity
Can you provide an example of an
application or service that uses UDP? Why
is UDP a better choice for this
application/service?
Application Layer
• The Application Layer is the top layer in
OSI and TCP/IP models, providing end-
users access to network services via
software applications for file transfer,
email, and web browsing.
• Application Layer protocols enable
communication between apps on different
devices with standardised rules for data
formatting, exchange, and display.
Overview of common Application
Layer protocols
• HTTP (Hypertext Transfer Protocol) is the
protocol used to transfer web pages and
other content on the World Wide Web.
• FTP (File Transfer Protocol) is used to
transfer files between computers on a
network.
• SMTP (Simple Mail Transfer Protocol) is used
to send and receive email messages.
• DNS (Domain Name System) is used to
translate human-readable domain names into
IP addresses.
Role of Transport Layer protocols in
supporting Application Layer protocols
• TCP and UDP are Transport Layer
protocols that deliver data to applications.
• TCP provides reliable and ordered
delivery, while UDP provides
connectionless and unreliable delivery.
Activity
In small groups, discuss the following questions:
1. Which of the common Application Layer protocols have
you used before?
2. What kind of data or content have you transferred using
these protocols?
3. How do you think these protocols enable
communication between different devices and
applications?

After your group discussion, share your answers with the


rest of the class and compare your findings.
Activity
This Activity provides detailed instructions for
building a switched network using Cisco Packet
Tracer.
This activity will help you learn how to initialise and
reload switches and Routers, set up network
topology, and configure PC hosts.
Activity
Objectives
1. Set Up the Topology and Initialize Devices
2. Configure Devices and Verify Connectivity
3. Show router information.

Background / Scenario
This lab guides you through setting up a network with a router and switch, configuring
interfaces, and verifying connectivity using basic IOS commands. It aims to reinforce
knowledge of network configuration using Cisco IOS within a Packet Tracer simulated
environment.
Required Resources
• Cisco Packet Tracer
• Virtual models of a Router (Cisco 1941 or comparable) and a Switch (Cisco 2960 or
comparable)
• Virtual PCs within Packet Tracer
Addressing Table
Device Interface IP Address Subnet Mask Default Gateway
R1 Fa0/0 192.168.0.1 255.255.255.0 N/A
Fa0/1 192.168.1.1 255.255.255.0 N/A
PC-A NIC 192.168.1.3 255.255.255.0 192.168.1.1
PC-B NIC 192.168.0.3 255.255.255.0 192.168.0.1
Step-by-Step Guide for Activity
Activity Instructions Solution
Step 1: Set Up the
Topology and Initialize
Devices
• Connect the
switches to PCs:
• Open Cisco Packet
Tracer.
• Drag and Drop the
Devices:
Step-by-Step Guide for Activity
Activity Instructions Solution
• Place a Router (Cisco 1941 or similar) and a Switch
(Cisco 2960 or similar) onto the workspace.
Step-by-Step Guide for Activity
Activity Instructions Solution
• Add two PCs and connect them as shown in the diagram,
then rename all the devices as shown in the provided
topology.
Step-by-Step Guide for Activity
Activity Instructions Solution
• Connect PC-A to the switch (e.g., on port Fa0/6).
Step-by-Step Guide for Activity
Activity Instructions Solution
• Connect PC-A to the switch (e.g., on port Fa0/6).
Step-by-Step Guide for Activity
Activity Instructions Solution
• Connect the Switch (e.g., on port Fa0/5) to the Router's
Fa0/1.
Step-by-Step Guide for Activity
Activity Instructions Solution
• Connect the Router's Fa0/0 to the PC-B.
Step-by-Step Guide for Activity
Activity Instructions Solution
• Final Diagram for the proposed topology
Step-by-Step Guide for Activity
Activity Instructions Solution
Step 2: Configure
Devices and Verify
Connectivity
1. Configure the Router:
• Access the router CLI
(Command Line
Interface) by clicking on
the router and selecting
the CLI tab.
• Enter global
configuration mode:
Step-by-Step Guide for Activity
Activity Instructions Solution
1. Configure the
Router:
• Enter global
configuration mode:
• Router> enable
• Router# configure
terminal
Step-by-Step Guide for Activity
Activity Instructions Solution
1. Configure the
Router:
• Configure interfaces
with IP addresses as
specified:
• Router(config)#
interface fa0/1
• Router(config-if)# ip
address 192.168.1.1
255.255.255.0
• Router(config-if)# no
shutdown
Step-by-Step Guide for Activity
Activity Instructions Solution
1. Configure the
Router:
• Configure interfaces
with IP addresses as
specified:
• Router(config)#
interface fa0/0
• Router(config-if)# ip
address 192.168.0.1
255.255.255.0
• Router(config-if)# no
shutdown
Step-by-Step Guide for Activity
Activity Instructions Solution
2. Configure PCs:
• Click on PC-A, go to
the Desktop tab, and
open IP
Configuration. Set the
IP address to
192.168.1.3, Subnet
Mask to
255.255.255.0, and
Default Gateway to
192.168.1.1.
Step-by-Step Guide for Activity
Activity Instructions Solution
2. Configure PCs:
• Click on PC-A, go to
the Desktop tab, and
open IP
Configuration. Set the
IP address to
192.168.1.3, Subnet
Mask to
255.255.255.0, and
Default Gateway to
192.168.1.1.
Step-by-Step Guide for Activity
Activity Instructions Solution
2. Configure PCs:
• Click on PC-A, go to
the Desktop tab, and
open Command
Prompt. Write the
command “ipconfig
/all”
Step-by-Step Guide for Activity
Activity Instructions Solution
2. Configure PCs:
• Click on PC-A, go to
the Desktop tab, and
open Command
Prompt. Write the
command “ipconfig
/all” to check the
configuration for PC-
A.
Step-by-Step Guide for Activity
Activity Instructions Solution
2. Configure PCs:
• Repeat for PC-B with
the IP address
192.168.0.3, Subnet
Mask to
255.255.255.0, and
Default Gateway to
192.168.0.1.
Step-by-Step Guide for Activity
Activity Instructions Solution
2. Configure PCs:
• Click on PC-B, go to
the Desktop tab, and
open Command
Prompt. Write the
command “ipconfig
/all” to check the
configuration for PC-
A.
Step-by-Step Guide for Activity
Activity Instructions Solution
2. Verify Connectivity:
• On PC-A, open the
Command Prompt and
type:
• ping 192.168.1.1 # To
check connectivity to
the router
Step-by-Step Guide for Activity
Activity Instructions Solution
2. Verify Connectivity:
• On PC-A, open the
Command Prompt and
type:
• ping 192.168.0.3 # To
check connectivity to
PC-B
Step-by-Step Guide for Activity
Activity Instructions Solution
2. Verify Connectivity:
• Repeat similar steps on
PC-B to verify
connectivity to PC-A
and the router.
• Click on PC-B, go to
the Desktop tab, and
open Command
Prompt.
• Ping 192.168.0.1 # To
check connectivity to
the router
Step-by-Step Guide for Activity
Activity Instructions Solution
2. Verify Connectivity:
• Repeat similar steps on
PC-B to verify
connectivity to PC-A
and the router.
• Click on PC-B, go to
the Desktop tab, and
open Command
Prompt.
• Ping 192.168.1.3 # To
check connectivity to
PC-A
Step-by-Step Guide for Activity
Activity Instructions Solution
2. Step 3: Show Router
Information:
• To display router
configurations and
interface statuses, use
the following commands
in the router’s CLI:
• Router# show running-
config # Shows the
current configuration
• Router# show ip interface
brief # Shows a brief
overview of interface
statuses

You might also like