0% found this document useful (0 votes)
114 views5 pages

TCP/IP Application Layer Overview

The document discusses the layers of the TCP/IP model and protocols used at each layer. It describes the four layers - application layer, transport layer, internet layer, and network access layer. The application layer deals with high-level protocols like SMTP, FTP, DNS. The transport layer ensures reliable or unreliable data delivery using TCP and UDP. The internet layer handles packet delivery and routing using IP, ICMP, IGMP. The network access layer maps IP addresses to hardware addresses using protocols like Ethernet, PPP, ARP.

Uploaded by

DARA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
114 views5 pages

TCP/IP Application Layer Overview

The document discusses the layers of the TCP/IP model and protocols used at each layer. It describes the four layers - application layer, transport layer, internet layer, and network access layer. The application layer deals with high-level protocols like SMTP, FTP, DNS. The transport layer ensures reliable or unreliable data delivery using TCP and UDP. The internet layer handles packet delivery and routing using IP, ICMP, IGMP. The network access layer maps IP addresses to hardware addresses using protocols like Ethernet, PPP, ARP.

Uploaded by

DARA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

IT1927

TCP/IP Layers
Application layer
This layer represents an interface through a variety of protocols that enable services to be applied to end-
user application processes. These services include handling high-level protocols, issuing of representation,
encoding, and dialog control.
• Simple Mail Transfer Protocol (SMTP): It refers to a TCP/IP protocol that specifies a reliable and
efficient transfer of electronic mail service on the Internet.
• Post Office Protocol, version 3 (POP3): It refers to a TCP/IP protocol that is designed to allow a
workstation to retrieve mail that the server is holding for it.
• Trivial File Transfer Protocol (TFTP): It is a small and simple alternative to FTP that uses UDP to
transfer files between systems.
• File Transfer Protocol (FTP): It refers to a TCP/IP protocol that enables the sharing of computer
programs and/or data between hosts over a TCP/IP network. It uses TCP to create a virtual
connection for control information and then creates a separate TCP connection for data transfer.
• Network File System (NFS): It refers to a TCP/IP protocol that enables computers to mount drives
on remote hosts and operate them as if they were local drives.
• Domain Name System (DNS): It refers to a TCP/IP protocol that is used on the Internet for
translating names of domains and their publicly advertised network nodes into IP addresses.
• Simple Network Management Protocol (SNMP): It refers to a TCP/IP protocol that monitors and
controls the exchange of management information between networks and network components; it
enables network administrators to manage configurations, statistics collection, network
performance, and security. SNMP model includes three (3) components:
o Managed devices collect and store management information and make this information
available to NMSs using SNMP.
o An agent has local knowledge of management information and translates that information
into a form compatible with SNMP.
o NMS executes applications that monitor and control managed devices. NMSs provide the bulk
of the processing and memory resources required for network management.
• Terminal Emulation Protocol Network (Telnet): It refers to a TCP/IP protocol that uses the TCP as
the transport protocol to establish a connection between server and client. This general-purpose
client-server program enables users to log in to remote systems and use resources as if they were
connected to a local system. It uses special software called a daemon, is referred to as a remote
host. A connection using Telnet is called a Virtual Terminal (VTY) session, or connection.
• Remote login application (rlogin): This is a UNIX command that allows authorized users to log in to
other UNIX machines (hosts) on a network and to interact as if the user were physically at the host
computer. Once the user is logged into the host, the user can do anything that the host has
permitted, such as read, edit, or delete files.
• Hypertext Transfer Protocol (HTTP): It refers to an application-level protocol service and an Internet
standard developed by the IETF that supports the exchange of information on the World Wide Web,
as well as on internal networks.
• HTTPS (Hypertext Transfer Protocol over Secure Socket Layer): This is a secure message-oriented
communications protocol designed for use in conjunction with HTTP.
o Secure Sockets Layer (SSL) – It is a security protocol that works at a socket level. This layer
exists between the TCP layer and the application layer to encrypt/decode data and
authenticate concerned entities.

