Computer Science Engineering (CSE) Exam  >  Computer Science Engineering (CSE) Notes  >  TCP/IP Protocol - Notes, Computer Network, Engg , Sem

TCP/IP Protocol - Notes, Computer Network, Engg , Sem - Computer Science Engineering (CSE) PDF Download

TCP/IP Protocol Architecture

  • TCP/IP protocols map to a four-layer conceptual model known as the DARPA model, named after the U.S. government agency that initially developed TCP/IP. 
  • The four layers of the DARPA model are:
    (i) Application
    (ii) Transport
    (iii) Internet
    (iv) Network Interface
  • Each layer in the DARPA model corresponds to one or more layers of the seven-layer Open Systems Interconnection (OSI) model.
  • The following figure shows the TCP/IP protocol architecture:

TCP/IP Protocol - Notes, Computer Network, Engg , Sem - Computer Science Engineering (CSE)

Question for TCP/IP Protocol - Notes, Computer Network, Engg , Sem
Try yourself:Which of the following are layers in the TCP/IP model?
1. Application
2. Session
3. Transport
4. Internet
5. Data Link
6. Physical ​
View Solution

➢ Network Interface Layer

  • The Network Interface Layer (also called the Network Access Layer) handles placing TCP/IP packets on the network medium and receiving TCP/IP packets off the network medium. 
  • TCP/IP was designed to be independent of the network access method, frame format, and medium. In this way, TCP/IP can be used to connect differing network types. 
  • These include local area network (LAN) media such as Ethernet and Token Ring and WAN technologies such as X.25 and Frame Relay. Independence from any specific network media allows TCP/IP to be adapted to new media such as asynchronous transfer mode (ATM).
  • The Network Interface layer encompasses the Data Link and Physical layers of the OSI model. Note that the Internet layer does not take advantage of sequencing and acknowledgement services that might be present in the Network Interface layer. An unreliable Network Interface layer is assumed, and reliable communication through session establishment and the sequencing and acknowledgement of packets is the function of the Transport layer.

Internet Layer

  • The Internet layer handles addressing, packaging, and routing functions. 
  • The core protocols of the Internet layer are IP, ARP, ICMP, and IGMP.
    1. The Internet Protocol (IP) is a routable protocol that handles IP addressing, routing, and the fragmentation and reassembly of packets.
    2. The Address Resolution Protocol (ARP) handles resolution of an Internet layer address to a Network Interface layer address, such as a hardware address.
    3. The Internet Control Message Protocol (ICMP) handles providing diagnostic functions and reporting errors due to the unsuccessful delivery of IP packets.
    4. The Internet Group Management Protocol (IGMP) handles the management of IP multicast group membership.
  • The Internet layer is analogous to the Network layer of the OSI model.

Question for TCP/IP Protocol - Notes, Computer Network, Engg , Sem
Try yourself:ICMP works on which layer
View Solution

➢ Transport Layer

  • The Transport layer (also known as the Host-to-Host Transport layer) handles providing the Application layer with session and datagram communication services. The core protocols of the Transport layer are Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP).
  • TCP provides a one-to-one, connection-oriented, reliable communications service. TCP handles the establishment of a TCP connection, the sequencing and acknowledgement of packets sent, and the recovery of packets lost during transmission.
  • UDP provides a one-to-one or one-to-many, connectionless, unreliable communications service. UDP is used when the amount of data to be transferred is small (such as data that fits into a single packet), when you do not want the overhead of establishing a TCP connection, or when the applications or upper-layer protocols provide reliable delivery.

The TCP/IP Transport layer encompasses the responsibilities of the OSI Transport layer. 

➢ Application Layer

  • The Application layer lets applications access the services of the other layers and defines the protocols that applications use to exchange data.
  • There are many Application layer protocols and new protocols are always being developed.

The most widely known Application layer protocols are those used for the exchange of user information:

  • The Hypertext Transfer Protocol (HTTP) is used to transfer files that make up the Web pages of the World Wide Web.
  • The File Transfer Protocol (FTP) is used for interactive file transfer.
  • The Simple Mail Transfer Protocol (SMTP) is used for the transfer of mail messages and attachments.
  • Telnet, a terminal emulation protocol, is used for logging on remotely to network hosts.

Additionally, the following Application layer protocols help facilitate the use and management of TCP/IP networks:

  • The Domain Name System (DNS) is used to resolve a host name to an IP address.
  • The Routing Information Protocol (RIP) is a routing protocol that routers use to exchange routing information on an IP internetwork.
  • The Simple Network Management Protocol (SNMP) is used between a network management console and network devices (routers, bridges, intelligent hubs) to collect and exchange network management information.

