DCN-Unit II
DCN-Unit II
DCN-Unit II
Unit-II
Transport Layer Design Issues
1. Service-point addressing
Computers often run many programs at the same time. Due to this, source-to-destination
delivery means delivery from a specific job (currently running program) on one computer
to a specific job (currently running program) on the other system not only one computer to
the next.
For this reason, the transport layer added a specific type of address to its header, it is
referred to as a service point address or port address.
Transport Layer requires a Port number to correctly deliver the segments of data to the
correct process amongst the multiple processes running on a particular host. A port
number is a 16 bit address used to identify any client-server program uniquely.
By this address each packet reaches the correct computer and also the transport layer gets
the complete message to the correct process on that computer.
Transport Layer Design Issues
Source port address: It is used to define the address of the application program in a source
computer. It is a 16-bit field.
Destination port address: It is used to define the address of the application program in a
destination computer. It is a 16-bit field.
Sequence number: A stream of data is divided into two or more TCP segments. The 32-bit
sequence number field represents the position of the data in an original data stream.
Acknowledgement number: A 32-field acknowledgement number acknowledge the data from
other communicating devices. If ACK field is set to 1, then it specifies the sequence number that
the receiver is expecting to receive.
Header Length (HLEN): It specifies the size of the TCP header in 32-bit words. The minimum
size of the header is 5 words, and the maximum size of the header is 15 words. Therefore, the
maximum size of the TCP header is 60 bytes, and the minimum size of the TCP header is 20
bytes.
Reserved: It is a six-bit field which is reserved for future use.
Control bits: Each bit of a control field functions individually and independently. A control bit
Transport Layer
Connection Management
TCP Segment Format
It is a Connection-Oriented
Connection Type It is a Connectionless protocol
protocol
Speed slow high
Reliability It is a reliable protocol. It is an unreliable protocol.
Header size 20 bytes 8 bytes
In Lossy compression, A file does not restore or While in Lossless Compression, A file can be
2.
rebuilt in its original form. restored in its original form.
In Lossy compression, Data’s quality is But Lossless Compression does not compromise
3.
compromised. the data’s quality.
But Lossless Compression does not reduce the size
4. Lossy compression reduces the size of data.
of data.
Algorithms used in Lossy compression are:
Algorithms used in Lossless compression are:
Transform coding, Discrete Cosine Transform,
5. Run Length Encoding, Lempel-Ziv-Welch,
Discrete Wavelet Transform, fractal compression
Huffman Coding, Arithmetic encoding etc.
etc.
Lossless Compression is used in Text, images,
6. Lossy compression is used in Images, audio, video.
sound.
Lossless Compression has less data-holding
7. Lossy compression has more data-holding capacity.
capacity than Lossy compression technique.
Lossy compression is also termed as irreversible Lossless Compression is also termed as reversible
8.
compression. compression.
Presentation Layer
Cryptography
Data Encryption and Decryption:
Encryption is needed for security purposes when sending data across networks.
An encryption algorithm is used during transmission, while a decryption algorithm is used
at the receiving node.
Encryption and decryption typically involves the secure sockets layer (SSL) protocol,
which has become more popular when used by the presentation layer
Encryption is related to cryptography in application layer.
Cryptography referred almost exclusively to encryption, which is the process of converting
ordinary information (called plain text) into unintelligible text (called cipher text).
A cipher is a pair of algorithms that create the encryption and the reversing decryption.
Encryption is also known as private-key cryptography, and is called so because the key
used to encrypt and decrypt the message must remain secure, because anyone with access
to it can decrypt the data.
Application Layer
Design Issues with Application Layer
In the design and implementation of Application Layer protocols occurring problems and
these problems can be addressed by patterns from several different pattern languages:
Design (pattern) Language for Application-level Communication Protocols: The
Application-level Communication Protocols Design Patterns language aims to help
solve communication software design.
Service Design Patterns: Developers of communication applications must address
recurring design challenges related to efficiency, extensibility, and robustness. These
challenges are often independent of application-specific requirements. Successful
developers resolve these challenges by applying appropriate patterns and pattern
languages.
Enterprise Application Architecture's Patterns:
Pattern-Oriented Software Architecture: An architectural pattern is a general,
reusable solution to a commonly occurring problem in software architecture within a
given context. The architectural patterns address various issues in software engineering,
such as computer hardware performance limitations, high availability and minimization of
a business risk.
Application Layer
Functions of the Application layer
1. Network Virtual terminal
The application layer is the software version of a physical terminal and this layer permitted
to a user to log on to a remote host.
For this, an application creates a software emulation of a terminal at the remote host. By
this user's computer can communicate with the software terminal, which in turn,
communicates with the host.
It is shown that the remote host is communicating with one of its terminals, so it allows the
user to log on.
In other words, An application layer allows a user to log on to a remote host. To do so, the
application creates a software emulation of a terminal at the remote host. The user's
computer talks to the software terminal, which in turn, talks to the host. The remote host
thinks that it is communicating with one of its own terminals, so it allows the user to log
on.
Application Layer
Functions of the Application layer
2. File Transfer, Access, and Management (FTAM)
An application permits a user to access files in a remote computer, to retrieve files from a
computer and to manage files on a remote computer.
FTAM is concerned with a hierarchical virtual file in terms of file attributes, file structure
and the types of operations performed on the files and their attributes.
In other word, An application allows a user to access files in a remote computer, to retrieve
files from a computer and to manage files in a remote computer. FTAM defines a
hierarchical virtual file in terms of file structure, file attributes and the kind of operations
performed on the files and their attributes.
Application Layer
Functions of the Application layer
3. Addressing
To achieve communication between client and server system, there is a need for
addressing.
When a request is sent from the client side to the server side, this request contains the
server address and its own address.
The server answered to the client request, this request contains the destination address, i.e.,
client address. DNS is used to achieve this type of addressing.
In other words, To obtain communication between client and server, there is a need for
addressing. When a client made a request to the server, the request contains the server
address and its own address. The server response to the client request, the request contains
the destination address, i.e., client address. To achieve this kind of addressing, DNS is
used.
Application Layer
Functions of the Application layer
4. Mail Services
Email forwarding and storage of e-mails provided by an application layer.
An application layer provides Email forwarding and storage.
5. Directory Services
A distributed database is contained by an application that provides access for global
information about various objects and services.
An application contains a distributed database that provides access for global information
about various objects and services.
6. Authentication
It provides authentication to occur between devices for an extra layer of security and it
authenticates the sender or receiver's message or both.
It authenticates the sender or receiver's message or both.