1/42
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Physical Layer, Data link Layer, Network Layer, Transport Layer, and Application Layer
TCP/IP Protocol Suite Layers
Transmission Control Protocol/Internet Protocol
TCP/IP
Physical and Data Link Layers
• In these layers, TCP/IP does not define any specific protocol.
• It supports all the standard and proprietary protocols.
• A network in a TCP/IP internetwork can be a local-area network or a wide area network.
Network Layer
TCP/IP supports the Internetworking Protocol. IP, in turn, uses four Supporting protocols: ARP, RARP, ICMP, and IGMP
Internetworking Protocol
is the transmission mechanism used by the TCP/IP protocols. The IP layer provides an unreliable, connectionless delivery system. The reason why it is unreliable is that IP provides no error checking or tracking
Address Resolution Protocol
is used to associate a logical address with a physical address. On a typical physical network, such as a LAN, each device on a link is identified by a physical or station address, usually imprinted on the network interface card (NIC). ARP is used to find the physical address of the node when its Internet address is known.
Reverse Address Resolution Protocol
allows a host to discover its Internet address when it knows only its physical address. It is used when a computer is connected to a network for the first time or when a diskless computer is booted.
Internet Control Message Protocol
is a mechanism used by hosts and gateways to send notification of datagram problems back to the sender. ICMP sends query and error reporting messages
Internet Group Message Protocol
is used to facilitate the simultaneous transmission of a message to a group of recipients
Transport Layer
was represented in TCP/IP by two protocols: TCP and UDP.
• IP is a host-to-host protocol, meaning that it can deliver a packet from one physical device to another
• UDP and TCP are transport level protocols responsible for delivery of a message from a process (running program) to another process. A new transport layer protocol, SCTP, has been devised to meet the needs of some newer applications.
User Datagram Protocol
is the simpler of the two standard TCP/IP transport protocols. • It is a process-to-process protocol that adds only port addresses, checksum error control, and length information to the data from the upper layer.
Transmission Control Protocol
provides full transport layer services to applications.
• TCP is a reliable stream transport protocol. The term stream, in this context, means connection-oriented: A connection must be established between both ends of a transmission before either can transmit data
Stream Control Transmission Protocol
It is a transport layer protocol that combines the best features of UDP and TCP
Application Layer
is equivalent to the combined session, presentation and application layers in the OSI model. Many protocols are defined at this layer
Physical Address, Logical Addresses, Port Addresses, Specific Addresses
Four Levels of Addresses
Physical Address
is also called a MAC address is a 48 bit flat address burned into the ROM of the NIC (Network Interface Card) card at the factory which is a layer 1 device of the OSI model.
IP Address
• is a logical address
• Every host must have a unique IP address
• Includes a network ID and a host ID
Internet Corporation for Assigned Names and Numbers
the who assigns IP addresses
Port Address
The IP address and the physical address are necessary for a quantity of data to travel from a source to a destination host. However , arrival at a destination host is not a final objective of the data communications on the internet. Computers are devices that can run multiple processes at the same time.
Internet Assigned Numbers Authority
is responsible for the global coordination of the DNS Root, IP addressing, and other Internet protocol resources.
Well-known Ports
also known as system ports
Specific Address
❖ Some applications have user-friendly addresses that are designed for that specific applications.
❖Examples include the email address and the Universal Resource Locator (URL). The first defines the recipient of an email; the second is used to find a document on the world wide web.
❖ These address however, get changed to the corresponding port and logical addresses by the sending computer.
Registered Ports
are those from 1024 through 49151
Bandwidth
The number of bits that can be transmitted over the network in a certain period of time.
Latency
-Given by time, taken by a message to travel from one end of a network to other
-also called delay
Network Performance Monitoring
The goal of these tools is to provide a depiction of operations, so potential problems can be avoided, and anomalies that occur can be detected, isolated and resolved with a minimum mean-time-to-repair
Throughput
is a measure of how fast we can actually send data through a network
Propagation Time
measures the time required for a bit to travel from the source to the destination.
Queuing Time
the time needed for each intermediate or end device to hold the message before it can be processed
Universal Resource Locator
URL
File Transfer Protocol
21: FTP
Secure Shell
22: SSH
Simple Mail Transfer Protocol
25: SMTP
Domain Name System
53: DNS
Hypertext Transfer Protocol
80: HTTP
Post Office Protocol
110: POP3
Network News Transfer Protocol
119: NNTP
Network Time Protocol
123: NTP
Internet Message Access Protocol
143: IMAP
Simple Network Management Protocol
161: SNMP
Internet Relay Chat
194: IRC
Hypertext Transfer Protocol Secure
443: HTTPS
Network Interface Card
NIC