Examples of Application layer interfaces for TCP/IP applications are Windows Sockets and NetBIOS. Windows Sockets provides a standard application programming interface (API) under Windows Server 2003. NetBIOS is an industry-standard interface for accessing protocol services such as sessions, datagram’s, and name resolution. More information on Windows Sockets and NetBIOS is provided later in this chapter.

The TCP/IP Application layer encompasses the responsibilities of the OSI Session, Presentation, and Application layers.

➢ TCP/IP Core Protocols

  • The TCP/IP protocol component that is installed in your network operating system is a series of interconnected protocols called the core protocols of TCP/IP. 
  • All other applications and other protocols in the TCP/IP protocol suite rely on the basic services provided by the following protocols: IP, ARP, ICMP, IGMP, TCP, and UDP.

➢ IP

  • IP is a connectionless, unreliable datagram protocol primarily responsible for addressing and routing packets between hosts. Connectionless means that a session is not established before exchanging data. Unreliable means that delivery is not guaranteed. 
  • IP always makes a “best-effort” attempt to deliver a packet. An IP packet might be lost, delivered out of sequence, duplicated, or delayed. IP does not attempt to recover from these types of errors. 
  • The acknowledgement of packets delivered and the recovery of lost packets is the responsibility of a higher-layer protocol, such as TCP. IP is defined in RFC 791.

An IP packet consists of an IP header and an IP payload. 

Table: Key Fields in the IP Header
TCP/IP Protocol - Notes, Computer Network, Engg , Sem - Computer Science Engineering (CSE)

➢ Fragmentation and Reassembly

  • If a router receives an IP packet that is too large for the network to which the packet is being forwarded, IP fragments the original packet into smaller packets that fit on the downstream network. 
  • When the packets arrive at their final destination, IP on the destination host reassembles the fragments into the original payload. This process is referred to as fragmentation and reassembly. 
  • Fragmentation can occur in environments that have a mix of networking media, such as Ethernet and Token Ring.

The fragmentation and reassembly work as follows:

  • When an IP packet is sent by the source, it places a unique value in the Identification field.
  • The IP packet is received at the router. The IP router notes that the maximum transmission unit (MTU) of the network onto which the packet is to be forwarded is smaller than the size of the IP packet.
  • IP divides the original IP payload into fragments that fit on the next network. 

Each fragment is sent with its own IP header that contains:

  • The original Identification field identifying all fragments that belong together.
  • The More Fragments Flag indicating that other fragments follow. The More Fragments Flag is not set on the last fragment, because no other fragments follow it.
  • The Fragment Offset field indicating the position of the fragment relative to the original IP payload.

When the fragments are received by IP at the remote host, they are identified by the Identification field as belonging together. The Fragment Offset field is then used to reassemble the fragments into the original IP payload.

➢ ARP

  • When IP packets are sent on shared access, broadcast-based networking media — such as Ethernet or Token Ring — the media access control (MAC) address corresponding to a forwarding IP address must be resolved. 
  • ARP uses MAC-level broadcasts to resolve a known forwarding or next-hop IP address to its MAC address. ARP is defined in RFC 826.

Question for TCP/IP Protocol - Notes, Computer Network, Engg , Sem
Try yourself:Which protocol finds the MAC address from IP address
View Solution

➢ ICMP

  • Internet Control Message Protocol (ICMP) provides troubleshooting facilities and error reporting for packets that are undeliverable.
    Example: If IP is unable to deliver a packet to the destination host, ICMP sends a Destination Unreachable message to the source host. 
  • The following table shows the most common ICMP messages.

Table: Common ICMP Messages
TCP/IP Protocol - Notes, Computer Network, Engg , Sem - Computer Science Engineering (CSE)


Table: Common ICMP Destination Unreachable Messages
TCP/IP Protocol - Notes, Computer Network, Engg , Sem - Computer Science Engineering (CSE)

ICMP does not make IP a reliable protocol. ICMP attempts to report errors and provide feedback on specific conditions. ICMP messages are carried as unacknowledged IP datagrams and are themselves unreliable. ICMP is defined in RFC 792.

➢ IGMP

  • Internet Group Management Protocol (IGMP) is a protocol that manages host membership in IP multicast groups on a network segment. An IP multicast group, also known as a host group, is a set of hosts that listen for IP traffic destined for a specific IP multicast address. 
  • IP multicast traffic is sent to a single MAC address but processed by multiple IP hosts. A specific host listens on a specific IP multicast address and receives all packets to that IP address.

The following are some of the additional aspects of IP multicasting:

  • Host group membership is dynamic; hosts can join and leave the group at any time.
  • A host group can be of any size.
  • Members of a host group can span IP routers across multiple networks. This situation requires IP multicast support on the IP routers and the ability for hosts to register their group membership with local routers. Host registration is accomplished using IGMP.
  • A host can send traffic to an IP multicast address without belonging to the corresponding host group.

