Vous êtes sur la page 1sur 5

TCP / IP - Implementation ISO-OSI model

As I said in the previous article: An internet (small i) is a network of networks. The best known Internet is the Internet (the big). To make use Internet communication protocol suite TCP / IP, presented in the July 1999 issue of e-mail in box REPORT Internet. The ISO / OSI network represents an ideal model. Network implementations actually meet a greater or lesser extent specifications of this model. TCP / IP suite uses only five levels ISO / OSI. Making a brief description of levels TCP / IP protocols they serve. 1. The physical layer Is physically identical to the ISO / OSI model, transmission media consisting of: cables, fiber optic radio links, link laser, infrared, etc.. A few years ago the Internet was more text, text and graphics is now and in the future will be as much multimedia (audio and video). This means that the need for increased bandwidth and increase continuously seeking new solutions for broadcast media. Most local networks are conducted in accordance with standards developed by two institutions: IEEE (Institute of Electrical and Electronics Engineers) and ANSI (American National Standards Institute). In this regard were standardized IEEE 802 standards that define mainly the use of communication media, dealing with how to interconnect various devices: computers, terminals, printers, plotters, facsimile equipment, connecting with other networks, and so on Ethernet network (preferred by most local networks) is Access Protocol CSMA (Carrier Sense Multiple Access) as described in the IEEE 802.3 standard 2. Data link layer Controls the exchange of data between the physical and network level, communicating directly with the IP module the network. In other words, about the "hidden" network level implementation details of the physical layer (even if using Ethernet or Token Ring technology). An application written using TCP / IP can be used regardless of the technology underlying network construction. This level is the network card. On this level ARP and RARP protocols are. Protocol ARP (Address Resolution Protocol) IP address translation performed in the data link layer addresses (Ethernet networks have a size of 6 bytes). RARP (Reverse Address Resolution Protocol) is a variation of the ARP protocol that converts an address level data link IP address. Also on this level is a set of protocols used for communication between two computers via standard phone lines. In this case using a modem and serial port communication is done on the computer and not the network card. We recall protocols: SLIP - Serial Line IP, CSLIP - Compressed SLIP, PPP - Point-to-Point Protocol. 3. Network layer Consists mainly of Internet Protocol, a connectionless protocol (see article above). IP packets

are also called datagrams. It is said that IP provides unreliable transmission of data packets. Let's see what IP is characterized as unreliable protocol. IP considers each packet as an independent entity unrelated to other packages. Any association between IP packets should be treated higher level. Each datagram contains the address of the source computer and the destination computer address, so that it can be transmitted and routed independently of the others. IP is unreliable because it does not guarantee the datagrams arrive at their destination and whether their content is correct. Verifies IP level, however, has its own header checksum (20 bytes). If an IP header is not suitable, the entire package is canceled and is no longer transmitted higher level, a level that checks all data contained in the datagram. IP layer is responsible for routing packets in the Internet and possible fragmentation of data. Packet fragmentation is done by a gateway when the package is too large to traverse the network (exceeds the MTU of the network). Further fragments are transmitted as IP packets are reassembled at the destination independent form the original datagram. If one of the fragments is lost or mistakenly canceled the entire datagram. Because IP does not guarantee delivery network packets carried nor failure signal when losing or altering data packets, was developed protocol: ICMP (Internet Control Message Protocol). Even though it is considered a network layer protocol, using all IP data delivery. On this level there is also IGMP (Internet Group Management Protocol - Protocol di Internet management groups). and it is based on IP network to transmit messages. 4. Transport layer This level is served mainly by two protocols: UDP and TCP. UDP is considered unreliable protocol and also all the same reasons. UDP packets are called datagrams all. It is recommended to use this protocol in LAN. When using UDP in WAN applications it is necessary to ensure their own protection mechanisms. At first glance there are clear differences between the network and transport protocols that between IP and TCP (UDP). On closer examination we find that distributes IP network data between computers on the TCP distributes data between applications. Suppose a computer (we use further the term to designate a host belonging to a network computer) connected to a network establishes a connection with another host. Basically, in the first phase, an application on the first computer, a request to communicate with another application on the second. Now enter the IP action that establishes the connection between the two computers. How, lately operating systems run on computers multitasking ask ourselves: How does the second host to deliver data packets required by the first computer application. For this reason the notion of the port. Any application that has the ability to work in a network is assigned a port number. In communication between two applications on hosts different IP protocol is responsible to memorize IP addresses of the two computers, while transport protocol (TCP or UDP) should note the source and destination port numbers. In the Internet, each protocol is assigned a port number. Below are the most popular protocols and port number on which they communicate with each other. File Transfer Protocol 21 Telnet Protocol 23

Simple Mail Transfer Protocol 25 Trivial File Transfer Protocol 69 Finger Protocol 79 HyperText Transfer Protocol 80 Table 1. Internet protocols and ports

TCP and UDP ports used differently. UDP is a connectionless protocol, simply leaves the data port. TCP instead focuses on the connection - not the port. Therefore, applications that use TCP can open multiple connections on the same port without transmission problems occur. TCP is considered a reliable protocol, ensuring the integrity of data transmitted. Using this protocol, the programmer should not longer deal with issues of fairness packet transmission, which is provided by the protocol itself. Therefore decreases in some way, speed. TCP has the following main features: Continuous data transfer - data flows simultaneously in both directions of the connection. We say that TCP is a duplex connection. Safety gear - recover packets transmitted with errors, missed or incorrect sequence number. This feature is provided by establishing a sequence number to each byte transmitted and need a confirmation message (ACK) from the receiver. If, after a certain period of time, the sender does not receive a confirmation message, the packet is considered lost and is retransmitted. Data flow control - every ACK message sent by the receiver, is contained in a "window" which indicates the number of bytes allowed sender can transmit. Following such a message, the sender will size the packets transmitted to the length indicated by the receiver. This length is valid until the next receive ACK message that contains another "window." Multiplexing - allows multiple processes running on the same host, use TCP facilities simultaneously. Connection control - the transfer of data between two processes can distinguish three phases: connection establishment, connection control, closing connection. Control connection involves: establishing sequence number and window size for each TCP packet. Below are a summary table that presents comparative facilities of the three protocols IP, UDP, TCP. IP

UDP TCP Connection-oriented no no yes Limiting the length of message yes yes no Checksum data no yes yes Reply to validation no no yes Timeout and retransmission no no yes Detection of duplicate packets no no yes Sequencing no no yes Control data flow no no yes

5. Application level In protocol suite TCP / IP this level includes levels: Session (5) presentation (6), application (7), the ISO / OSI model. For this reason it is also called at trial. On this level is used as a means of communication between processes, socket mechanism. Currently almost all operating systems have implemented this mechanism. That does not mean it is the only solution for network programming. A competitor is TLI (Transport Lazer Interface) appeared around 1985 with OS UNIX System V. Another network programming mechanism is RPC (Remote Procedure Call) seen as an extension socket solution. An application programmer who will design the network programs will meet frequently with the problem of creating a socket. Once the socket is created, all communication between processes is brunt operating system through the implementation of TCP / IP. The programmer will have to "master" only what data will be sent over the network. To create a socket, the instruction is executed: socket_handle = socket (protocol_family, socket_type, protocol) having approximately the same syntax on all operating systems. Well ..... and how "theory theory given practice is killing us", we will try next time to do a program that uses sockets (or rather two programs: one client and one server). '

Vous aimerez peut-être aussi