Unit 5
Unit 5
TRANSPORT LAYER
THE TRANSPORT LAYER
Services provided to the upper layers
The ultimate goal of the transport layer is to provide efficient, reliable, and
cost-effective data transmission service to its users, normally processes in
the application layer.
To achieve this, the transport layer makes use of the services provided by
the network layer
The software and/or hardware within the transport layer that does the
work are called the transport entity.
Just as there are two types of network service, connection-oriented and
connectionless, there are also two types of transport service.
The connection-oriented transport service is similar to the connection-
oriented network service in many ways. In both cases, connections have
three phases: establishment, data transfer, and release. Addressing and flow
control are also similar in both layers
The network, transport, and
application layers
Responsibilities of a Transport Layer
1. The Process to Process Delivery
2. End-to-End Connection between
Hosts
3. Multiplexing and Demultiplexing
4. Congestion Control
5. Data integrity and Error correction
6. Layer
1. Transport Flow control
requires a Port number to correctly deliver the segments of
data to the correct process amongst the multiple processes running on a
particular host. A port number is a 16-bit address used to identify any client-
server program uniquely.
2. The transport layer is also responsible for creating the end-
to-end Connection between hosts for which it mainly uses
TCP and UDP. TCP is a secure, connection-orientated protocol
that uses a handshake protocol
So, there is no need to establish a connection before data transfer. The UDP
helps to establish low-latency and loss-tolerating connections over the network.
The UDP enables process-to-process communication.
•Source Port: Source Port is a 2 Byte long field used to identify the
port number of the source.
•Destination Port: It is a 2 Byte long field, used to identify the port of the
destined packet.
•Length: Length is the length of UDP including the header and the data. It is a
16-bits field.
•Checksum: Checksum is 2 Bytes long field. It is the 16-bit one’s complement of
the one’s complement sum of the UDP header, the pseudo-header of information
from the IP header, and the data, padded with zero octets at the end (if
APPLICATION LAYER
Simple Mail Transfer Protocol
SMTP is an application layer protocol.
The client who wants to send the mail opens a TCP connection to the
SMTP server and then sends the mail across the connection. The SMTP
server is an always-on listening mode. As soon as it listens for a TCP
connection from any client, the SMTP process initiates a connection
through port 25. After successfully establishing a TCP connection the
client process sends the mail instantly.
SMTP Protocol
The SMTP model is of two types:
•End-to-End Method
•Store-and-Forward Method
The end-to-end model is used to communicate between different
organizations whereas the store and forward method is used within
an organization. An SMTP client who wants to send the mail will
contact the destination’s host SMTP directly, to send the mail to the
destination. The SMTP server will keep the mail to itself until it is
successfully copied to the receiver’s SMTP.
The client SMTP is the one that initiates the session so let us call it
the client-SMTP and the server SMTP is the one that responds to
the session request so let us call it receiver-SMTP. The client-SMTP
will start the session and the receiver SMTP will respond to the
request.
HTTP
•HTTP stands for HyperText Transfer Protocol.
•It is a protocol used to access the data on the World Wide Web (www).
•The HTTP protocol can be used to transfer the data in the form of plain
text, hypertext, audio, video, and so on.
•This protocol is known as HyperText Transfer Protocol because of its
efficiency that allows us to use in a hypertext environment where there are
rapid jumps from one document to another document.
•HTTP is similar to the FTP as it also transfers the files from one host to
another host. But, HTTP is simpler than FTP as HTTP uses only one
connection, i.e., no control connection to transfer the files.
•HTTP is used to carry the data in the form of MIME-like format.
Features of HTTP:
•Connectionless protocol: HTTP is a connectionless protocol. HTTP client
initiates a request and waits for a response from the server. When the server
receives the request, the server processes the request and sends back the
response to the HTTP client after which the client disconnects the connection.
The connection between client and server exist only during the current
request and response time only.
•Media independent: HTTP protocol is a media independent as data can be
sent as long as both the client and server know how to handle the data
content. It is required for both the client and server to specify the content
type in MIME-type header.
•Stateless: HTTP is a stateless protocol as both the client and server know
each other only during the current request. Due to this nature of the protocol,
both the client and server do not retain the information between various
requests of the web pages.
File Transfer Protocol (FTP) in
Application Layer
FTP or File Transfer Protocol is said to be one of the earliest and also the most
common forms of transferring files on the internet. Located in the application
layer of the OSI model.
FTP is a basic system that helps in transferring files between a client and a server.
It is what makes the FTP unique that the system provides a reliable and efficient
means of transferring files from one system to another even if they have
different file structures and operating systems.
Contrary to other protocols such as http that cover hypertexts and web
resources in general, ftp is dedicated to the management and the transfer of
text, binary, or image files.
What is FTP Useful For.
•Transferring Large Files: FTP can transfer large files in one shot; thus
applicable when hosting websites, backing up servers, or sharing files in
large quantities.
•Remote File Management: Files on a remote server can be uploaded,
downloaded, deleted, renamed, and copied according to the users’
choices.
•Automating File Transfers: FTP is a great protocol for the execution of
file transfers on predefined scripts and employments.
•Accessing Public Files: Anonymous FTP means that everybody
irrespective of the identity is allowed to download some files with no
permissions needed.