For a host to receive IP multicasts, an application must inform IP that it will receive multicasts at a specified IP multicast address. If the network technology supports hardware-based multicasting, the network interface is told to pass up packets for a specific IP multicast address. In the case of Ethernet, the network adapter is programmed to respond to a multicast MAC address corresponding to the specified IP multicast address.

A host supports IP multicast at one of the following levels:

  • Level 0: No support to send or receive IP multicast traffic.
  • Level 1: Support exists to send but not receive IP multicast traffic.
  • Level 2: Support exists to both send and receives IP multicast traffic. Windows Server 2003, Windows 2000, Microsoft Windows NT version 3.5 and later, and TCP/IP support level 2 IP multicasting.

The protocol to register host group information is IGMP, which is required on all hosts that support level 2 IP multicasting. IGMP packets are sent using an IP header.

IGMP messages take three forms:

1. Host Membership Report

  • When a host joins a host group, it sends an IGMP Host Membership Report message to the all-hosts IP multicast address (224.0.0.1) or to the specified IP multicast address declaring its membership in a specific host group by referencing the IP multicast address. 
  • A host can also specify the specific sources from which multicast traffic is needed.

2. Host Membership Query

  • When a router polls a network to ensure that there are members of a specific host group, it sends an IGMP Host Membership Query message to the all-hosts IP multicast address. 
  • If no responses to the poll are received after several polls, the router assumes no membership in that group for that network and stops advertising that multicast group information to other routers.

3. Group Leave

  • When a host is no longer interested in receiving multicast traffic sent to a specific IP multicast address and it sent the last IGMP Host Membership Report message in response to an IGMP Host Membership Query, it sends an IGMP Group Leave message to the specific IP multicast address. 
  • Local routers verify that the host sending the IGMP Group Leave message is the last group member for that multicast address on that subnet. 
  • If no responses to the poll are received after several polls, the router assumes no membership in that group for that subnet and stops advertising that multicast group information to other routers.

For IP multicasting to span routers across an internetwork, multicast routing protocols are used by routers to communicate host group information so that each router supporting multicast forwarding is aware of which networks contain members of which host groups. IGMP is defined in RFCs 1112 and 2236.

➢ TCP

 

  • TCP is a reliable, connection-oriented delivery service. The data is transmitted in segments. Connection-oriented means that a connection must be established before hosts can exchange data. Reliability is achieved by assigning a sequence number to each segment transmitted. 
  • An acknowledgement is used to verify that the data is received. For each segment sent, the receiving host must return an acknowledgement (ACK) within a specified period for bytes received. If an ACK is not received, the data is retransmitted. TCP is defined in RFC 793.

TCP uses byte-stream communications, wherein data within the TCP segment is treated as a sequence of bytes with no record or field boundaries. 

Table: Key Fields in the TCP Header
TCP/IP Protocol - Notes, Computer Network, Engg , Sem - Computer Science Engineering (CSE)

➢ TCP Ports

  • A TCP port provides a specific location for delivery of TCP segments. Port numbers below 1024 are well-known ports and are assigned by the Internet Assigned Numbers Authority (IANA). The following table lists a few well-known TCP ports.

Table: Well-Known TCP Ports
TCP/IP Protocol - Notes, Computer Network, Engg , Sem - Computer Science Engineering (CSE)

➢ TCP Three-Way Handshake

  • A TCP connection is initialized through a three-way handshake. 
  • The purpose of the three-way handshake is to synchronize the sequence number and acknowledgement numbers of both sides of the connection and exchange TCP window sizes or the use of large window sizes or TCP timestamps

The following steps outline the process:

  • The initiator of the TCP connection, typically a client, sends a TCP segment to the server with an initial Sequence Number for the connection and a window size indicating the size of a buffer on the client to store incoming segments from the server.
  • The responder of the TCP connection, typically a server, sends back a TCP segment containing its chosen initial Sequence Number, an acknowledgement of the client’s Sequence Number, and a window size indicating the size of a buffer on the server to store incoming segments from the client.
  • The initiator sends a TCP segment to the server containing an acknowledgement of the server’s Sequence Number.

TCP uses a similar handshake process to end a connection. This guarantees that both hosts have finished transmitting and that all data was received.

➢ UDP

  • UDP provides a connectionless datagram service that offers unreliable, best-effort delivery of data transmitted in messages. This means that neither the arrival of datagrams nor the correct sequencing of delivered packets is guaranteed. UDP does not recover from lost data through retransmission. UDP is defined in RFC 768.
  • UDP is used by applications that do not require an acknowledgement of receipt of data and that typically transmit small amounts of data at one time. NetBIOS name service, NetBIOS datagram service, and SNMP are examples of services and applications that use UDP. The following table describes the key fields in the UDP header.