07 Handout 1 *Property of STI


[email protected] Page 1 of 5
IT1927

Transport layer
This layer is responsible for reliable end-to-end data
delivery from the source host to the destination
host. A three-way handshake is a method, in which
the sender and the receiver inform their respective
operating systems that a connection will be
initiated before the actual data communication
begins.
1. Once the sender transmits a packet, it
starts a timer and waits for an
acknowledgment from the receiver before
sending the next packet. This flow control mechanism that requires the sender to receive an
acknowledgment from the receiver after transmitting a certain amount of data is known as the
windowing.
2. The receiver acknowledges the receipt of data as it arrives. When the buffers on the receiving
device are full, a “not ready” indicator/message is sent to the sending device so that the
transmission will be suspended until the data in the buffers has been processed.
3. On the other hand, when the receiver can handle additional data, the receiver sends a “ready”
transport indicator. When this indicator is received, the sender can resume the segment
transmission.
4. This flow control mechanism that requires a receiver to communicate with the sender and send
back an acknowledgment message when the data is received is simply known as the
acknowledgment.

Protocols used in TCP/IP


• Transport Control Protocol (TCP): It refers to a connection-oriented TCP/IP standard transport layer
protocol that provides reliable data delivery, duplicate data suppression, congestion control, and
flow control on which many application protocols depend.
• User Datagram Protocol (UDP): It refers to a connectionless TCP/IP standard transport layer
protocol that provides unreliable, best-effort service.

Internet Layer
This layer is responsible for the delivery of service requests that respond from the transport layer and has
them arrive at their destination through the “virtual network” image of the internet.
• Internet Protocol (IP): It performs the following operations:
o Defines a packet and an addressing scheme
o Transfers data between the Internet layer and network access layers
o Routes packets to remote hosts
• Internet Control Message Protocol (ICMP): It refers to a TCP/IP protocol that handles error and
controls the process of sending data between computers. Specifically, routers and hosts use ICMP
to send reports of problems about packets that return to the original source that sent the packet.
ICMP also includes an echo request/reply that is used to test whether a destination is reachable and
responding.
• Internet Group Management Protocol (IGMP): It refers to a TCP/IP protocol that handles
multicasting. Hosts use IGMP to keep local routers apprised of their membership in multicast groups.
When all hosts leave a group, routers no longer forward packets that arrive for the group.

07 Handout 1 *Property of STI


[email protected] Page 2 of 5
IT1927

• Address Resolution Protocol (ARP): It refers to a TCP/IP protocol that obtains the physical address
of a node from a specific IP number. It is used to dynamically bind a high-level IP address to a low-
level physical hardware address and is used across a single physical network and is limited to
networks that support hardware broadcast.
• Reverse Address Resolution Protocol (RARP): It refers to a TCP/IP protocol that allows a host with
no local permanent data storage media to find its Internet address given its physical address.

Network Access Layer


This layer is also called the host-to-network layer, which is concerned with all of the issues that an IP packet
requires to actually make a physical link to the network media. The network interface layer functions
include mapping the IP addresses to physical hardware addresses and encapsulation of IP packets.
• Ethernet: It refers to a family of LAN, covered by a group of IEEE 802.3 standards. Ethernet is a best-
effort delivery system that uses a CSMA/CD access method.
• Point-to-Point Protocol (PPP): This refers to the protocol used for data transfer across a serial line.
• Fiber distributed data interface (FDDI): This is a set of ANSI protocols for sending digital data over
fiber optic cable.
• Asynchronous Transfer Mode (ATM): This refers to a wide area protocol that features high data rates
and equal-sized packets/cells that is suitable for text, audio, and video data transfer.
• Frame Relay: This is a WAN protocol for LAN internetworking that provides a fast and efficient
method of transmitting information from a user device to another across multiple switches and
routers.
• Address Resolution Protocol (ARP): It refers to a TCP/IP protocol that performs mapping of an IP
address to a physical machine that is recognized in the local network.
• Proxy ARP: This is used when one needs to move a device from one segment to another, but cannot
change its current IP addressing information.
• Reverse Address Resolution Protocol (RARP): It refers to a TCP/IP protocol that allows a host with no
local permanent data storage media to find its Internet address given its physical address.

