Computer Networks
Lecture (4 ) Addressing and
TCP/IP Protocols
Dr. Islam Mohammed Ibrahim
E_mail: [email protected]
Addressing
Four levels of addresses are used in an internet employing the TCP/IP
protocols: physical, logical, port, and specific.
Addressing
Port Address
Port address is a 16-bit address represented by one decimal number
ranged from (0-65535) to choose a process among multiple processes on
the destination host.
Destination port number is needed for delivery.
Example
Physical Address
Physical addresses are imprinted on the NIC. Most local-area networks
(Ethernet) use a physical address written as 12 hexadecimal digits; every
byte (2 hexadecimal digits). known also as the MAC address
Example:
07:01:02:01:2C:4B
A 6-byte (12 hexadecimal digits) physical address.
Specific Address
Universal Resource Locator (URL) (www.ksu.edu.sa)
The Domain Name System (DNS) translates human-friendly
computer hostnames ( URL) into IP addresses.
For example, www.example.com is translated to 208.77.188.166
TCP/IP PROTOCOL SUITE History
TCP/IP model was introduced in 1974.
TCP/IP stands for Transmission Control Protocol/Internet Protocol.
The Transmission Control Protocol (TCP) handles reliable delivery of
messages, and The Internet.
Protocol (IP) manages the routing of network transmission from the sender
to the receiver.
Features of TCP/IP Model
A list of features of TCP/IP Model –
Support from vendors: TCP/IP receives support from many hardware and
software vendors.
Interoperability: It can be installed and used on every platform.
Flexibility: An administrator
can automatically assign an IP address to a host.
TCP/IP PROTOCOL SUITE Vs. OSI model
TCP/IP and the DoD Model
DoD stands for Department of Defense. It is a smaller version of the OSI
reference model.
TCP/IP DoD model has four layers that are:
• Process/Application layer
• Host-to-Host layer
• Internet layer
• Network Access Layer
Difference between TCP/IP and OSI network model:
Process/Application layer
The Application layer of the DoD model is equivalent to the upper three layers of the OSI
model, i.e., Session layer, Presentation layer, and Application layer.
Enable applications to communicate with each other.
Provides access to the services that operate at the lower layers of the DoD model.
It contains a protocol that implements user-level functions such as mail delivery, file
transfer, and remote login.
Host-to-Host layer
A host-to-host layer of the DoD model performs the same functions as the Transport layer
of the OSI reference model.
It handles issues such as flow control, reliable end-to-end communication, and ensuring
error-free delivery of the data.
Protocols that operate on the Host-to-Host layer are: TCP and UDP
Internet layer
Internet layer of the DoD model performs the same functions as the Network layer of the
OSI reference model.
It handles the packaging, addressing, and routing of packets among multiple networks.
This layer also establishes a connection between two computers to exchange the data.
Network Access Layer
• The Hardware connected to Network access layer are:
Network medium: Cables like coaxial, twisted pair. Today, mostly, we use a wireless
medium such as Bluetooth, WI-FI.
Network Interface Card (NIC) has two types of addresses.
The TCP/IP DoD Protocols
Hypertext Transfer Protocol (HTTP)
It is a protocol used for transferring hypertext, i.e. (plain text, Images, sound, and video,
etc.) between two computers.
Hypertext is the text that is specially coded using a standard coding language called
Hypertext Markup Language (HTML).
It provides standard communication between web browsers and web servers.
It uses TCP port number 80
Hypertext Transfer Protocol Secure (HTTPS)
It encrypts the data that is being retrieved by HTTP
It makes sure that the data transfer between the client and server is secure.
It established an encrypted connection between the browser and the web server using the
Secure
It increases the speed of data transfer as compared to HTTP.
Secured Protocols
• SSL (secured socket layer)
• TLS (Transport layer security)
Transport Protocols
• There are the following two protocols at this layer:
• Transmission Control Protocol (TCP)
• User Datagram Protocol (UDP)
• Transmission Control Protocol (TCP)
• It takes a large block of information from an application layer and breaks them into
segments.
• It is a full-duplex, connection-oriented, and reliable protocol
User Datagram Protocol (UDP)
User Datagram Protocol (UDP) It is fast, connectionless, and unreliable
protocol.
It has been designed to send data packets over the network.
UDP does not provide reliability, flow control, and error recovery
mechanism.
File Transfer Protocol (FTP)
It is the standard protocol that uses to transfer files between computers
and servers over a network such as the Internet.
FTP server helps you to download, upload, and delete files.
It uses TCP port number 21 to maintain the connection.
It also uses TCP port number 20 for the actual transmission of the files.
Trivial File Transfer Protocol (TFTP)
Trivial File Transfer Protocol is a simple file transfer protocol that is similar
to FTP.
It uses UDP port number 69 for TFTP server.
It does not provide authentication and security while transferring the files.
Simple Mail Transfer Protocol (SMTP)
SMTP, the acronym is associated with Sending Mail To People.
SMTP uses TCP protocol
The default SMTP port number is 25.
Secondary SMTP port number is 26.
SMTP over SSL/TLS port number is 465.
Thank
You!