Table: Key Fields in the UDP Header

TCP/IP Protocol - Notes, Computer Network, Engg , Sem - Computer Science Engineering (CSE)

➢ UDP Ports

  • To use UDP, an application must supply the IP address and UDP port number of the destination application. 
  • A port provides a location for sending messages. A port functions as a multiplexed message queue, meaning that it can receive multiple messages at a time. Each port is identified by a unique number. 
  • It is important to note that UDP ports are distinct and separate from TCP ports even though some of them use the same number. 

Table: Well-Known UDP Ports
TCP/IP Protocol - Notes, Computer Network, Engg , Sem - Computer Science Engineering (CSE)


 So that is about TCP/IP and the protocols we use in TCP/IP.

The document TCP/IP Protocol - Notes, Computer Network, Engg , Sem - Computer Science Engineering (CSE) is a part of Computer Science Engineering (CSE) category.
All you need of Computer Science Engineering (CSE) at this link: Computer Science Engineering (CSE)

Top Courses for Computer Science Engineering (CSE)

FAQs on TCP/IP Protocol - Notes, Computer Network, Engg , Sem - Computer Science Engineering (CSE)

1. What is the TCP/IP protocol stack and what are its layers?
Ans. The TCP/IP protocol stack is a set of networking protocols used to establish communication between devices on the internet. It consists of four layers: the Network Interface Layer, Internet Layer, Transport Layer, and Application Layer. The Network Interface Layer deals with the physical connection between devices, the Internet Layer handles addressing and routing of data packets, the Transport Layer ensures reliable delivery of data, and the Application Layer provides protocols for specific applications such as HTTP, FTP, and DNS.
2. How does the TCP/IP protocol stack differ from the OSI model?
Ans. The TCP/IP protocol stack and the OSI model are two different ways to conceptualize networking protocols. The TCP/IP protocol stack is the set of protocols actually used on the internet, while the OSI model is a theoretical framework that divides networking into seven layers. The TCP/IP stack combines some of the layers of the OSI model, such as the Network Interface and Internet layers, into a single layer called the Internet Layer.
3. What is the role of the Transport Layer in the TCP/IP protocol stack?
Ans. The Transport Layer in the TCP/IP protocol stack is responsible for ensuring reliable delivery of data between devices. It provides two protocols, TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). TCP is connection-oriented and guarantees delivery of data packets in the correct order, while UDP is connectionless and does not provide reliability. The Transport Layer also handles flow control and congestion control to prevent network congestion and ensure efficient data transfer.
4. How does IP address allocation work in the TCP/IP protocol stack?
Ans. IP address allocation in the TCP/IP protocol stack follows the principle of hierarchical addressing. Internet Service Providers (ISPs) are allocated blocks of IP addresses by regional Internet registries. These ISPs then assign smaller blocks of IP addresses to their customers. IP addresses are divided into two parts: the network portion and the host portion. The network portion identifies the network to which a device belongs, while the host portion identifies the specific device within the network.
5. What are some common applications that use the TCP/IP protocol stack?
Ans. The TCP/IP protocol stack is used by a wide range of applications on the internet. Some common applications include web browsing (HTTP), file transfer (FTP), email (SMTP, POP, IMAP), remote login (SSH), and domain name resolution (DNS). These applications rely on the TCP/IP stack to establish connections, transfer data reliably, and communicate with other devices on the internet.
Download as PDF
Explore Courses for Computer Science Engineering (CSE) exam

Top Courses for Computer Science Engineering (CSE)

Signup for Free!
Signup to see your scores go up within 7 days! Learn & Practice with 1000+ FREE Notes, Videos & Tests.
10M+ students study on EduRev
Related Searches

practice quizzes

,

ppt

,

Sample Paper

,

Sem - Computer Science Engineering (CSE)

,

study material

,

pdf

,

TCP/IP Protocol - Notes

,

Semester Notes

,

Previous Year Questions with Solutions

,

Computer Network

,

video lectures

,

Exam

,

shortcuts and tricks

,

Extra Questions

,

TCP/IP Protocol - Notes

,

Viva Questions

,

Important questions

,

Sem - Computer Science Engineering (CSE)

,

Free

,

Computer Network

,

Engg

,

Engg

,

Objective type Questions

,

MCQs

,

Sem - Computer Science Engineering (CSE)

,

Engg

,

TCP/IP Protocol - Notes

,

Summary

,

past year papers

,

Computer Network

,

mock tests for examination

;