Networking Tools
IPCONFIG (IP Configuration tool) is a Console
Command which can be issued to the
Command Line Interpreter (or command
prompt) to display the network settings (e. g.
MAC address, IP address, and gateway)
currently assigned to any or all network
adapters in the machine. This command can be
utilized to verify a network connection as well
as to verify your network settings.
PING (Packet Internet Groper) is a diagnostic
utility used to determine the quality of your
connection to devices/the Internet. It uses the
ICMP Echo message and its response to test if a
network device on an IP network is reachable.
It sends out a packet to a designated internet
host or network computer and measures its
response time.

07 Handout 1 *Property of STI


[email protected] Page 3 of 5
IT1927

Response returned Which means...


The address you have entered doesn't exist. Check your spelling and
Ping Request could not find Host...
try again.
Reply From... The address that you have entered is alive and is responding to pings.
Request Timed Out... The address was found but it isn't responding to ping requests.
The TTL value determines the maximum amount of time an IP packet
TTL Expired in Transit… may live in the network without reaching its destination. The number
of required hops exceeds TTL.
The host that you are trying to ping is down or is not operating on the
Destination Host Unreachable…
network.

TRACERT (MS-DOS and Windows) is used to


view the listing of how a network packet
travels (sequence of segments or "hops" (i.e.,
the name of the intermediate hops/routers))
from the source to a remote destination host
and where it may fail or slow down.

Message Which means...


Unable to resolve target system
The name you entered doesn't exist.
<site name>
Trace complete Trace was successful.
Request timed out Either the host or hops on the way didn't respond in the timeout period.
Destination network This means that a device that the rest of the Internet is sending traffic to
unreachable the host cannot connect to it or doesn't know where to send the traffic.
NETSTAT is a utility that tells us
what our machine is connected to
at the moment the command is run.
This makes it a very useful tool to
see if spyware, adware, or Trojans
have established connections that
we do not know about. This tool can
display the following information:
• Active TCP connections and
ports on which the computer is
listening.
• Ethernet statistics
• IP routing table
• IPv4 statistics (for the IP, ICMP,
TCP, and UDP protocols)
• IPv6 statistics (for the IPv6,
ICMPv6, TCP over IPv6, and UDP
over IPv6 protocols)

07 Handout 1 *Property of STI


[email protected] Page 4 of 5
IT1927

Port State
State Description
CLOSED No connection is active or pending.
LISTEN The server is waiting for an incoming call.
SYN RCVD A connection request has arrived.
SYN SENT The client has started to open a connection.
ESTABLISHED Normal data transfer state.
FIN WAIT 1 Client has confirmed it is finished.
FIN WAIT 2 Server has agreed to release.
TIMED WAIT Wait for pending packets (“2MSL wait state”)
CLOSING Both sides have tried to close simultaneously.
CLOSE WAIT Server has initiated a release.
LAST ACK Wait for pending packets
Netstat Syntaxes
Displays
netstat Active connections only, with the full domain name
netstat -a Active connections and listening ports with full domain name
Active connections and listening ports with full domain name and PID of the
netstat -ao
application using it*
Active connections and listening ports but in numeric form (no domain
netstat -an
names)
Active connections and listening ports but in numeric form (no domain
netstat -ano
names) and PID of the application using it*
Repeats the command, updating the statistics after the number of seconds
netstat -<any of above> 30
indicated.
netstat -e The statistics of the Ethernet
The numerical values of the IP addresses and ports used for
netstat -n
active TCP connections
The statistics for a specific protocol. The valid values for
netstat -p <protocol>
<protocol> include tcp, udp, ip, icmp

References:
Mueller, S. (2013). Upgrading and Repairing PC's 21st Edition. Indianapolis, Ind.: Que
Oliviero, A. (2014)., Cabling: the complete guide to copper and fiber-optic networking, 5th ed. Indianapolis, IN:
John Wiley and Sons
Sosinsky, B. (2009). Networking bible. Indianapolis, IN: Wiley Pub., Inc.
Tanenbaum, A. (2011). Computer Networks (5th Edition). Boston: Pearson Prentice Hall

07 Handout 1 *Property of STI


[email protected] Page 5 of 5

You might also like